SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Issue 47 // August 2020
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa
To benefit team members, customers and partners with industry leading solutions, in the
event of a spin-off, Dell Technologies will seek to maintain the mutually beneficial strategic
relationship currently in place with VMware.
Dell Technologies Explores VMware Spin-Off
Dell Technologies is exploring a po-
tential spin-off of its 81% equity own-
ership interest in VMware. Although
this exploration is in an early stage,
Dell Technologies believes a spin-off
could benefit both Dell Technologies
and VMware shareholders, team mem-
bers, customers and partners by sim-
plifying capital structures and creating
additional long-term enterprise value.
Any potential spin-off would not occur
prior to September 2021 and would be
intended to qualify as tax-free for U.S.
federal income tax purposes.
Additionally, Dell Technologies contin-
ues to evaluate a range of strategic op-
tions concerning its ownership interest
in VMware, including maintaining its
current ownership in the company.
“The strategic relationship between Dell
Technologies and VMware has never
been stronger,” said Michael Dell, Chair-
man and Chief Executive Officer, Dell
Technologies. “For more than 20 years,
we’ve innovated for our customers and
created substantial growth and value
for both companies and our teams. Re-
>> Continued on page 3
>> Continued on page 4
gardless of the options we are exploring
to create additional value, we are accel-
erating our strategy - which remains
unchanged. We are focused on winning
in the consolidating markets where we
operate and innovating across the Dell
Technologies portfolio to create inte-
grated solutions that turn data into in-
sights and action.”
As part of its exploration of a potential
spin-off, Dell Technologies expects it
AWS IoT SiteWise makes it easy to collect, organize, and
monitor data from industrial equipment at scale.
AWS Announces General
Availability of AWS IoT SiteWise
SiteWise makes it easier for customers to
collectdatafromtheplantfloor,structure
and label the data, and generate real-time
metrics. In SiteWise, customers begin
by modeling their industrial equipment,
processes,andfacilitiesbyaddingcontext
(e.g.equipmenttypeandfacilitylocation)
to the collected data, and defining com-
mon industrial performance metrics (e.g.
overall equipment effectiveness and up-
time) on top of the data using SiteWise’s
built-in library of mathematical func-
tions. Once a customer’s environment
is modeled and their data ingested into
AWS, the service automatically computes
the metrics at the interval defined by the
customer(e.g.reportuptimeeveryhour).
All uploaded data and computed metrics
are sent to a fully managed time series
database, which is uniquely designed to
storeandretrievetime-stampeddatawith
low latency, making it significantly easier
for customers to analyze equipment per-
formance over time. From within the
A
mazonWebServices(AWS),
an Amazon.com company,
has announced the general
availability of AWS IoT Site-
Wise,amanagedservicethatcollectsdata
from the plant floor, structures and labels
the data, and generates real-time key per-
formance indicators (KPIs) and metrics
to help industrial customers make better,
data-drivendecisions.Customerscanuse
SiteWise to monitor operations across
facilities, quickly compute industrial
performance metrics, create applications
that analyze industrial equipment data to
prevent costly equipment issues, and re-
duce gaps in production. This allows cus-
tomers to collect data consistently across
devices, identify issues with remote mon-
itoring more quickly, and improve multi-
site processes with centralized data.
Michael Dell, Dell Technologies
AD
VEEAM BACKUP
FOR O365
Value Proposition: Microsoft Office 365 enables your enterprise to work anywhere,anytime,without the need to
host your own email,files and SharePoint infrastructure.Even though Microsoft hosts the infrastructure,this doesn’t
replace your responsibility to backup business-critical Office 365 data. With Office 365, it's your data — you control
it — and it is your responsibility to protect it.
FEATURES
• Protect your Office 365 data from accidental deletion, security threats and retention policy gaps
• Quickly restore individual Office 365 email, files and sites with industry-leading recovery flexibility
• Meet legal and compliance requirements with efficient eDiscovery of Office 365 items.
www.redingtonvalue.com sales.value@redingtonmea.com H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE
For more information, please write to sales.value@redingtonmea.com
3
HPE To Drive Edge-to-Cloud Strategy
With Acquisition Of Silver Peak
Oracle Announces Oracle
Dedicated Region Cloud@Customer
Silver Peak’s simple, intuitive ‘self-driving’ WAN delivers significant cost savings while
maintaining application performance for rapid business recovery in a post COVID-19 world.
Industry’s first fully managed cloud region brings 100% of Oracle’s public cloud services,
including Oracle Autonomous Database and Cloud applications, to customer data centers.
Hewlett Packard Enterprise (HPE)
has entered into a definitive agree-
ment to acquire Silver Peak, an SD-
WAN (Software-Defined Wide Area
Network) player, in a transaction
valued at $925 million. Silver Peak
will be combined with HPE’s Aruba
business unit and will extend Aruba’s
technology leadership in the large
and fast-growing SD-WAN space.
“HPE was an early mover in identi-
fying the opportunity at the edge and
that trend is accelerating in a post-
Oracle has announced Oracle Dedi-
cated Region Cloud@Customer, the
industry’s first fully-managed cloud re-
gion that brings all of the vendor’s sec-
ond-generation cloud services, includ-
COVID world,” said Antonio Neri,
President and CEO of HPE. “With
this acquisition we are accelerating
our edge-to-cloud strategy to pro-
vide a true distributed cloud model
and cloud experience for all apps
and data wherever they live. Silver
Peak’s innovative team and technolo-
gy bring critical capabilities that will
help our customers modernize and
transform their networks to securely
connect any edge to any cloud.”
Silver Peak’s advanced SD-WAN of-
ferings are highly complementary
and strengthen Aruba’s Edge Ser-
vice Platform (ESP). By combining
Silver Peak’s SD-WAN with Aruba’s
SD-Branch solutions customers can
simplify branch office and WAN
deployments to empower remote
workforces, enable cloud-connected
distributed enterprises, and trans-
form business operations without
compromising quality or reliability.
Legacy WAN architectures are no
longer viable and incur relatively
high costs, compelling enterprises
to invest in SD-WAN technology
to ensure secure, scalable, and effi-
cient connections from the edge of
their network to a diverse mix of
on-premises and cloud-based end-
points. The combination of Aruba’s
all-in-one SD-Branch strategy and
remote worker solutions with Silver
Peak’s SD-WAN and WAN optimiza-
tion offerings will allow HPE to bet-
ter address a greater set of customer
requirements and capitalize on this
market opportunity.
The companies expect the combina-
tion to create opportunities for sig-
nificant economic upside through
enhanced growth and profitability by:
• Providing a superior value prop-
osition to joint customers through
integrated offerings that addresses a
greater set of customer requirements
• Targeting an expanded TAM across
SD-WAN and SD-Branch imple-
mentations
• Accelerating WAN transformations
across HPE and Aruba’s broad global
customer base
Oracle is making all of its cloud ser-
vices — more than 50 services —
available on-premises so enterprises
can use Oracle’s cloud services wher-
ever they need them – in the cloud or
on-premises via Cloud@Customer.
“Enterprise customers have told us
that they want the full experience of
a public cloud on-premises, including
access to all of Oracle’s cloud services,
to run their most important work-
loads,” said Clay Magouyrk, Executive
Vice President of Engineering, Oracle
Cloud Infrastructure. “With Oracle
Dedicated Region Cloud@Customer,
SiteWiseconsole,customerscanalsocre-
atecustomwebapplications(withoutany
coding) to visualize key metrics across
end-user devices in near real-time. These
portable web applications can help cus-
tomers monitor equipment performance
on any web-enabled desktop, tablet, or
phone to spot anomalies, helping them
reduce waste, make faster decisions, and
optimize their plant performance.
Dirk Didascalou, Vice President of IoT,
AWS, said, “With SiteWise, industrial
customers can now use the power of
AWS to collect, organize, and monitor
their industrial equipment data at scale.
SiteWise will help industrial customers
move beyond data collection and enable
them to visualize and monitor all their
equipment, so they can focus on their
main job of optimizing their operations.”
In addition to using software running
on an edge device, SiteWise provides
interfaces for collecting data from mod-
ern industrial applications through MQ
Telemetry Transport (MQTT) messages
or its Application Programming Inter-
face (APIs). SiteWise is now available in
the US East (N. Virginia), US West (Or-
egon), Europe (Frankfurt), and Europe
(Ireland) AWS regions, with additional
regions coming soon.
AWS Announces
General Availability
of AWS IoT SiteWise
>> From page 1
Antonio Neri, HPE
enterprises get all of our second-gen-
eration cloud services, including
Autonomous Database, in their data
centres. Our major competitors can’t
offer customers a comparable dedicat-
ed cloud region running on-premises.”
Oracle Dedicated Region Cloud@Cus-
tomer includes full management capabil-
ities and access to new features and func-
tions the moment they become available
inOracle’spubliccloud.Itprovidesstrong
isolation of customer data, including all
API operations, which remain local to
customer data centres and provide the
highest levels of security. Additionally,
Oracle Dedicated Region Cloud@Cus-
tomer is certified to seamlessly run Or-
acle Cloud applications, including Oracle
Fusion Cloud Applications (Cloud ERP,
Cloud HCM, Cloud SCM, and Cloud
CX, making it a completely integrated
cloud experience on-premises. Custom-
ers only pay for services they consume
using the same predictable low pricing
offeredinOracle’spubliccloudregions.
ing Autonomous Database and Oracle
Cloud applications, to customer data
centres, starting at only $500K a month.
With this offering, enterprises get the
exact same complete set of modern
cloud services, APIs, industry-leading
SLAs, superior price-performance,
and highest levels of security available
from Oracle’s public cloud regions in
their own data centres. This is ideal for
highly regulated or security-focused
businesses needing to meet demand-
ing latency and data residency re-
quirements, reduce operational costs,
and modernise legacy applications.
For more information, please write to sales.value@redingtonmea.com
4
NexthinkLaunchesExperiencePlatform
Fortinet Acquires Cloud Security and
Networking Innovator OPAQ Networks
Fortinet has announced that it has ac-
quired OPAQ Networks, a Secure Ac-
cess Service Edge (SASE) cloud provid-
er based in Herndon, Virginia. OPAQ’s
Zero Trust Network Access (ZTNA)
cloud solution protects organizations’
distributed networks – from data cen-
ters, to branch offices, to remote users,
and Internet of Things (IoT) devices.
Ken Xie, Founder, Chairman of the
Board, and CEO, Fortinet, said, “The
recent SASE market momentum further
validates our Security-driven Network-
ingapproachandunderscoreswhatwe’ve
beensayingforyears.Inthiseraofhyper-
connectivity and expanding networks;
with the network edge stretching across
the entire digital infrastructure, network-
ing and security must converge. In fact,
the acquisition of OPAQ further enhanc-
es our existing SASE offering enabling
Fortinet to deliver the most complete
SASE platform on the market. The For-
tinet SASE platform delivers the broadest
security and industry-leading SD-WAN
and networking offerings that can all
be delivered to customers and partners
through a flexible, cost efficient and pat-
ented zero-trust cloud architecture.”
Fortinet’s Security Fabric combined
with OPAQ’s patented ZTNA solution
enhances Fortinet’s existing SASE of-
fering to form the best-in-class SASE
cloud security platform with the indus-
try’s only true Zero Trust access and
security by providing industry-leading
next-generation firewall and SD-WAN
capabilities, web security, sandboxing,
advanced endpoint, identity / multi
factor authentication, multi-cloud
workload protection, cloud applica-
tion security broker (CASB), browser
isolation, and web application firewall-
ing capabilities.
Moreover, OPAQ’s platform is purpose
built to be partner friendly, empower-
ing MSSPs, carriers and high value-add
Nexthink has launched the next gener-
ation of its platform: Nexthink Experi-
ence. Nexthink Experience is the only
cloud-native solution that combines
real-time analytics, employee feedback
and automated remediation, empower-
ing IT teams to continuously improve
employees’digitalexperiences.Giventhe
currentworkingenvironment,providing
a better digital experience to employees
has never been more critical. In fact, 78%
of IT leaders report it’s a top priority on
their agenda – up 30% from one year
ago, according to a recent research. And
Nexthink Experience is built to help de-
liveronthisprioritybyenablingITteams
to provide great experience to employees
no matter where they are working.
partners to easily integrate the SASE
multi-tenant platform into their own
offering and add value to business and
government organization customers
with their Network Operations Center
and Security Operations Center exper-
tise and advanced professional services.
The integration of Fortinet’s broad Secu-
rity Fabric with OPAQ’s cloud platform
will offer customers and partners even
more choices in how they can consume
best-of-breed security.
With the OPAQ acquisition, Fortinet
will deliver:
• The best of scalability, performance,
and security compared to any cloud se-
curity vendor.
• One-of-a-kind ZTNA solution with
continuous security innovation at scale,
leveraging Fortinet’s top-notch R&D
talent to deliver security substance “un-
der the hood”.
• Security and networking fully integrat-
ed, including Fortinet’s industry-leading
SD-WAN, furthering the company’s Se-
curity-driven Networking approach.
• The most partner-friendly ZTNA of-
fering in the market that remains true
to Fortinet’s ongoing commitment to its
valued partners.
Financial terms of the deal were not
disclosed.
ployees’ digital experience, focusing
on how IT is consumed by employees
and not just how it is delivered by the
IT department:
•Digital Experience Score quantifies
employee experience by collecting
hundreds of technical metrics and
correlating them with employee
sentiment
•IssueRank delivers prioritized recom-
mendations on what issues to address
to deliver the greatest experience im-
provement
•CauseDetect uses artificial intelli-
gence to analyze up to millions of data
points to effortlessly pinpoint the like-
ly root causes
The acquisition enhances Fortinet’s existing SASE offering
to deliver the most complete SASE platform on the market.
ThenewplatformtoempowerITteamstoshiftfromreactiveproblemsolvingtoproactiveoptimization.
Ken Xie, Fortinet
>> From page 1
would seek to formalize mutually ben-
eficial commercial arrangements similar
to those currently in place. This includes
go-to-market, services, research and
development, and intellectual property
agreements between Dell Technologies
and VMware, providing ongoing stra-
tegic benefits and continued support for
customers of both companies following
any spin-off.
If it determines to pursue a spin-off, Dell
Technologies also expects to negotiate
and agree to certain related terms and
conditions with a special committee of
the Board of Directors of VMware and
the Board of Directors of VMware. In
that event Dell Technologies would look
to negotiate the payment of a special
cash dividend by VMware that would be
paid on a pro rata basis to all VMware
shareholders.
It is important to Dell Technologies that
both companies have appropriate capital
structures immediately following any
spin-off. Dell Technologies’ goal would
be to maintain VMware’s credit rating
of investment grade and improve Dell
Technologies’ credit rating at the time
of or shortly following a potential spin-
off and accelerate the timeline through
which Dell Technologies can achieve an
investment grade credit rating. Howev-
er, Dell Technologies can give no assur-
ance that any specific ratings would ulti-
mately be obtained for either company
in the event of a spin-off.
Dell Technologies
Explores VMware Spin-Off
Nexthink Experience provides an
employee-centric view of devices,
applications, and networks, enabling
IT professionals to see and proac-
tively solve problems faster. Central
to the new platform is Experience
Optimization, a ground-breaking set
of capabilities that provide clear, pri-
oritized guidance on how to improve
and optimize experience across an
organization. For the first time, IT
professionals can see what issues to
address first, understand the like-
ly causes, and remediate problems
quickly and effectively. This is all
brought together in a single Opti-
mization Hub allowing IT teams to
monitor, measure and manage em-
•Playbooks provide step-by-step
guidance to address the identified
issues, incorporating data gather-
ing and automateda remediation via
Nexthink Engage and Nexthink Act
to resolve common problems
“IT teams have changed their roles
during the last five years to become
proactive and much more employ-
ee-focused,” said Pedro Bados,
CEO and Co-Founder of Nexthink.
“Managing digital experience with
real-time visibility and employee
feedback is the right path for an IT
department to get proactive, saving
money and time. Nexthink Experi-
ence is the new platform born in the
Cloud and will fulfill this vision for
the IT departments of tomorrow.”
Nexthink Experience is generally
available.
For more information, please write to sales.value@redingtonmea.com
5
Palo Alto Networks Launches
World’s First ML-Powered NGFW
Nutanix Sheds Light On Smart
City Development Expectations
Nutanix has announced a new report
sponsored by Nutanix and compiled
by The Economist Intelligence Unit en-
titled ‘Accelerating urban intelligence:
People, business and the cities of to-
morrow’, which explores expectations
of citizens and businesses for smart-
city development in some of the world’s
major urban centres. While globally
smart cities have the common goal of
improving urban living, what this looks
like in action varies from place to place.
The study analyzes survey data from
over 7,700 residents and business ex-
ecutives in 19 large cities around the
world, including Dubai, UAE to reveal
how their priorities differ and align.
Responses differ from city to city, but
overall the study finds that citizens
want smart city initiatives to make
public services more affordable while
businesses want them to be more
efficient and reliable. Nearly as im-
portant for both groups, however, is
that smart initiatives produce green-
er, cleaner environments in which
to live and work. Many individual
demands of respondents—such as
more renewable energy options,
cleaner air and water, more efficient
waste recovery and smarter ener-
gy tariffing—all contribute to more
liveable environments for citizens
and workers alike.
Palo Alto Networks has introduced the
world’s first ML-Powered Next-Gener-
ation Firewall (NGFW), which embeds
machine learning (ML) in the core of
the firewall to proactively assist in intel-
ligently stopping
threats, securing
IoT devices, and
recommending se-
curity policies.
“Thirteen years
ago, we completely
changed network
security when
we created the
Next-Generation
Firewall,” said Nir
Zuk, Founder and
Chief Technology
Officer at Palo Alto
The Dubai findings of the study are
as below:
Top ways cities can improve their
development of smart initiatives –
Citizens of Dubai emphasise keeping
smart-city initiatives within budget
while businesses want public authori-
ties to plan for the long term and also
ensure new smart city services are easy
to use
Improving Affordability – Improving
the ability of energy and water utilities
to vary pricing according to usage is
the top expectation of citizens when it
comes to smart city programmes
The Green Imperative – One of the
UN’s Sustainable Development Goals
(SDGs) calls for all people to have “ac-
cess to affordable, reliable, sustainable
and modern energy”. This need is felt
especially keenly in emerging-world
cities such as Dubai
Most-desired benefits – When
probed on the most-desired benefits
from smart-city initiatives, residents
PAN-OS version
10.0 ushers in the
world’s first ML-
Powered NGFW,
which is continuously
learning and
proactively improving
security across
multiple fronts, so
security professionals
don’t just keep up but
get ahead.”
NGFW with PAN-OS 10.0 introduces
multiple industry firsts, including:
ML-Based In-line Malware and Phish-
ing Prevention: As attackers use ma-
chines to automatically morph attacks,
signatures become less valuable in pre-
venting these attacks. Previously, net-
work security products only used ma-
chine learning models for out-of-band
detection, but the Palo Alto Networks
ML-Powered NGFW now uses in-line
machine learning models to help pre-
vent previously unknown attacks.
Zero-DelaySignatureUpdates:Already
leading the industry in reducing the re-
action time for threats from days to min-
utes, Palo Alto Networks is now intro-
ducing zero-delay protection, resulting
in a 99.5% reduction in systems infected.
Anewstudy,sponsoredbyNutanix,analyzessurveydatafromover7,700residentsandbusinessexecutives
in19largecitiesaroundtheworld,includingDubai,UAEtorevealhowtheirprioritiesdifferandalign.
The ML-Powered Next-Generation Firewall (NGFW) to make security intelligent and proactive
— defending networks and IoT devices against most known and unknown threats instantly.
Aaron White, Nutanix
Networks. “As enterprise networks are
widening — with hybrid clouds, IoT
devices and home offices — and attacks
rapidly and automatically evolve, we
again need a radical new approach to
cybersecurity. PAN-
OS version 10.0
ushers in the world’s
first ML-Powered
NGFW, which is
continuously learn-
ing and proactively
improving securi-
ty across multiple
fronts, so security
professionals don’t
just keep up but get
ahead.”
Palo Alto Net-
works’ ML-Powered
ML-Based Integrated IoT Securi-
ty: The new Palo Alto Networks IoT
Security is powered by ML to deliver
complete device visibility, including
never-before-seen devices; highlight
anomalies and vulnerabilities; and
recommend appropriate security pol-
icies — all without the need for addi-
tional sensors or infrastructure.
ML-Based Security Policy: The
ML-Powered NGFW uses machine
learning to analyze vast amounts of
telemetry data, and then recommend
policies. With PAN-OS 10.0 and IoT
Security, customers will be able to
view and adopt the IoT Security pol-
icy recommendations for safe device
behavior. This will save time, reduce
the chance of human error, and help
secure IoT devices.
In addition, PAN-OS 10.0 introduces
the CN-Series, a containerized form
factor for the ML-Powered NGFW,
and 70 plus new capabilities, includ-
ing easier decryption, high availability
clustering, a new high-performance
hardware card, Threat Prevention and
DNS Security enhancements.
of Dubai emphasize creation of em-
ployment opportunities.
Fighting crime – Asked how smart-
city initiatives should create a health-
ier and safer environment, residents
of Dubai are more accepting of facial
recognition technology as a means of
fighting crime than those in, say, San
Francisco, Los Angeles or Copenhagen.
Attitudes towards big tech – Wheth-
er it’s smart-city projects that create
employment opportunities, improve
the innovation environment or create
business opportunities for local firms,
citizens and business executives in
Dubai are more likely than those in
more developed cities (especially San
Francisco) to view the involvement of
large technology companies as a high
priority.
Aaron White, Regional Sales Director,
Middle East at Nutanix said, “Adop-
tion of technologies such as IoT and
AI play a critical role in creating a
‘Smart City’. IoT based solutions en-
able innovative use cases to enlighten
smart cities and seamlessly integrate
various city management systems.
We are proud to be at the technolog-
ical forefront of making smart cities
smarter through Nutanix Xi IoT – a
software-based solution that delivers
AI-driven processing at the edge, sim-
plifies operations and powers real time
business insights.”
For more information, please write to sales.value@redingtonmea.com
6
57% of UAE IT Heads See Challenge In
Gaining Holistic Network Visibility: VMware
these are involved in the execution
of security, perhaps signaling that
networking teams are not seen as
having an equal role with the other
IT or security teams when it comes
to cybersecurity.
This is in stark contrast to the fact
that network transformation is seen
as being essential to delivering the
levels of resilience and security re-
quired by modern businesses, with
43% of European organizations say-
ing this is a key priority for them be-
tween 2019 to 2021.
Critically, organizations need
shared thinking and responsibili-
ties to establish a cohesive security
model if they are to deliver their
company’s strategic goals, seen
by Forrester as increased security
(33%), technological advancement
(67%) and the ability to respond
faster (33%) in the UAE.
Alongside the inconsistency in how
the role of the network in security
is perceived, there is a lack of co-
hesion within the IT and security
teams as to who is responsible for
network security.
“The network needs to be rec-
ognised as the DNA of any modern
security, cloud and app strategy, and
it should be seen as a strategic tool
and not merely the plumbing,” said
Amin Hanafieh, Country Manager,
UAE, VMware.
Given the increasing strategic fo-
cus on the network for delivering
connectivity, intrinsic security,
and app delivery, more than half
(57%) of UAE IT heads believe it
is really challenging to gain end-
to-end visibility of their network,
based on new global research by
VMware in partnership with For-
rester, and according to IDC, al-
most half say this lack of visibility
is a major concern. More than a
third (39%) feel the challenges as-
sociated with this lack of visibility
has resulted in misalignment be-
tween security and IT teams – and
another third (36%) have no plans
to implement a consolidated IT
and security strategy.
More than half (52%) of network-
ing teams in the UAE are current-
ly involved in the development
of security strategies. Yet, 76% of
IT and security teams in UAE underestimate the power of the network despite it driving connectivity, intrinsic security and app delivery.
powers employees to help make
better choices by providing them
with more intelligent, contextual,
and dynamic warnings of poten-
tially untrusted senders or con-
tent into emails.
Mimecast Acquires MessageControl
• The ability to prevent misad-
dressed email data leaks. Leverag-
ing the graph technology, Message-
Control is built to notify employees
before they accidentally send infor-
mation to the wrong recipients by
using historical sending patterns to
predict future anomalies.
Peter Bauer, Chief Executive Of-
ficer at Mimecast, said, “Message-
Control is a natural complement to
Mimecast’s suite of cyber resilience
solutions – from email and web
security through brand protec-
tion, security awareness training,
and data protection. Its artificial
intelligence and machine learning
capabilities will offer additional
layers of defense by evolving and
‘learning’ the customer environ-
ment and user behaviors over time.
We believe this acquisition allows
Mimecast to continue to evolve
our Email Security 3.0 strategy and
provide the best protection for pro-
ductivity cloud applications like
Microsoft 365.”
The acquisition bolsters Machine Learning and graph technology to increase
efficacy in the fight against advanced phishing and impersonation attacks.
Amin Hanafieh, VMware
Peter Bauer, Mimecast
We believe
this acquisition
allows Mimecast
to continue to
evolve our Email
Security 3.0
strategy and
provide the best
protection for
productivity cloud
applications like
Microsoft 365.”
Mimecast has announced that it has
acquired eTorch Inc. (d/b/a Mes-
sageControl), a messaging security
provider with solutions designed
to help stop social engineering and
human identity attacks with the
use of machine learning technol-
ogy. The acquisition of Message-
Control strengthens Mimecast’s
Email Security 3.0 strategy that is
designed to improve cybersecurity
at the email perimeter, inside the
organisation and beyond the pe-
rimeter. The powerful combination
of Mimecast and MessageControl
is engineered to provide customers
using productivity apps, such as
Microsoft 365, even stronger pro-
tection against advanced phishing
and impersonation attacks. Addi-
tionally, it is designed to prevent
the inadvertent loss of sensitive
and confidential data, while also
serving as an additional sensor to
further enrich Mimecast’s threat
intelligence.
The addition of MessageControl
brings the following key capabilities:
• Machine learning identification
of anomalous behaviours. Message-
Control’s graph technology is engi-
neered to inspect email attributes and
content and then apply ML to build a
library of known and unknown pat-
terns for an individual user.
• Contextual, real-time warnings
in email. MessageControl em-
For more information, please write to sales.value@redingtonmea.com
7
CrowdStrike has announced the re-
lease of the 2020 CrowdStrike Asia
Pacific and Japan (APJ) State of Cy-
bersecurity Report, produced by in-
dependent research firm StollzNow.
Commissioned by CrowdStrike, the
study surveyed 2,017 business lead-
ers in Australia, New Zealand, India,
Singapore, Philippines, Thailand,
Malaysia, Indonesia, Hong Kong and
Cohesity has announced a significant
expansion and updates for its partner
program, empowering service provid-
ers to leverage pay-per-use pricing for
Cohesity’s full suite of data manage-
ment services. The new pay-per-use
subscription model will provide even
greater predictability for partners as
they support enterprise and mid-mar-
ket end customers — ideal for orga-
nizations under increasing pressure
to reduce capital budgets during the
current global pandemic.
Through this model, service providers
only pay for the data management ser-
vices they use each month, instead of
committing to set blocks of capacity in
advance. The appeal of this approach is
that as business needs change, service
Cybersecurity Top Priority In COVID-19
Recovery: CrowdStrike Report
providers can make adjustments as
necessary, which provides maximum
levels of flexibility.
The offering comes as Cohesity con-
tinues to see exceptional growth and
momentum with service providers
around the world. Just in the last three
quarters, the number of service pro-
viders that have joined the company’s
partner program has more than dou-
bled. Highlighting the success of the
program, service provider revenues in
fiscal year 2020 grew 100 percent from
the first to the second quarter of FY
2020 and 87 percent from the second
quarter to the third quarter.
At the same time, Cohesity continues
to invest significantly in its cloud and
managed services business, offering
new innovations that include:
• DRaaS advancements: Simplified
disaster recovery as a service (DRaaS)
Cohesity Launches Consumption-Based
Subscription Pricing for MSP Partners
the way they interact or deliver
products and services to customers.
These results indicate a strong shift
and rapid investment into trans-
formation projects that move from
on-premises security solutions to
next generation cloud-native solu-
tions as organizations look to pro-
tect today’s distributed workforce.
As cybersecurity is front of mind
for budget allocation, many re-
spondents have recognized that
COVID-19 has brought on a mas-
sive increase in cyber threat behav-
ior. In fact, CrowdStrike observed
an increase in eCrime activity up
over 330% since the start of the year
versus in 2019. As business lead-
ers look forward and put the ini-
tial shock of the pandemic behind
them, the issues of solidifying a
deployments for multi-tenant envi-
ronments, helping to ensure faster
time to service delivery.
• Support for heterogeneous clusters:
Allowing service providers to fine-
tune their data management envi-
ronment to suit a variety of customer
workloads and service mix.
• Advancements with Helios: Enabling
service providers to manage their cus-
tomers’ global data estates, with deep
operational visibility.
“More companies are embracing a
consumption-based approach in or-
der to reduce capital costs and to
make adjustments on the fly as busi-
ness dictates,” said David Kosman,
Head of Global Cloud Service Pro-
viders, Cohesity. “We are making it
easier than ever for managed service
providers to meet enterprise and
mid-market customers where they
are and quickly evolve as the custom-
er journey progresses.”
Japan. The study found that amongst
those respondents who believe there
should be more investment in re-
mote working, the highest number
(74%) list enhancement of cyberse-
curity measures as a priority for ad-
ditional investment. Further, despite
a grim economic outlook, 65% ex-
pect technology budgets to increase.
The report indicates that many
organizations have experienced
digital transformation at an un-
precedented pace and scale across
business segments and operations,
as they have quickly moved to
mass remote working arrangements
during COVID-19 in order to sur-
vive. In fact, 44% of business leaders
surveyed said the pandemic acceler-
ated their move to cloud solutions,
while 82% say COVID-19 changed
secure digital transformation, pri-
oritizing and assigning budgets to
appropriate and most critical areas,
including cybersecurity training,
and protecting new supply chains
will need to be addressed.
“The COVID-19 pandemic may
have had the biggest impact on the
way organizations operate since the
introduction of office PCs. The re-
action of business leaders has been
impressive, but the speed and size of
change to a remote workforce led to
some inevitable gaps, particularly in
the cybersecurity of organizations,”
said Andrew Littleproud, Vice Pres-
ident, APJ at CrowdStrike. “Our
findings show that respondents
understand these gaps and expect
to address them in the recovery, go-
ing beyond ‘good enough’ security
measures to ensure their employ-
ees remain secure against sophis-
ticated threat activity regardless of
where they are located. In the new
business normal, it will be vital to
implement solutions that can be
quickly deployed at scale to detect
new threats, adhere to new regula-
tions, and leverage the cloud so they
can be easily managed remotely.”
Despite severe economic downturn, organizations expect increased technology
budgets to support escalated digital transformation in today’s new business normal.
Pay per use (PPU) model ensures predictable pricing and lowers operating costs for Managed Service Provider (MSP) partners.
For more information, please write to sales.value@redingtonmea.com
8
Veeam Software has announced new
enhancements to its ProPartner Pro-
gram for Value-Added Resellers
(VARs) across EMEA. By driving in-
creased engagement from active part-
ners across the region, the new compe-
tencies will reward and better support
partners in serving customers’ evolving
needs, help them become specialists in
their markets, and demonstrate com-
petitive advantage.
As EMEA businesses continue to move
towards Digital Transformation, part-
ners are broadening their portfolios
and becoming strategic digital advisors
to their customers.
To support its partners through this
transition, Veeam has enhanced its
ProPartner Program to ensure Plat-
inum, Gold, Silver and registered
partners are all appropriately sup-
ported and rewarded, creating a truly
partner-friendly program. Through
a points-based system, Veeam will
reward partners for successfully pro-
gressing through the program’s new
competencies. The benefits of this
program will evolve, but initially, the
current offering converts earned points
to incentive rebates, a free seat at the
Veeam Certified Engineering (VMCE)
partner training course or free atten-
dance at VeeamON 2021.
“Veeam’s go-to-market strategy is 100%
channel, and we are empowering all of
our partners to thrive in the evolving
business landscape and better respond
to customer demands,” said Daniel
Fried, GM and SVP, EMEA and World-
wide Channels, Veeam. “As businesses
continue to pursue Digital Transforma-
tion and embrace Cloud Data Manage-
ment, we want to help our partners add
greater value and build more strategic
relationships with our joint customers.
Working closely with our partners to
achieve a greater understanding of Vee-
am solutions will help VARs stand out
from the crowd, offer new services that
drive profitability and growth, and con-
tinue to adapt to and support increas-
ingly complex IT environments.”
Kaspersky’sNewVPNSecure
ConnectionEnsuresUserPrivacy
Veeam Announces New Competencies To
EMEA ProPartner Program Veeam’s enhanced ProPartner Program
will help partners increase proficien-
cy in Veeam’s portfolio, expand their
knowledge of the firm’s integration with
Technology Alliance Partners, and de-
velop additional technical skills to de-
liver value-added professional services.
Key enhancements to the Veeam
ProPartner Program for VARs include
the introduction of several new com-
petencies such as enablement, which
will reward partners for increasing
their sales and technical expertise and
obtaining additional Veeam Certi-
fied Engineer (VMCE), Veeam Sales
Professional (VMSP), Veeam Techni-
cal Sales Professional (VMTSP) and
Veeam Certified Architect (VMCA)
certifications. Recurring sales com-
petency will reward partners that are
supporting businesses in moving to
subscription-based IT services while
the Velocity competency will help
partners to grow their business faster
by streamlining purchasing processes,
reaching untapped customer segments,
and enabling greater upsell and cross-
sell opportunities.
for a period of time, and without taking
the right precautions, the user may not
even know it has happened.
To ensure a user’s online privacy isn’t
accidentally compromised and to pre-
vent data being lost in such a situation,
Kaspersky VPN Secure Connection has
incorporated the ‘Kill Switch’ feature.
The new feature brings an extra layer of
protection while users browse the in-
ternet via a VPN. It eliminates any risks
to their data by automatically blocking
the device’s access to the internet until
the VPN connection is restored. The
purpose of this is to prevent confiden-
tial data from leaking through an inse-
cure network connection. After activat-
ing this feature, consumers don’t need
to worry about the possibility of details
regarding their internet activities being
obtained by third parties.
The new version of the solution also
provides an opportunity to access to
previously unavailable regional con-
tent. Today many online services can
tell where the user is because of an IP
address, and this can hold users back
from accessing important news or in-
formation on the internet.
For instance, you may not be able to
save money while shopping online or
booking tickets, or access certain vid-
eo streaming services in your region,
which often have content only avail-
able in particular countries. For fans of
streaming services such as Netflix, the
VPN’s borderless functionality means
they can now view global entertain-
ment content from regions outside
their own location. The solution hides
connection details from websites that
can track the user’s location, allowing
them to get private and secure access to
their favorite websites.
The new version of Kaspersky VPN
Secure Connection is available on PC,
Mac, Android and iOS devices. The
solution is available as a free and a
premium version. All the above-men-
tioned new functionalities are available
only in the premium version.
Kaspersky has extended data protec-
tion capabilities in the latest updates to
its premium version of Kaspersky VPN
Secure connection.The solution now
enhances users’ internet privacy by
shutting down all traffic from a device
if the VPN connection is lost. The new
version also allows users to access pre-
viously unavailable
online content.
According to
Kaspersky’s recent
report, Defending
digital privacy: tak-
ing personal pro-
tection to the next
level, a significant
number of people
say they apply ad-
ditional privacy
measures when
browsing the in-
ternet. Two-fifths (43%) do so to hide
their data from cybercriminals and
37% want to shield their data from the
websites they visit. One of the best ways
to protect online privacy and hide per-
sonal information from prying eyes is
to install a security solution like a VPN,
and the report reveals that they are al-
ready used by
40% of internet
users.
However, ensur-
ing the security
solution main-
tains user priva-
cy depends on
many external
factors. For in-
stance, if a user’s
internet connec-
tion is unstable, a
VPN might crash
The new feature brings an extra layer of protection while users browse the internet via a VPN.
New enhancements will help to further empower all committed EMEA partners as they
continue to support enterprises on their Digital Transformation journeys.
To ensure a
user’s online privacy
isn’t accidentally
compromised and to
prevent data being lost
in such a situation,
Kaspersky VPN
Secure Connection has
incorporated the ‘Kill
Switch’ feature.
Daniel Fried, Veeam
For more information, please write to sales.value@redingtonmea.com
9
that they do not give much thought
to whether the apps they use are
sanctioned by IT or not, as they just
want the job done.
Trend Micro’s Head in the Clouds
study looks into the psychology
of people’s behaviour in terms of
cybersecurity, including their atti-
tudes towards risk. It presents sev-
eral common information security
“personas” with the aim of helping
organizations tailor their cyberse-
curity strategy in the right way for
the right employee, including em-
ployees who take a conscientious,
fearful, ignorant, or ‘daredevil’ ap-
proach to cybersecurity.
Majd Sinan, Country Manager UAE
at Trend Micro, said, “A tailored
training programme that reflects
the UAE’s technologically-advanced
and mature approach, and that is
designed to cater for multicultural
employees, will likely be the most
effective one.”
Trend Micro has recently released
survey results that show how remote
workers address cybersecurity. More
than four fifths (82%) of remote work-
ers in the UAE say they are more con-
scious of their organization’s cyberse-
curity policies since lockdown began
in March, but many are breaking the
rules anyway due to limited under-
standing or resource constraints. The
UAE has since seen lockdown regu-
82% of UAE Remote Workers Have Gained
Cybersecurity Awareness: Trend Micro
non-work applications on a corpo-
rate device is a security risk.
However, just because most people
understand the risks does not mean
they stick to the rules.
58% of employees admit to using a
non-work application on a corpo-
rate device, although 38% had asked
permission from IT to do so. 39% of
them have actually uploaded corpo-
rate data to that application.
40% of respondents confess to us-
ing their work laptop for personal
browsing, and only 49% of them ful-
ly restrict the sites they visit.
36% of respondents say they often or
always access corporate data from a
personal device – almost certainly
breaking corporate security policy.
Productivity still wins out over pro-
tection for many users in the UAE.
A third of respondents (38%) agree
lations ease as organizations return
to work with new physical distancing
and hygiene precautions.
Trend Micro’s Head in the Clouds
study is distilled from interviews
with 13,200 remote workers across
27 countries, including 502 remote
working knowledge workers in the
UAE, on their attitudes towards cor-
porate cybersecurity and IT policies.
It reveals that there has never been
a better time for companies to take
advantage of heightened employee
cybersecurity awareness. The survey
reveals that the approach businesses
take to training is critical to ensure
secure practices are being followed.
The results indicate a high level of
security awareness in the UAE, with
88% of respondents claiming they
take instructions from their IT team
seriously, and 85% agree that cyber-
security within their organisation is
partly their responsibility. Addition-
ally, 79% acknowledge that using
Survey reveals users take security training seriously, but may still engage in risky behaviour.
Majd Sinan, Trend Micro
Imperva Unveils Cloud Data Security Solution
New SaaS offering provides customers with the fast path to security and compliance controls
over data in the cloud without halting digital transformation journeys.
Imperva has announced worldwide
availability of Cloud Data Security.
Delivered as a SaaS, Cloud Data Se-
curity gives businesses visibility and
compliance oversight for data hosted
in a database-as-a-service (DBaaS),
enabling compliance in minutes.
As companies accelerate their digital
transformation programs, many busi-
ness units move data into the cloud
without all the security controls neces-
sary to protect both their organization
and customers’ data. This leaves them
vulnerable to cyberattacks and with-
out evidence of compliance to data
protection regulations — resulting in
steep fines. Now, the onus is on secu-
rity teams to retroactively secure data
moved to the cloud, without getting in
the way of the business’s digital trans-
formation efforts. Alternatively, some
companies have delayed their digital
transformation programs due to con-
cerns about security risks thereby im-
pacting their business plans.
With Imperva Cloud Data Security, or-
ganizations can easily achieve both in-
creased business agility and reduced risk.
Cloud Data Security provides security
teams the ability to gain data visibili-
ty and compliance oversight, without
impeding the business’s digital trans-
formation programs. Because Cloud
Data Security is delivered as a SaaS,
customers can gain value in minutes
using automatic database discovery,
autonomous data classification, policy
violation alerts, as well as detection of
unusual data access powered by ma-
chine learning — all without exposing
database credentials or installing vir-
tual machines in their cloud environ-
ments. Cloud Data Security pairs de-
tection and response capabilities with
the audit readiness reporting required
to meet data compliance mandates.
“Organizations of all sizes are moving
business data to cloud DBaaS without
all the security controls which are re-
quired to maintain data protection
compliance. There is a critical need to
gain visibility to cloud data without
slowing down transformation proj-
ects,” said Steven Schoenfeld, Senior
Vice President of Product Manage-
ment at Imperva. “Cloud Data Secu-
rity is the perfect solution to fill this
need and immediately provide an-
swers to key questions of where criti-
cal data is and who is accessing it.”
Cloud Data Security is available now
as part of Imperva’s Data and Applica-
tion Security portfolio.
For more information, please write to sales.value@redingtonmea.com
10 For more information, please write to sales.value@redingtonmea.com
06 / 2020 | 11
@redingtonvalue
For more information, please write to sales.value@redingtonmea.com
11For more information, please write to sales.value@redingtonmea.com
06 / 2020 | 11
@redingtonvalue
When Threats
Are Limitless,
Your Defenses Must
Be Limitless.
SonicWall.com
© 2020 SonicWall, Inc.All rights reserved.

Contenu connexe

Tendances

Build and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCBuild and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCAmazon Web Services
 
Strategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based AnalyticsStrategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based AnalyticsCloudera, Inc.
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationSix Degrees
 
Cloudera Altus: Big Data in der Cloud einfach gemacht
Cloudera Altus: Big Data in der Cloud einfach gemachtCloudera Altus: Big Data in der Cloud einfach gemacht
Cloudera Altus: Big Data in der Cloud einfach gemachtCloudera, Inc.
 
Business Intelligence in the Cloud I
Business Intelligence in the Cloud IBusiness Intelligence in the Cloud I
Business Intelligence in the Cloud IRightScale
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions TechniquesClub Cloud des Partenaires
 
Snowflake: The Good, the Bad and the Ugly
Snowflake: The Good, the Bad and the UglySnowflake: The Good, the Bad and the Ugly
Snowflake: The Good, the Bad and the UglySamanthaBerlant
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseKristof Breesch
 
SAP Transformation: Cloud Advantage
SAP Transformation: Cloud AdvantageSAP Transformation: Cloud Advantage
SAP Transformation: Cloud AdvantageCapgemini
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaAccenture Italia
 
IT Service Management and Cloud Computing - AXELOS Webinar
IT Service Management and Cloud Computing - AXELOS WebinarIT Service Management and Cloud Computing - AXELOS Webinar
IT Service Management and Cloud Computing - AXELOS WebinarAXELOS Global Best Practice
 
Achieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
Achieve Economic Synergies by Managing Your Enterprise Assets In The CloudAchieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
Achieve Economic Synergies by Managing Your Enterprise Assets In The CloudDr. HJ Raza, Ph.D/MBA
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCAmazon Web Services
 
DCI NetApp Benefits
DCI NetApp BenefitsDCI NetApp Benefits
DCI NetApp BenefitsMainstay
 

Tendances (20)

Build and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWCBuild and Innovate on Cloud - PWC
Build and Innovate on Cloud - PWC
 
Redington Value Journal - September 2018
Redington Value Journal - September  2018Redington Value Journal - September  2018
Redington Value Journal - September 2018
 
Strategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based AnalyticsStrategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based Analytics
 
The business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformationThe business value of Microsoft Azure and cloud transformation
The business value of Microsoft Azure and cloud transformation
 
Cloudera Altus: Big Data in der Cloud einfach gemacht
Cloudera Altus: Big Data in der Cloud einfach gemachtCloudera Altus: Big Data in der Cloud einfach gemacht
Cloudera Altus: Big Data in der Cloud einfach gemacht
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Forecast odcau1 100_posttech
Forecast odcau1 100_posttechForecast odcau1 100_posttech
Forecast odcau1 100_posttech
 
Business Intelligence in the Cloud I
Business Intelligence in the Cloud IBusiness Intelligence in the Cloud I
Business Intelligence in the Cloud I
 
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques2013.07.05   [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
2013.07.05 [IBM] Cloud Ecosystem Forum - Atelier Directions Techniques
 
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
 
Spc03570 usen
Spc03570 usenSpc03570 usen
Spc03570 usen
 
Steria case study
Steria case studySteria case study
Steria case study
 
Snowflake: The Good, the Bad and the Ugly
Snowflake: The Good, the Bad and the UglySnowflake: The Good, the Bad and the Ugly
Snowflake: The Good, the Bad and the Ugly
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital Enterprise
 
SAP Transformation: Cloud Advantage
SAP Transformation: Cloud AdvantageSAP Transformation: Cloud Advantage
SAP Transformation: Cloud Advantage
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
 
IT Service Management and Cloud Computing - AXELOS Webinar
IT Service Management and Cloud Computing - AXELOS WebinarIT Service Management and Cloud Computing - AXELOS Webinar
IT Service Management and Cloud Computing - AXELOS Webinar
 
Achieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
Achieve Economic Synergies by Managing Your Enterprise Assets In The CloudAchieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
Achieve Economic Synergies by Managing Your Enterprise Assets In The Cloud
 
The Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSCThe Journey to Digital Enterprise, presented by CSC
The Journey to Digital Enterprise, presented by CSC
 
DCI NetApp Benefits
DCI NetApp BenefitsDCI NetApp Benefits
DCI NetApp Benefits
 

Similaire à Value Journal - August 2020

Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing PptAnjoum .
 
Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Chindala Murali
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the CloudCognizant
 
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessJoel Katz
 
101_Customer_Move and Modernize Siebel_07012021.pptx
101_Customer_Move and Modernize Siebel_07012021.pptx101_Customer_Move and Modernize Siebel_07012021.pptx
101_Customer_Move and Modernize Siebel_07012021.pptxBhagavathyPadmanabha1
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the CloudCognizant
 
Engineering and Operational Services for Cloud Providers
Engineering and Operational Services for Cloud ProvidersEngineering and Operational Services for Cloud Providers
Engineering and Operational Services for Cloud ProvidersTechcello
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies
 
Array Networks Announces eCloud Plug-In for VMware vCenter Orchestrator (vCO)
Array Networks Announces eCloud Plug-In for VMware vCenter Orchestrator (vCO)Array Networks Announces eCloud Plug-In for VMware vCenter Orchestrator (vCO)
Array Networks Announces eCloud Plug-In for VMware vCenter Orchestrator (vCO) Array Networks
 
IRJET- Research Paper on AWS Cloud Infrastructure vs Traditional On-Premise
IRJET- Research Paper on AWS Cloud Infrastructure vs Traditional On-PremiseIRJET- Research Paper on AWS Cloud Infrastructure vs Traditional On-Premise
IRJET- Research Paper on AWS Cloud Infrastructure vs Traditional On-PremiseIRJET Journal
 
Dell Scalable Server Platforms
Dell Scalable Server PlatformsDell Scalable Server Platforms
Dell Scalable Server PlatformsLiamJohnson30
 
IDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudIDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudEMC
 
Engineering & operational services plug in for cloud providers
Engineering & operational services plug in for cloud providersEngineering & operational services plug in for cloud providers
Engineering & operational services plug in for cloud providerskanimozhin
 
Exploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital TransformationExploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital TransformationMaryJWilliams2
 

Similaire à Value Journal - August 2020 (20)

Cloud Computing
Cloud Computing Cloud Computing
Cloud Computing
 
Cloud Computing Ppt
Cloud Computing PptCloud Computing Ppt
Cloud Computing Ppt
 
Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01Cloudcomputingppt 12746363271272 Phpapp01
Cloudcomputingppt 12746363271272 Phpapp01
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the Cloud
 
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud Era
 
Leveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your BusinessLeveraging The Power Of The Cloud For Your Business
Leveraging The Power Of The Cloud For Your Business
 
101_Customer_Move and Modernize Siebel_07012021.pptx
101_Customer_Move and Modernize Siebel_07012021.pptx101_Customer_Move and Modernize Siebel_07012021.pptx
101_Customer_Move and Modernize Siebel_07012021.pptx
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the Cloud
 
Engineering and Operational Services for Cloud Providers
Engineering and Operational Services for Cloud ProvidersEngineering and Operational Services for Cloud Providers
Engineering and Operational Services for Cloud Providers
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 Minutes
 
Array Networks Announces eCloud Plug-In for VMware vCenter Orchestrator (vCO)
Array Networks Announces eCloud Plug-In for VMware vCenter Orchestrator (vCO)Array Networks Announces eCloud Plug-In for VMware vCenter Orchestrator (vCO)
Array Networks Announces eCloud Plug-In for VMware vCenter Orchestrator (vCO)
 
IRJET- Research Paper on AWS Cloud Infrastructure vs Traditional On-Premise
IRJET- Research Paper on AWS Cloud Infrastructure vs Traditional On-PremiseIRJET- Research Paper on AWS Cloud Infrastructure vs Traditional On-Premise
IRJET- Research Paper on AWS Cloud Infrastructure vs Traditional On-Premise
 
Dell Scalable Server Platforms
Dell Scalable Server PlatformsDell Scalable Server Platforms
Dell Scalable Server Platforms
 
Azure Migration .pptx
Azure Migration .pptxAzure Migration .pptx
Azure Migration .pptx
 
IDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private CloudIDC: Selecting the Optimal Path to Private Cloud
IDC: Selecting the Optimal Path to Private Cloud
 
Engineering & operational services plug in for cloud providers
Engineering & operational services plug in for cloud providersEngineering & operational services plug in for cloud providers
Engineering & operational services plug in for cloud providers
 
Exploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital TransformationExploring Software-Defined Storage in Digital Transformation
Exploring Software-Defined Storage in Digital Transformation
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 

Plus de Redington Value Distribution

Plus de Redington Value Distribution (20)

Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Value Journal - April-May 2021
Value Journal - April-May 2021 Value Journal - April-May 2021
Value Journal - April-May 2021
 
Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
 
Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
 
Redington Value journal - August 2019
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
 
Redington Value Journal - July 2019
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
 
Redington Value Journal - June 2019
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 

Dernier

How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Salesforce Education Cloud - A Complete Guide.pdf
Salesforce Education Cloud - A Complete Guide.pdfSalesforce Education Cloud - A Complete Guide.pdf
Salesforce Education Cloud - A Complete Guide.pdfHarryJohnson78
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers referencessuser2c065e
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 

Dernier (20)

How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Salesforce Education Cloud - A Complete Guide.pdf
Salesforce Education Cloud - A Complete Guide.pdfSalesforce Education Cloud - A Complete Guide.pdf
Salesforce Education Cloud - A Complete Guide.pdf
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
Excvation Safety for safety officers reference
Excvation Safety for safety officers referenceExcvation Safety for safety officers reference
Excvation Safety for safety officers reference
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 

Value Journal - August 2020

  • 1. Issue 47 // August 2020 Redington Value is a value added distributor for the following brands in parts of Middle East & Africa To benefit team members, customers and partners with industry leading solutions, in the event of a spin-off, Dell Technologies will seek to maintain the mutually beneficial strategic relationship currently in place with VMware. Dell Technologies Explores VMware Spin-Off Dell Technologies is exploring a po- tential spin-off of its 81% equity own- ership interest in VMware. Although this exploration is in an early stage, Dell Technologies believes a spin-off could benefit both Dell Technologies and VMware shareholders, team mem- bers, customers and partners by sim- plifying capital structures and creating additional long-term enterprise value. Any potential spin-off would not occur prior to September 2021 and would be intended to qualify as tax-free for U.S. federal income tax purposes. Additionally, Dell Technologies contin- ues to evaluate a range of strategic op- tions concerning its ownership interest in VMware, including maintaining its current ownership in the company. “The strategic relationship between Dell Technologies and VMware has never been stronger,” said Michael Dell, Chair- man and Chief Executive Officer, Dell Technologies. “For more than 20 years, we’ve innovated for our customers and created substantial growth and value for both companies and our teams. Re- >> Continued on page 3 >> Continued on page 4 gardless of the options we are exploring to create additional value, we are accel- erating our strategy - which remains unchanged. We are focused on winning in the consolidating markets where we operate and innovating across the Dell Technologies portfolio to create inte- grated solutions that turn data into in- sights and action.” As part of its exploration of a potential spin-off, Dell Technologies expects it AWS IoT SiteWise makes it easy to collect, organize, and monitor data from industrial equipment at scale. AWS Announces General Availability of AWS IoT SiteWise SiteWise makes it easier for customers to collectdatafromtheplantfloor,structure and label the data, and generate real-time metrics. In SiteWise, customers begin by modeling their industrial equipment, processes,andfacilitiesbyaddingcontext (e.g.equipmenttypeandfacilitylocation) to the collected data, and defining com- mon industrial performance metrics (e.g. overall equipment effectiveness and up- time) on top of the data using SiteWise’s built-in library of mathematical func- tions. Once a customer’s environment is modeled and their data ingested into AWS, the service automatically computes the metrics at the interval defined by the customer(e.g.reportuptimeeveryhour). All uploaded data and computed metrics are sent to a fully managed time series database, which is uniquely designed to storeandretrievetime-stampeddatawith low latency, making it significantly easier for customers to analyze equipment per- formance over time. From within the A mazonWebServices(AWS), an Amazon.com company, has announced the general availability of AWS IoT Site- Wise,amanagedservicethatcollectsdata from the plant floor, structures and labels the data, and generates real-time key per- formance indicators (KPIs) and metrics to help industrial customers make better, data-drivendecisions.Customerscanuse SiteWise to monitor operations across facilities, quickly compute industrial performance metrics, create applications that analyze industrial equipment data to prevent costly equipment issues, and re- duce gaps in production. This allows cus- tomers to collect data consistently across devices, identify issues with remote mon- itoring more quickly, and improve multi- site processes with centralized data. Michael Dell, Dell Technologies
  • 2. AD VEEAM BACKUP FOR O365 Value Proposition: Microsoft Office 365 enables your enterprise to work anywhere,anytime,without the need to host your own email,files and SharePoint infrastructure.Even though Microsoft hosts the infrastructure,this doesn’t replace your responsibility to backup business-critical Office 365 data. With Office 365, it's your data — you control it — and it is your responsibility to protect it. FEATURES • Protect your Office 365 data from accidental deletion, security threats and retention policy gaps • Quickly restore individual Office 365 email, files and sites with industry-leading recovery flexibility • Meet legal and compliance requirements with efficient eDiscovery of Office 365 items. www.redingtonvalue.com sales.value@redingtonmea.com H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE
  • 3. For more information, please write to sales.value@redingtonmea.com 3 HPE To Drive Edge-to-Cloud Strategy With Acquisition Of Silver Peak Oracle Announces Oracle Dedicated Region Cloud@Customer Silver Peak’s simple, intuitive ‘self-driving’ WAN delivers significant cost savings while maintaining application performance for rapid business recovery in a post COVID-19 world. Industry’s first fully managed cloud region brings 100% of Oracle’s public cloud services, including Oracle Autonomous Database and Cloud applications, to customer data centers. Hewlett Packard Enterprise (HPE) has entered into a definitive agree- ment to acquire Silver Peak, an SD- WAN (Software-Defined Wide Area Network) player, in a transaction valued at $925 million. Silver Peak will be combined with HPE’s Aruba business unit and will extend Aruba’s technology leadership in the large and fast-growing SD-WAN space. “HPE was an early mover in identi- fying the opportunity at the edge and that trend is accelerating in a post- Oracle has announced Oracle Dedi- cated Region Cloud@Customer, the industry’s first fully-managed cloud re- gion that brings all of the vendor’s sec- ond-generation cloud services, includ- COVID world,” said Antonio Neri, President and CEO of HPE. “With this acquisition we are accelerating our edge-to-cloud strategy to pro- vide a true distributed cloud model and cloud experience for all apps and data wherever they live. Silver Peak’s innovative team and technolo- gy bring critical capabilities that will help our customers modernize and transform their networks to securely connect any edge to any cloud.” Silver Peak’s advanced SD-WAN of- ferings are highly complementary and strengthen Aruba’s Edge Ser- vice Platform (ESP). By combining Silver Peak’s SD-WAN with Aruba’s SD-Branch solutions customers can simplify branch office and WAN deployments to empower remote workforces, enable cloud-connected distributed enterprises, and trans- form business operations without compromising quality or reliability. Legacy WAN architectures are no longer viable and incur relatively high costs, compelling enterprises to invest in SD-WAN technology to ensure secure, scalable, and effi- cient connections from the edge of their network to a diverse mix of on-premises and cloud-based end- points. The combination of Aruba’s all-in-one SD-Branch strategy and remote worker solutions with Silver Peak’s SD-WAN and WAN optimiza- tion offerings will allow HPE to bet- ter address a greater set of customer requirements and capitalize on this market opportunity. The companies expect the combina- tion to create opportunities for sig- nificant economic upside through enhanced growth and profitability by: • Providing a superior value prop- osition to joint customers through integrated offerings that addresses a greater set of customer requirements • Targeting an expanded TAM across SD-WAN and SD-Branch imple- mentations • Accelerating WAN transformations across HPE and Aruba’s broad global customer base Oracle is making all of its cloud ser- vices — more than 50 services — available on-premises so enterprises can use Oracle’s cloud services wher- ever they need them – in the cloud or on-premises via Cloud@Customer. “Enterprise customers have told us that they want the full experience of a public cloud on-premises, including access to all of Oracle’s cloud services, to run their most important work- loads,” said Clay Magouyrk, Executive Vice President of Engineering, Oracle Cloud Infrastructure. “With Oracle Dedicated Region Cloud@Customer, SiteWiseconsole,customerscanalsocre- atecustomwebapplications(withoutany coding) to visualize key metrics across end-user devices in near real-time. These portable web applications can help cus- tomers monitor equipment performance on any web-enabled desktop, tablet, or phone to spot anomalies, helping them reduce waste, make faster decisions, and optimize their plant performance. Dirk Didascalou, Vice President of IoT, AWS, said, “With SiteWise, industrial customers can now use the power of AWS to collect, organize, and monitor their industrial equipment data at scale. SiteWise will help industrial customers move beyond data collection and enable them to visualize and monitor all their equipment, so they can focus on their main job of optimizing their operations.” In addition to using software running on an edge device, SiteWise provides interfaces for collecting data from mod- ern industrial applications through MQ Telemetry Transport (MQTT) messages or its Application Programming Inter- face (APIs). SiteWise is now available in the US East (N. Virginia), US West (Or- egon), Europe (Frankfurt), and Europe (Ireland) AWS regions, with additional regions coming soon. AWS Announces General Availability of AWS IoT SiteWise >> From page 1 Antonio Neri, HPE enterprises get all of our second-gen- eration cloud services, including Autonomous Database, in their data centres. Our major competitors can’t offer customers a comparable dedicat- ed cloud region running on-premises.” Oracle Dedicated Region Cloud@Cus- tomer includes full management capabil- ities and access to new features and func- tions the moment they become available inOracle’spubliccloud.Itprovidesstrong isolation of customer data, including all API operations, which remain local to customer data centres and provide the highest levels of security. Additionally, Oracle Dedicated Region Cloud@Cus- tomer is certified to seamlessly run Or- acle Cloud applications, including Oracle Fusion Cloud Applications (Cloud ERP, Cloud HCM, Cloud SCM, and Cloud CX, making it a completely integrated cloud experience on-premises. Custom- ers only pay for services they consume using the same predictable low pricing offeredinOracle’spubliccloudregions. ing Autonomous Database and Oracle Cloud applications, to customer data centres, starting at only $500K a month. With this offering, enterprises get the exact same complete set of modern cloud services, APIs, industry-leading SLAs, superior price-performance, and highest levels of security available from Oracle’s public cloud regions in their own data centres. This is ideal for highly regulated or security-focused businesses needing to meet demand- ing latency and data residency re- quirements, reduce operational costs, and modernise legacy applications.
  • 4. For more information, please write to sales.value@redingtonmea.com 4 NexthinkLaunchesExperiencePlatform Fortinet Acquires Cloud Security and Networking Innovator OPAQ Networks Fortinet has announced that it has ac- quired OPAQ Networks, a Secure Ac- cess Service Edge (SASE) cloud provid- er based in Herndon, Virginia. OPAQ’s Zero Trust Network Access (ZTNA) cloud solution protects organizations’ distributed networks – from data cen- ters, to branch offices, to remote users, and Internet of Things (IoT) devices. Ken Xie, Founder, Chairman of the Board, and CEO, Fortinet, said, “The recent SASE market momentum further validates our Security-driven Network- ingapproachandunderscoreswhatwe’ve beensayingforyears.Inthiseraofhyper- connectivity and expanding networks; with the network edge stretching across the entire digital infrastructure, network- ing and security must converge. In fact, the acquisition of OPAQ further enhanc- es our existing SASE offering enabling Fortinet to deliver the most complete SASE platform on the market. The For- tinet SASE platform delivers the broadest security and industry-leading SD-WAN and networking offerings that can all be delivered to customers and partners through a flexible, cost efficient and pat- ented zero-trust cloud architecture.” Fortinet’s Security Fabric combined with OPAQ’s patented ZTNA solution enhances Fortinet’s existing SASE of- fering to form the best-in-class SASE cloud security platform with the indus- try’s only true Zero Trust access and security by providing industry-leading next-generation firewall and SD-WAN capabilities, web security, sandboxing, advanced endpoint, identity / multi factor authentication, multi-cloud workload protection, cloud applica- tion security broker (CASB), browser isolation, and web application firewall- ing capabilities. Moreover, OPAQ’s platform is purpose built to be partner friendly, empower- ing MSSPs, carriers and high value-add Nexthink has launched the next gener- ation of its platform: Nexthink Experi- ence. Nexthink Experience is the only cloud-native solution that combines real-time analytics, employee feedback and automated remediation, empower- ing IT teams to continuously improve employees’digitalexperiences.Giventhe currentworkingenvironment,providing a better digital experience to employees has never been more critical. In fact, 78% of IT leaders report it’s a top priority on their agenda – up 30% from one year ago, according to a recent research. And Nexthink Experience is built to help de- liveronthisprioritybyenablingITteams to provide great experience to employees no matter where they are working. partners to easily integrate the SASE multi-tenant platform into their own offering and add value to business and government organization customers with their Network Operations Center and Security Operations Center exper- tise and advanced professional services. The integration of Fortinet’s broad Secu- rity Fabric with OPAQ’s cloud platform will offer customers and partners even more choices in how they can consume best-of-breed security. With the OPAQ acquisition, Fortinet will deliver: • The best of scalability, performance, and security compared to any cloud se- curity vendor. • One-of-a-kind ZTNA solution with continuous security innovation at scale, leveraging Fortinet’s top-notch R&D talent to deliver security substance “un- der the hood”. • Security and networking fully integrat- ed, including Fortinet’s industry-leading SD-WAN, furthering the company’s Se- curity-driven Networking approach. • The most partner-friendly ZTNA of- fering in the market that remains true to Fortinet’s ongoing commitment to its valued partners. Financial terms of the deal were not disclosed. ployees’ digital experience, focusing on how IT is consumed by employees and not just how it is delivered by the IT department: •Digital Experience Score quantifies employee experience by collecting hundreds of technical metrics and correlating them with employee sentiment •IssueRank delivers prioritized recom- mendations on what issues to address to deliver the greatest experience im- provement •CauseDetect uses artificial intelli- gence to analyze up to millions of data points to effortlessly pinpoint the like- ly root causes The acquisition enhances Fortinet’s existing SASE offering to deliver the most complete SASE platform on the market. ThenewplatformtoempowerITteamstoshiftfromreactiveproblemsolvingtoproactiveoptimization. Ken Xie, Fortinet >> From page 1 would seek to formalize mutually ben- eficial commercial arrangements similar to those currently in place. This includes go-to-market, services, research and development, and intellectual property agreements between Dell Technologies and VMware, providing ongoing stra- tegic benefits and continued support for customers of both companies following any spin-off. If it determines to pursue a spin-off, Dell Technologies also expects to negotiate and agree to certain related terms and conditions with a special committee of the Board of Directors of VMware and the Board of Directors of VMware. In that event Dell Technologies would look to negotiate the payment of a special cash dividend by VMware that would be paid on a pro rata basis to all VMware shareholders. It is important to Dell Technologies that both companies have appropriate capital structures immediately following any spin-off. Dell Technologies’ goal would be to maintain VMware’s credit rating of investment grade and improve Dell Technologies’ credit rating at the time of or shortly following a potential spin- off and accelerate the timeline through which Dell Technologies can achieve an investment grade credit rating. Howev- er, Dell Technologies can give no assur- ance that any specific ratings would ulti- mately be obtained for either company in the event of a spin-off. Dell Technologies Explores VMware Spin-Off Nexthink Experience provides an employee-centric view of devices, applications, and networks, enabling IT professionals to see and proac- tively solve problems faster. Central to the new platform is Experience Optimization, a ground-breaking set of capabilities that provide clear, pri- oritized guidance on how to improve and optimize experience across an organization. For the first time, IT professionals can see what issues to address first, understand the like- ly causes, and remediate problems quickly and effectively. This is all brought together in a single Opti- mization Hub allowing IT teams to monitor, measure and manage em- •Playbooks provide step-by-step guidance to address the identified issues, incorporating data gather- ing and automateda remediation via Nexthink Engage and Nexthink Act to resolve common problems “IT teams have changed their roles during the last five years to become proactive and much more employ- ee-focused,” said Pedro Bados, CEO and Co-Founder of Nexthink. “Managing digital experience with real-time visibility and employee feedback is the right path for an IT department to get proactive, saving money and time. Nexthink Experi- ence is the new platform born in the Cloud and will fulfill this vision for the IT departments of tomorrow.” Nexthink Experience is generally available.
  • 5. For more information, please write to sales.value@redingtonmea.com 5 Palo Alto Networks Launches World’s First ML-Powered NGFW Nutanix Sheds Light On Smart City Development Expectations Nutanix has announced a new report sponsored by Nutanix and compiled by The Economist Intelligence Unit en- titled ‘Accelerating urban intelligence: People, business and the cities of to- morrow’, which explores expectations of citizens and businesses for smart- city development in some of the world’s major urban centres. While globally smart cities have the common goal of improving urban living, what this looks like in action varies from place to place. The study analyzes survey data from over 7,700 residents and business ex- ecutives in 19 large cities around the world, including Dubai, UAE to reveal how their priorities differ and align. Responses differ from city to city, but overall the study finds that citizens want smart city initiatives to make public services more affordable while businesses want them to be more efficient and reliable. Nearly as im- portant for both groups, however, is that smart initiatives produce green- er, cleaner environments in which to live and work. Many individual demands of respondents—such as more renewable energy options, cleaner air and water, more efficient waste recovery and smarter ener- gy tariffing—all contribute to more liveable environments for citizens and workers alike. Palo Alto Networks has introduced the world’s first ML-Powered Next-Gener- ation Firewall (NGFW), which embeds machine learning (ML) in the core of the firewall to proactively assist in intel- ligently stopping threats, securing IoT devices, and recommending se- curity policies. “Thirteen years ago, we completely changed network security when we created the Next-Generation Firewall,” said Nir Zuk, Founder and Chief Technology Officer at Palo Alto The Dubai findings of the study are as below: Top ways cities can improve their development of smart initiatives – Citizens of Dubai emphasise keeping smart-city initiatives within budget while businesses want public authori- ties to plan for the long term and also ensure new smart city services are easy to use Improving Affordability – Improving the ability of energy and water utilities to vary pricing according to usage is the top expectation of citizens when it comes to smart city programmes The Green Imperative – One of the UN’s Sustainable Development Goals (SDGs) calls for all people to have “ac- cess to affordable, reliable, sustainable and modern energy”. This need is felt especially keenly in emerging-world cities such as Dubai Most-desired benefits – When probed on the most-desired benefits from smart-city initiatives, residents PAN-OS version 10.0 ushers in the world’s first ML- Powered NGFW, which is continuously learning and proactively improving security across multiple fronts, so security professionals don’t just keep up but get ahead.” NGFW with PAN-OS 10.0 introduces multiple industry firsts, including: ML-Based In-line Malware and Phish- ing Prevention: As attackers use ma- chines to automatically morph attacks, signatures become less valuable in pre- venting these attacks. Previously, net- work security products only used ma- chine learning models for out-of-band detection, but the Palo Alto Networks ML-Powered NGFW now uses in-line machine learning models to help pre- vent previously unknown attacks. Zero-DelaySignatureUpdates:Already leading the industry in reducing the re- action time for threats from days to min- utes, Palo Alto Networks is now intro- ducing zero-delay protection, resulting in a 99.5% reduction in systems infected. Anewstudy,sponsoredbyNutanix,analyzessurveydatafromover7,700residentsandbusinessexecutives in19largecitiesaroundtheworld,includingDubai,UAEtorevealhowtheirprioritiesdifferandalign. The ML-Powered Next-Generation Firewall (NGFW) to make security intelligent and proactive — defending networks and IoT devices against most known and unknown threats instantly. Aaron White, Nutanix Networks. “As enterprise networks are widening — with hybrid clouds, IoT devices and home offices — and attacks rapidly and automatically evolve, we again need a radical new approach to cybersecurity. PAN- OS version 10.0 ushers in the world’s first ML-Powered NGFW, which is continuously learn- ing and proactively improving securi- ty across multiple fronts, so security professionals don’t just keep up but get ahead.” Palo Alto Net- works’ ML-Powered ML-Based Integrated IoT Securi- ty: The new Palo Alto Networks IoT Security is powered by ML to deliver complete device visibility, including never-before-seen devices; highlight anomalies and vulnerabilities; and recommend appropriate security pol- icies — all without the need for addi- tional sensors or infrastructure. ML-Based Security Policy: The ML-Powered NGFW uses machine learning to analyze vast amounts of telemetry data, and then recommend policies. With PAN-OS 10.0 and IoT Security, customers will be able to view and adopt the IoT Security pol- icy recommendations for safe device behavior. This will save time, reduce the chance of human error, and help secure IoT devices. In addition, PAN-OS 10.0 introduces the CN-Series, a containerized form factor for the ML-Powered NGFW, and 70 plus new capabilities, includ- ing easier decryption, high availability clustering, a new high-performance hardware card, Threat Prevention and DNS Security enhancements. of Dubai emphasize creation of em- ployment opportunities. Fighting crime – Asked how smart- city initiatives should create a health- ier and safer environment, residents of Dubai are more accepting of facial recognition technology as a means of fighting crime than those in, say, San Francisco, Los Angeles or Copenhagen. Attitudes towards big tech – Wheth- er it’s smart-city projects that create employment opportunities, improve the innovation environment or create business opportunities for local firms, citizens and business executives in Dubai are more likely than those in more developed cities (especially San Francisco) to view the involvement of large technology companies as a high priority. Aaron White, Regional Sales Director, Middle East at Nutanix said, “Adop- tion of technologies such as IoT and AI play a critical role in creating a ‘Smart City’. IoT based solutions en- able innovative use cases to enlighten smart cities and seamlessly integrate various city management systems. We are proud to be at the technolog- ical forefront of making smart cities smarter through Nutanix Xi IoT – a software-based solution that delivers AI-driven processing at the edge, sim- plifies operations and powers real time business insights.”
  • 6. For more information, please write to sales.value@redingtonmea.com 6 57% of UAE IT Heads See Challenge In Gaining Holistic Network Visibility: VMware these are involved in the execution of security, perhaps signaling that networking teams are not seen as having an equal role with the other IT or security teams when it comes to cybersecurity. This is in stark contrast to the fact that network transformation is seen as being essential to delivering the levels of resilience and security re- quired by modern businesses, with 43% of European organizations say- ing this is a key priority for them be- tween 2019 to 2021. Critically, organizations need shared thinking and responsibili- ties to establish a cohesive security model if they are to deliver their company’s strategic goals, seen by Forrester as increased security (33%), technological advancement (67%) and the ability to respond faster (33%) in the UAE. Alongside the inconsistency in how the role of the network in security is perceived, there is a lack of co- hesion within the IT and security teams as to who is responsible for network security. “The network needs to be rec- ognised as the DNA of any modern security, cloud and app strategy, and it should be seen as a strategic tool and not merely the plumbing,” said Amin Hanafieh, Country Manager, UAE, VMware. Given the increasing strategic fo- cus on the network for delivering connectivity, intrinsic security, and app delivery, more than half (57%) of UAE IT heads believe it is really challenging to gain end- to-end visibility of their network, based on new global research by VMware in partnership with For- rester, and according to IDC, al- most half say this lack of visibility is a major concern. More than a third (39%) feel the challenges as- sociated with this lack of visibility has resulted in misalignment be- tween security and IT teams – and another third (36%) have no plans to implement a consolidated IT and security strategy. More than half (52%) of network- ing teams in the UAE are current- ly involved in the development of security strategies. Yet, 76% of IT and security teams in UAE underestimate the power of the network despite it driving connectivity, intrinsic security and app delivery. powers employees to help make better choices by providing them with more intelligent, contextual, and dynamic warnings of poten- tially untrusted senders or con- tent into emails. Mimecast Acquires MessageControl • The ability to prevent misad- dressed email data leaks. Leverag- ing the graph technology, Message- Control is built to notify employees before they accidentally send infor- mation to the wrong recipients by using historical sending patterns to predict future anomalies. Peter Bauer, Chief Executive Of- ficer at Mimecast, said, “Message- Control is a natural complement to Mimecast’s suite of cyber resilience solutions – from email and web security through brand protec- tion, security awareness training, and data protection. Its artificial intelligence and machine learning capabilities will offer additional layers of defense by evolving and ‘learning’ the customer environ- ment and user behaviors over time. We believe this acquisition allows Mimecast to continue to evolve our Email Security 3.0 strategy and provide the best protection for pro- ductivity cloud applications like Microsoft 365.” The acquisition bolsters Machine Learning and graph technology to increase efficacy in the fight against advanced phishing and impersonation attacks. Amin Hanafieh, VMware Peter Bauer, Mimecast We believe this acquisition allows Mimecast to continue to evolve our Email Security 3.0 strategy and provide the best protection for productivity cloud applications like Microsoft 365.” Mimecast has announced that it has acquired eTorch Inc. (d/b/a Mes- sageControl), a messaging security provider with solutions designed to help stop social engineering and human identity attacks with the use of machine learning technol- ogy. The acquisition of Message- Control strengthens Mimecast’s Email Security 3.0 strategy that is designed to improve cybersecurity at the email perimeter, inside the organisation and beyond the pe- rimeter. The powerful combination of Mimecast and MessageControl is engineered to provide customers using productivity apps, such as Microsoft 365, even stronger pro- tection against advanced phishing and impersonation attacks. Addi- tionally, it is designed to prevent the inadvertent loss of sensitive and confidential data, while also serving as an additional sensor to further enrich Mimecast’s threat intelligence. The addition of MessageControl brings the following key capabilities: • Machine learning identification of anomalous behaviours. Message- Control’s graph technology is engi- neered to inspect email attributes and content and then apply ML to build a library of known and unknown pat- terns for an individual user. • Contextual, real-time warnings in email. MessageControl em-
  • 7. For more information, please write to sales.value@redingtonmea.com 7 CrowdStrike has announced the re- lease of the 2020 CrowdStrike Asia Pacific and Japan (APJ) State of Cy- bersecurity Report, produced by in- dependent research firm StollzNow. Commissioned by CrowdStrike, the study surveyed 2,017 business lead- ers in Australia, New Zealand, India, Singapore, Philippines, Thailand, Malaysia, Indonesia, Hong Kong and Cohesity has announced a significant expansion and updates for its partner program, empowering service provid- ers to leverage pay-per-use pricing for Cohesity’s full suite of data manage- ment services. The new pay-per-use subscription model will provide even greater predictability for partners as they support enterprise and mid-mar- ket end customers — ideal for orga- nizations under increasing pressure to reduce capital budgets during the current global pandemic. Through this model, service providers only pay for the data management ser- vices they use each month, instead of committing to set blocks of capacity in advance. The appeal of this approach is that as business needs change, service Cybersecurity Top Priority In COVID-19 Recovery: CrowdStrike Report providers can make adjustments as necessary, which provides maximum levels of flexibility. The offering comes as Cohesity con- tinues to see exceptional growth and momentum with service providers around the world. Just in the last three quarters, the number of service pro- viders that have joined the company’s partner program has more than dou- bled. Highlighting the success of the program, service provider revenues in fiscal year 2020 grew 100 percent from the first to the second quarter of FY 2020 and 87 percent from the second quarter to the third quarter. At the same time, Cohesity continues to invest significantly in its cloud and managed services business, offering new innovations that include: • DRaaS advancements: Simplified disaster recovery as a service (DRaaS) Cohesity Launches Consumption-Based Subscription Pricing for MSP Partners the way they interact or deliver products and services to customers. These results indicate a strong shift and rapid investment into trans- formation projects that move from on-premises security solutions to next generation cloud-native solu- tions as organizations look to pro- tect today’s distributed workforce. As cybersecurity is front of mind for budget allocation, many re- spondents have recognized that COVID-19 has brought on a mas- sive increase in cyber threat behav- ior. In fact, CrowdStrike observed an increase in eCrime activity up over 330% since the start of the year versus in 2019. As business lead- ers look forward and put the ini- tial shock of the pandemic behind them, the issues of solidifying a deployments for multi-tenant envi- ronments, helping to ensure faster time to service delivery. • Support for heterogeneous clusters: Allowing service providers to fine- tune their data management envi- ronment to suit a variety of customer workloads and service mix. • Advancements with Helios: Enabling service providers to manage their cus- tomers’ global data estates, with deep operational visibility. “More companies are embracing a consumption-based approach in or- der to reduce capital costs and to make adjustments on the fly as busi- ness dictates,” said David Kosman, Head of Global Cloud Service Pro- viders, Cohesity. “We are making it easier than ever for managed service providers to meet enterprise and mid-market customers where they are and quickly evolve as the custom- er journey progresses.” Japan. The study found that amongst those respondents who believe there should be more investment in re- mote working, the highest number (74%) list enhancement of cyberse- curity measures as a priority for ad- ditional investment. Further, despite a grim economic outlook, 65% ex- pect technology budgets to increase. The report indicates that many organizations have experienced digital transformation at an un- precedented pace and scale across business segments and operations, as they have quickly moved to mass remote working arrangements during COVID-19 in order to sur- vive. In fact, 44% of business leaders surveyed said the pandemic acceler- ated their move to cloud solutions, while 82% say COVID-19 changed secure digital transformation, pri- oritizing and assigning budgets to appropriate and most critical areas, including cybersecurity training, and protecting new supply chains will need to be addressed. “The COVID-19 pandemic may have had the biggest impact on the way organizations operate since the introduction of office PCs. The re- action of business leaders has been impressive, but the speed and size of change to a remote workforce led to some inevitable gaps, particularly in the cybersecurity of organizations,” said Andrew Littleproud, Vice Pres- ident, APJ at CrowdStrike. “Our findings show that respondents understand these gaps and expect to address them in the recovery, go- ing beyond ‘good enough’ security measures to ensure their employ- ees remain secure against sophis- ticated threat activity regardless of where they are located. In the new business normal, it will be vital to implement solutions that can be quickly deployed at scale to detect new threats, adhere to new regula- tions, and leverage the cloud so they can be easily managed remotely.” Despite severe economic downturn, organizations expect increased technology budgets to support escalated digital transformation in today’s new business normal. Pay per use (PPU) model ensures predictable pricing and lowers operating costs for Managed Service Provider (MSP) partners.
  • 8. For more information, please write to sales.value@redingtonmea.com 8 Veeam Software has announced new enhancements to its ProPartner Pro- gram for Value-Added Resellers (VARs) across EMEA. By driving in- creased engagement from active part- ners across the region, the new compe- tencies will reward and better support partners in serving customers’ evolving needs, help them become specialists in their markets, and demonstrate com- petitive advantage. As EMEA businesses continue to move towards Digital Transformation, part- ners are broadening their portfolios and becoming strategic digital advisors to their customers. To support its partners through this transition, Veeam has enhanced its ProPartner Program to ensure Plat- inum, Gold, Silver and registered partners are all appropriately sup- ported and rewarded, creating a truly partner-friendly program. Through a points-based system, Veeam will reward partners for successfully pro- gressing through the program’s new competencies. The benefits of this program will evolve, but initially, the current offering converts earned points to incentive rebates, a free seat at the Veeam Certified Engineering (VMCE) partner training course or free atten- dance at VeeamON 2021. “Veeam’s go-to-market strategy is 100% channel, and we are empowering all of our partners to thrive in the evolving business landscape and better respond to customer demands,” said Daniel Fried, GM and SVP, EMEA and World- wide Channels, Veeam. “As businesses continue to pursue Digital Transforma- tion and embrace Cloud Data Manage- ment, we want to help our partners add greater value and build more strategic relationships with our joint customers. Working closely with our partners to achieve a greater understanding of Vee- am solutions will help VARs stand out from the crowd, offer new services that drive profitability and growth, and con- tinue to adapt to and support increas- ingly complex IT environments.” Kaspersky’sNewVPNSecure ConnectionEnsuresUserPrivacy Veeam Announces New Competencies To EMEA ProPartner Program Veeam’s enhanced ProPartner Program will help partners increase proficien- cy in Veeam’s portfolio, expand their knowledge of the firm’s integration with Technology Alliance Partners, and de- velop additional technical skills to de- liver value-added professional services. Key enhancements to the Veeam ProPartner Program for VARs include the introduction of several new com- petencies such as enablement, which will reward partners for increasing their sales and technical expertise and obtaining additional Veeam Certi- fied Engineer (VMCE), Veeam Sales Professional (VMSP), Veeam Techni- cal Sales Professional (VMTSP) and Veeam Certified Architect (VMCA) certifications. Recurring sales com- petency will reward partners that are supporting businesses in moving to subscription-based IT services while the Velocity competency will help partners to grow their business faster by streamlining purchasing processes, reaching untapped customer segments, and enabling greater upsell and cross- sell opportunities. for a period of time, and without taking the right precautions, the user may not even know it has happened. To ensure a user’s online privacy isn’t accidentally compromised and to pre- vent data being lost in such a situation, Kaspersky VPN Secure Connection has incorporated the ‘Kill Switch’ feature. The new feature brings an extra layer of protection while users browse the in- ternet via a VPN. It eliminates any risks to their data by automatically blocking the device’s access to the internet until the VPN connection is restored. The purpose of this is to prevent confiden- tial data from leaking through an inse- cure network connection. After activat- ing this feature, consumers don’t need to worry about the possibility of details regarding their internet activities being obtained by third parties. The new version of the solution also provides an opportunity to access to previously unavailable regional con- tent. Today many online services can tell where the user is because of an IP address, and this can hold users back from accessing important news or in- formation on the internet. For instance, you may not be able to save money while shopping online or booking tickets, or access certain vid- eo streaming services in your region, which often have content only avail- able in particular countries. For fans of streaming services such as Netflix, the VPN’s borderless functionality means they can now view global entertain- ment content from regions outside their own location. The solution hides connection details from websites that can track the user’s location, allowing them to get private and secure access to their favorite websites. The new version of Kaspersky VPN Secure Connection is available on PC, Mac, Android and iOS devices. The solution is available as a free and a premium version. All the above-men- tioned new functionalities are available only in the premium version. Kaspersky has extended data protec- tion capabilities in the latest updates to its premium version of Kaspersky VPN Secure connection.The solution now enhances users’ internet privacy by shutting down all traffic from a device if the VPN connection is lost. The new version also allows users to access pre- viously unavailable online content. According to Kaspersky’s recent report, Defending digital privacy: tak- ing personal pro- tection to the next level, a significant number of people say they apply ad- ditional privacy measures when browsing the in- ternet. Two-fifths (43%) do so to hide their data from cybercriminals and 37% want to shield their data from the websites they visit. One of the best ways to protect online privacy and hide per- sonal information from prying eyes is to install a security solution like a VPN, and the report reveals that they are al- ready used by 40% of internet users. However, ensur- ing the security solution main- tains user priva- cy depends on many external factors. For in- stance, if a user’s internet connec- tion is unstable, a VPN might crash The new feature brings an extra layer of protection while users browse the internet via a VPN. New enhancements will help to further empower all committed EMEA partners as they continue to support enterprises on their Digital Transformation journeys. To ensure a user’s online privacy isn’t accidentally compromised and to prevent data being lost in such a situation, Kaspersky VPN Secure Connection has incorporated the ‘Kill Switch’ feature. Daniel Fried, Veeam
  • 9. For more information, please write to sales.value@redingtonmea.com 9 that they do not give much thought to whether the apps they use are sanctioned by IT or not, as they just want the job done. Trend Micro’s Head in the Clouds study looks into the psychology of people’s behaviour in terms of cybersecurity, including their atti- tudes towards risk. It presents sev- eral common information security “personas” with the aim of helping organizations tailor their cyberse- curity strategy in the right way for the right employee, including em- ployees who take a conscientious, fearful, ignorant, or ‘daredevil’ ap- proach to cybersecurity. Majd Sinan, Country Manager UAE at Trend Micro, said, “A tailored training programme that reflects the UAE’s technologically-advanced and mature approach, and that is designed to cater for multicultural employees, will likely be the most effective one.” Trend Micro has recently released survey results that show how remote workers address cybersecurity. More than four fifths (82%) of remote work- ers in the UAE say they are more con- scious of their organization’s cyberse- curity policies since lockdown began in March, but many are breaking the rules anyway due to limited under- standing or resource constraints. The UAE has since seen lockdown regu- 82% of UAE Remote Workers Have Gained Cybersecurity Awareness: Trend Micro non-work applications on a corpo- rate device is a security risk. However, just because most people understand the risks does not mean they stick to the rules. 58% of employees admit to using a non-work application on a corpo- rate device, although 38% had asked permission from IT to do so. 39% of them have actually uploaded corpo- rate data to that application. 40% of respondents confess to us- ing their work laptop for personal browsing, and only 49% of them ful- ly restrict the sites they visit. 36% of respondents say they often or always access corporate data from a personal device – almost certainly breaking corporate security policy. Productivity still wins out over pro- tection for many users in the UAE. A third of respondents (38%) agree lations ease as organizations return to work with new physical distancing and hygiene precautions. Trend Micro’s Head in the Clouds study is distilled from interviews with 13,200 remote workers across 27 countries, including 502 remote working knowledge workers in the UAE, on their attitudes towards cor- porate cybersecurity and IT policies. It reveals that there has never been a better time for companies to take advantage of heightened employee cybersecurity awareness. The survey reveals that the approach businesses take to training is critical to ensure secure practices are being followed. The results indicate a high level of security awareness in the UAE, with 88% of respondents claiming they take instructions from their IT team seriously, and 85% agree that cyber- security within their organisation is partly their responsibility. Addition- ally, 79% acknowledge that using Survey reveals users take security training seriously, but may still engage in risky behaviour. Majd Sinan, Trend Micro Imperva Unveils Cloud Data Security Solution New SaaS offering provides customers with the fast path to security and compliance controls over data in the cloud without halting digital transformation journeys. Imperva has announced worldwide availability of Cloud Data Security. Delivered as a SaaS, Cloud Data Se- curity gives businesses visibility and compliance oversight for data hosted in a database-as-a-service (DBaaS), enabling compliance in minutes. As companies accelerate their digital transformation programs, many busi- ness units move data into the cloud without all the security controls neces- sary to protect both their organization and customers’ data. This leaves them vulnerable to cyberattacks and with- out evidence of compliance to data protection regulations — resulting in steep fines. Now, the onus is on secu- rity teams to retroactively secure data moved to the cloud, without getting in the way of the business’s digital trans- formation efforts. Alternatively, some companies have delayed their digital transformation programs due to con- cerns about security risks thereby im- pacting their business plans. With Imperva Cloud Data Security, or- ganizations can easily achieve both in- creased business agility and reduced risk. Cloud Data Security provides security teams the ability to gain data visibili- ty and compliance oversight, without impeding the business’s digital trans- formation programs. Because Cloud Data Security is delivered as a SaaS, customers can gain value in minutes using automatic database discovery, autonomous data classification, policy violation alerts, as well as detection of unusual data access powered by ma- chine learning — all without exposing database credentials or installing vir- tual machines in their cloud environ- ments. Cloud Data Security pairs de- tection and response capabilities with the audit readiness reporting required to meet data compliance mandates. “Organizations of all sizes are moving business data to cloud DBaaS without all the security controls which are re- quired to maintain data protection compliance. There is a critical need to gain visibility to cloud data without slowing down transformation proj- ects,” said Steven Schoenfeld, Senior Vice President of Product Manage- ment at Imperva. “Cloud Data Secu- rity is the perfect solution to fill this need and immediately provide an- swers to key questions of where criti- cal data is and who is accessing it.” Cloud Data Security is available now as part of Imperva’s Data and Applica- tion Security portfolio.
  • 10. For more information, please write to sales.value@redingtonmea.com 10 For more information, please write to sales.value@redingtonmea.com 06 / 2020 | 11 @redingtonvalue
  • 11. For more information, please write to sales.value@redingtonmea.com 11For more information, please write to sales.value@redingtonmea.com 06 / 2020 | 11 @redingtonvalue
  • 12. When Threats Are Limitless, Your Defenses Must Be Limitless. SonicWall.com © 2020 SonicWall, Inc.All rights reserved.