Ce diaporama a bien été signalé.
Le téléchargement de votre SlideShare est en cours. ×

Value Journal - March 2021

Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
Publicité
the 5G New Calling solution. This
solution harnesses IMS data channel
architecture and provides an enhanced
voice experien...
Learn more:
www.intel.com/xeonscalable
How do Intel®Technologies enable better cloud experiences?
The latest Intel innovat...
For more information, please write to sales.value@redingtonmea.com
3
Fortinet Delivers Major Updates
to FortiOS Operating ...
Publicité
Publicité
Chargement dans…3
×

Consultez-les par la suite

1 sur 12 Publicité

Value Journal - March 2021

Télécharger pour lire hors ligne

Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.

Key stories from the March Edition:
•Oracle Expands Hybrid Cloud Portfolio with Roving Edge Infrastructure
•Huawei Unveils New Solutions to Stimulate Growth in the Digital Economy
•Fortinet Delivers Major Updates to FortiOS Operating System
•Cisco Completes Acquisition of IMImobile
•Palo Alto Networks Launches NextWave 3.0
•Cambium Networks Unveils Gigabit Outdoor Point to Point Solution
•Check Point Software Launches Unified Security Solution Harmony
•Citrix Tackles Employee Well-Being
•CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads
•Kaspersky: DDoS Attacks in Q4 2020 Dropped by a Third Compared to Q3
•Nutanix Extends Ransomware Protections to Help Secure Customers’ IT Environments
•New Veeam Backup & Replication v11 Now Available
•VMware Refreshes vRealize Cloud Management
•Veritas Introduces NetBackup 9
•Ivanti Wavelink Expands Velocity Platform
•CyberArk Delivers New Identity Security Offerings to Drive Customer Success

Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.

Key stories from the March Edition:
•Oracle Expands Hybrid Cloud Portfolio with Roving Edge Infrastructure
•Huawei Unveils New Solutions to Stimulate Growth in the Digital Economy
•Fortinet Delivers Major Updates to FortiOS Operating System
•Cisco Completes Acquisition of IMImobile
•Palo Alto Networks Launches NextWave 3.0
•Cambium Networks Unveils Gigabit Outdoor Point to Point Solution
•Check Point Software Launches Unified Security Solution Harmony
•Citrix Tackles Employee Well-Being
•CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads
•Kaspersky: DDoS Attacks in Q4 2020 Dropped by a Third Compared to Q3
•Nutanix Extends Ransomware Protections to Help Secure Customers’ IT Environments
•New Veeam Backup & Replication v11 Now Available
•VMware Refreshes vRealize Cloud Management
•Veritas Introduces NetBackup 9
•Ivanti Wavelink Expands Velocity Platform
•CyberArk Delivers New Identity Security Offerings to Drive Customer Success

Publicité
Publicité

Plus De Contenu Connexe

Diaporamas pour vous (20)

Similaire à Value Journal - March 2021 (20)

Publicité

Plus par Redington Value Distribution (20)

Plus récents (20)

Publicité

Value Journal - March 2021

  1. 1. the 5G New Calling solution. This solution harnesses IMS data channel architecture and provides an enhanced voice experience with HD, visual, and interactive services. By using this solu- tion, operators can refine the 5G ser- vice experience, satisfy industry cus- tomer requirements, gain advantages, and achieve business success. Issue 53 // March 2021 Redington Value is a value added distributor for the following brands in parts of Middle East & Africa At MWC Shanghai 2021, the firm also launched the OptiX SuperSite solution for global operators. Huawei Unveils New Solutions to Stimulate Growth in the Digital Economy  the fourth industrial revolution. The cloud network provides continuous computing power for numerous in- dustries, stimulating new growth in the digital economy.    During the event, Huawei also launched the OptiX SuperSite solution for glob- al operators. Richard Jin, President of  Huawei’s Transmission & Access Product Line, said, “OptiX SuperSite is how industry and home users get connected at a high-speed level. It also presents an opportunity for operators to benefit from the enterprise market and enhance home broadband experience.”   Separately, Xinyan Coal Mine, Shanxi Mobile, and  Huawei  jointly released a 5GtoB kite-like solution for public net- work integrated non-public networks (PNI-NPN). The solution provides high-performance, high reliability 5G networksthatfunctionthroughacombi- nation of private and public networks. It also aims to accelerate the development of the 5G industry and increase the value of 5G for businesses, ultimately creating momentum in the digital economy.   Additionally, during the summit, Chi- na Mobile and Huawei jointly unveiled >> Continued on page 4 New solution enables secure, scalable cloud services wherever customers need them, even in the most remote areas of the world. Oracle Expands Hybrid Cloud Portfolio with Roving Edge Infrastructure Kevin Hu, Huawei  O racle has expanded its hy- brid cloud portfolio with Oracle Roving Edge Infra- structure,anewofferingthat brings core infrastructure services to the edge with Roving Edge Devices (REDs) – ruggedized, portable, scalable server nodes. Using Oracle Roving Edge Infra- structure, organizations can run cloud workloadswherevertheyneedthem,even in the world’s most remote locations. The new service is part of Oracle’s comprehensive hybrid cloud portfolio, At MWC Shanghai 2021, Kevin Hu, President of Huawei Data Communi- cation Product Line, announced the ‘five ones’ new capabilities of the In- telligent cloud network solution —one hop to cloud, one-network wide con- nection, one-click fast scheduling, one fiber for multiple purposes, and one- stop integrated security. This solution helps carriers build cloud-oriented service networks and core capabilities for DICT transformation.   According to Kevin Hu, the cloud net- work is the key enabler in the digital economy, bringing new impetus for cloud image which provides customers with more flexibility and control over their cloud deployments than other vendors. “Customers want choice when it comes to running workloads in the cloud. Each customer has different requirements basedondatasovereignty,scale,orwant- ing the full experience of a public cloud on-premises with all of Oracle’s cloud services. Oracle Roving Edge Infrastruc- ture is the latest example, delivering core infrastructure services to remote loca- tions,” said Clay Magouyrk, Executive Vice President, Oracle Cloud Infrastruc- ture. “Oracle’s hybrid cloud portfolio es- sentially delivers a cloud region wherev- er and however a customer needs it.” Oracle Roving Edge Infrastructure delivers core infrastructure services,
  2. 2. Learn more: www.intel.com/xeonscalable How do Intel®Technologies enable better cloud experiences? The latest Intel innovations start with the processor, but also extend beyond the processor to memory, storage and networking. As a result, 2nd Gen Intel® Xeon® Scalable processor- based servers integrate end-to-end platform innovations to deliver differentiating cloud performance. 2nd Gen Intel® Xeon® Scalable processors Intel® Optane™ SSDs Intel® Ethernet solutions Intel® Optane™ persistent memory Deliver outstanding performance across a wide array of workloads Deliver exceptional storage performance to speed application responsiveness Deliver high throughput and low latency to speed data across the infrastructure Extends system memory capacity to maximize application density per server and support larger datasets And Intel works with leading software vendors to optimize their code and accelerate their software, operating environments and frameworks on Intel-based platforms. Intel® technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on systemconfiguration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Optimization Notice: Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel® microprocessors. Theseoptimizations include SSE2, SSE3, and SSSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or e ffectiveness of any optimization on microprocessors not manufactured by Intel. Microprocessor-dependent optimizations in this product are intended for use with Intel® microprocessors. Certain optimizations not specificto Intel microarchitecture are reserved for Intel® microprocessors. Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice. Notice Revision #20110804. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others. © Intel Corporation. Cloud Innovation for Data-Centric Workloads Accelerate your time to insight with cloud infrastructure powered by 2nd Gen Intel®Xeon®Scalable processors Analytics In-memoryDatabases AI Machine Learning Deep Learning What are data-centric workloads? Analytics, in-memory databases, AI, machine learning, deep learning and other workloads are transforming every industry— empowering companies to uncover valuable insights and intelligence from their massive, ever-growing volumes of data. What demands do data-centric workloads place on infrastructure? Data-centric workloads are often very compute-intensive, but they are also very data-intensive—and that places greater strains on memory, storage and networking to store more data and to move it faster to and from the CPU so it can be processed and analyzed. Store More MoveFaster Process Everything
  3. 3. For more information, please write to sales.value@redingtonmea.com 3 Fortinet Delivers Major Updates to FortiOS Operating System Cisco Completes Acquisition of IMImobile FortiOS 7.0 expands the Fortinet Security Fabric’s ability to deliver consistent security across all networks, endpoints, and clouds. The combined offering will enable businesses to deliver customer experiences across the entire life cycle by incorporating cloud contact center, AI, omnichannel communications and programmability for customization.​ Fortinet has announced version 7.0 of FortiOS, Fortinet’s flagship operating system. With over 300 new features, FortiOS 7.0 enhances the Fortinet Se- curity Fabric and Fortinet’s ability to deliver consistent security for all net- works, endpoints, and clouds. John Maddison, EVP of Products and CMO at Fortinet, said, “New in- novations in FortiOS 7.0 continue Fortinet’s commitment to delivering a cybersecurity platform that ex- pands across the entire digital at- tack surface to en- able security that is broad, integrat- ed, and automated to protect devices, data, and applica- tions.” The Fortinet Secu- rity Fabric is the industry’s highest-performing cyber- security platform, powered by For- tiOS to enable consistent and flexible security across the entire attack sur- face. With more consumption mod- els than any other vendor – physical, virtual, cloud, and as-a-Service, across the largest product portfolio – span- ning network security and SD-WAN, switching and wireless access, network access control, authentication, public and private cloud security, endpoint security, and AI-driven ad- vanced threat protection solu- tions – all built on a common operating sys- tem, Fortinet empowers orga- nizations of any size to secure and simplify their IT infra- structure. SMS, WhatsApp, Apple Business Chat, Facebook Messenger and in-app com- munications. Due to rising customer expectations, the quality of those in- teractive experiences is more import- ant than ever before. IMImobile orchestrates, automates, monitors and delivers the customer interactions that drive the best expe- riences. By combining IMImobile’s solution with Webex Contact Center, Cisco will be able to provide a robust Customer Experience as a Service (CXaaS) offer. This new offering will bring together cloud contact center, artificial intelligence, experience man- agement, collaboration and Commu- nications Platform as-a-Service to create a single solution that will give organizations the ability to provide the exceptional experiences that custom- ers expect.  John Maddison, Fortinet Businesses need to make richer con- nections with their customers through the channel of their choice. This means going beyond email, voice and chat to enable communications on the most popular digital channels like Cisco has announced the completion of the acquisition of IMImobile. IMI- mobile is a leading global provider of cloud communications software and services that manage business-critical interactions at scale. Key features of FortiOS 7.0 among many include: • Zero Trust Network Access for Remote Access and Application Control:  FortiOS 7.0 enables every FortiGate customer to employ Zero Trust Network Access (ZTNA) capa- bilities out of the box, making For- tinet the only vendor to enable fire- wall-based ZTNA. ZTNA enabled by FortiOS 7.0 improves user experi- ence by supporting the evolution of better remote access to replace tradi- tional VPN. • Consistent Security Everywhere with SASE: Fortinet gives enterprises the flexibility needed to enable their workforce to work from anywhere with consistent, enterprise-grade se- curity delivered on-premises – and now, via cloud-based SASE consump- tion (Security-as-a-Service). • New Self-Healing SD-WAN Ca- pabilities:  Fortinet’s leading Secure SD-WAN solution now includes self-healing capabilities through adap- tive WAN remediations to make the application experience more resilient. • Expanding the LTE Edge with 5G:  Fortinet is extending network connectivity and security beyond the WAN Edge with innovations in 5G and LTE that improve wireless network performance and increase resiliency. With a diverse Wireless WAN and LTE offering, organiza- tions can achieve secure, scalable, and highly available network con- nectivity anywhere. FortiOS 7.0 will be available at the end of Q1 2021. “Customer expectations are rising, proving every interaction matters for the brand and the end-user experi- ence. Customers want delightful expe- riences where they can have two-way interactions with a business exactly when they need to, on the channel they prefer, without having to wait or jump through hoops to prove who they are, and without having to repeat themselves. With the right technology, world class brands can and must pro- vide this level of easy and effortless in- teraction. The addition of IMImobile to Cisco will be integral to delivering on the promise of delightful and en- gaging customer experiences,” said Jeetu Patel, Senior Vice President and General Manager of Cisco’s Security and Application business. The IMImobile team joins Cisco’s Contact Center business unit. New innovations in FortiOS 7.0 continue Fortinet’s commitment to delivering a cybersecurity platform that expands across the entire digital attack surface.”
  4. 4. For more information, please write to sales.value@redingtonmea.com 4 Cambium Networks Unveils Gigabit Outdoor Point to Point Solution Cambium Networks has announced the new ePMP Force 400 series point to point system with gigabit speed fixed wireless connectivity in the Sub-6 GHz spectrum. Service pro- viders and enterprises can rapidly extend connectivity and expand ca- pacity without the cost of licensed spectrum, expensive subscriptions or trenching fiber. Network operators can extend cover- age with cost-effective backhaul for enterprise access, fiber extensions, Wi- Fi access or CCTV networks with the ePMP Force 400’s flexible hardware design, 80 MHz channel support and improved over the air efficiencies pro- viding up to 1 Gbps speed. The ePMP an integrated Small Form-Factor Plug- gable (SFP) port and optional Gigabit Passive Optical Networks (GPON) Optical Network Unit (ONU) module, the ePMP Force 425 also makes a great fiber extension to reach places where fiber cannot be cost justified. “Cambium Networks listens to ser- vice providers and enterprise network operators, and we are pushing the en- velope to develop affordable gigabit wireless solutions that deliver a low total cost of ownership,” said Sakid Ahmed, General Manager of ePMP and cnVision business for Cambium Networks. “The ePMP Force 400 se- ries, leveraging a   leading 802.11ax technology platform from Qualcomm ePMP Force 400 enables service providers and enterprises to rapidly build affordable gigabit speed wireless bridges and campus area networks using unlicensed spectrum. Force 425 is ideal for service providers looking to deliver high-capacity access services to residential and business customers. It also serves as a low-cost backhaul for MicroPoP’s and outdoor Wi-Fi access points that require high capacity at moderate range without the overhead of licensed microwave. With New specializations, incentives and enablement offer partners the flexibility to differentiate and meet customers’ needs. Palo Alto Networks Launches NextWave 3.0 specializations include corresponding partner training and certifications. Enhance partner profitabili- ty  with three new specialization incentives  for Prisma SASE,  Prisma Cloud and Cortex XDR/XSOAR deals, along with other new incentives, deal boost and new rebates for its Next- Wave Diamond Innovator partners.  Expand partner opportunities  by boosting existing deal referral incen- tives on all Palo Alto Networks prod- ucts, extending partner-delivered sup- Palo Alto Networks has unveiled NextWave 3.0, a significant set of en- hancements, incentives and training to its NextWave Partner Program. Designed to help partners leverage all of Palo Alto Networks technolo- gies, NextWave 3.0 will help partners differentiate their services, build new security expertise and grow profitable businesses as they meet customers’ needs in a dynamic security market.    As digital transformation fuels the demand for specialized security ex- pertise and creates a new economy of services, Palo Alto Networks is com- mitted to delivering the products, programs and resources to enable its NextWave partners. Developed in consultation with the company’s part- ners, NextWave 3.0 will:   Enable differentiation with new spe- cializations. Partners can build their security expertise through three new Prisma SASE (Prisma Access and Prisma SD-WAN, formerly CloudGe- nix), Prisma Cloud and Cortex XDR/ XSOAR specializations. These new portacrossmoreofPaloAltoNetworks› technologies and offering new educa- tion credits. Further, NextWave part- ners can now resell Prisma Cloud via a two-tier go-to-market strategy. Empower partner success. NextWave 3.0 includes a host of new enablement resources and ways for partners to earn or maintain NextWave status, expand- ing Certified Professional Services cer- tification to include the new special- izations, Technology Education credits and technology adoption discounts.   “The future of our business and that of our partners are fundamentally linked,” said  Karl Soderlund, Senior Vice President of Worldwide Chan- nels. “The NextWave partner of tomor- row will enable digital transformation for our customers by embracing new technology, offering product-specific expertise, and leading with services. NextWave 3.0 helps our partners do just that. It is the most sweeping set of enhancements we have done to help our partners become security experts across our entire technology portfolio.”   Palo Alto Networks NextWave partner program includes approximately 6,500 partners who help 80,000 customers around the world succeed with the company’s technologies. In FY’20, 900 NextWave partners doubled their busi- ness through Palo Alto Networks. >> From page 1 platform software, enterprise grade security, and applications to the edge and disconnected locations with Roving Edge Devices, ruggedized, portable, scalable server nodes. It enables customers to operate cloud applications and workloads in the field, including machine learning inference, real-time data integration and replication, augmented analytics, and query-intensive data warehouses. In addition, it delivers cloud comput- ing and storage services at the edge of networks for government and enter- prise organizations, enabling low-la- tency processing closer to the point of data generation and ingestion, which provides timely insights into data. Oracle Roving Edge Infrastructure is a fully mobile, connection-indepen- dent extension of customers’ Oracle Cloud Infrastructure (OCI) tenancy with a similar interface and work- flow to provide a consistent, unified experience. An Oracle RED device is equipped with high-performance hardware including 40 OCPUs, an NVIDIA T4 Tensor Core GPU, 512 GB RAM, and 61 TB of storage, and can be clustered into groups of 5 to 15 nodes in a single cluster, starting at $160 per node per day. Oracle... Technologies, builds on top of the field proven ePMP fixed wireless ar- chitecture, and expands fixed wire- less broadband capability without the overhead of licensed spectrum.” The ePMP Force 400 is a global prod- uct supporting specific channels dependent on local country regula- tions. The system includes an SFP port making it easy to extend the fiber network. With an innovative optional range extender attachment, the ePMP Force 425 can offer an addi- tional 6 dBi of gain without installing a completely new dish. The new radios  support  LINKPlanner planning soft- ware,  cnHeat heatmapping modeling tool, and the cnMaestro management system. The radios are IP67 rated for rugged outdoor environments. The ePMP Force 400 is available in two variations: Force 425 – equipped with a 25 dBi integrated dish antenna and Force 400C – connectorized with two RP-SMA RF interfaces for dish or horn antennas. The NextWave partner of tomorrow will enable digital transformation for our customers by embracing new technology, offering product-specific expertise, and leading with services.”
  5. 5. For more information, please write to sales.value@redingtonmea.com 5 Check Point Software Launches Unified Security Solution Harmony Citrix Tackles Employee Well-Being Check Point Software Technologies has launched Check Point Harmony, the first unified solution to enable secure connectivity to any resource anywhere and give total endpoint protection for users on any device.  Harmony secures both corporate and BYOD devices, and internet connec- tions from known and zero-day at- tacks, while giving Zero-Trust access to business applications in a single, easy to manage solution. Citrix Systems has announced the availability of new well-being capa- bilities within  Citrix Workspace  that companies can use to help employees better manage the pressures and com- plexities of the workday so they can be and do their best. “Traditionally, companies have fo- cused on the physical well-being of their employees and viewed the other aspects as a bit taboo. But the pandemic has changed this,” said Donna Kimmel, Executive Vice Pres- ident and Chief People Officer, Citrix. “Companies are now having more holistic conversations that cover the mental, spiritual, and emotional as- new Harmony Browse uniquely pro- vides secure, fast and private web browsing by inspecting all SSL traf- fic directly on the endpoint without adding latency or re-routing traffic through a secure web service. • Secure remote access from any de- vice, anywhere:  Harmony Connect securely connects any user or branch to any resource, supporting client- less Zero Trust Network Access from any browser. • Protects users’ email and produc- tivity apps: Harmony Email & Office secures users’ email clients and, gives complete protection for Microsoft Office 365, Exchange, Google G Suite and more. • Total endpoint and device securi- ty: Harmony Endpoint protects users’ PCs from ransomware, phishing, and malware, and minimizes breach im- pact with autonomous detection and response capability. Harmony Mobile secures employees’ mobile devices against malicious apps and network or OS attacks. And there is incentive for them to do so. The World Health Organization estimates that depression and anxiety disorders cost the global economy $1 trillion each year in lost productivity. With Citrix, companies can create the space people need to be well and succeed. Using Citrix Workspace, they can deliver a secure, reliable and consistent experience that removes the noise and distractions from work, enabling employees to focus, innovate and create value. And, leveraging new microapp capa- bilities within the solution, they can seamlessly integrate well-being func- Harmony is the industry’s first unified solution for remote work, providing the highest level of security protection and eliminating management complexity. Company extends capabilities within Citrix Workspace to help organizations create the space people need to be well and succeed. Check Point Harmony - unified security solution for users, devices and access Check Point Harmony addresses re- mote work challenges by unifying endpoint, browser, email and remote access security components to protect all user devices and the enterprise networks they connect against known and unknown threats.  Harmony in- tegrates key security capabilities in a single solution to deliver: • Complete web security:  As a core component of Harmony, the pects of well-being because they real- ize that they must create a workspace that empowers their people to be well on all fronts.” “The move to mass remote work- ing created security gaps in organ- isations’ security infrastructures that cannot easily be addressed with multiple different point prod- ucts from several different security vendors,” said  Rafi Kretchmer, VP Product Marketing  at Check Point Software. “Harmony closes these gaps with unified, multi-layered security and prevention technol- ogies, blocking against all exploit techniques across all attack vectors. This protects the enterprise´s net- work end to end, ensuring uncom- promised security for the new ‘work from anywhere’ enterprise environ- ment, with easy deployment and single-console management.” Check Point Harmony is easy to de- ploy with a simple per-user pricing model and is managed via a cloud service, enabling user-centric securi- ty policies to be applied across orga- nizations’ environments. Harmony closes these gaps with unified, multi-layered security and prevention technologies, blocking against all exploit techniques across all attack vectors.” Citrix Workspace can deliver a secure, reliable and consistent experience that removes the noise and distractions from work, enabling employees to focus, innovate and create value. tionality into the workspace and make it part of how they work. The easy-to- use, low-code tools enable companies to automatically surface relevant con- tent and resources to support employ- ees and deliver it to any device. And they can be used to drive vital tasks associated with well-being and make it part of the workday such as con- ducting quick pulse surveys to track and improve employee happiness and well-being or sharing positive news to increase employee morale. Customers will also be able to add new functionality through a growing eco- system of Citrix partners or build new microapps themselves to adapt the well-being capabilities to meet chang- ing needs. The Citrix well-being capabilities are available for use with immedi- ate effect.
  6. 6. For more information, please write to sales.value@redingtonmea.com 6 CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads lations with intelligent monitoring that detects misconfigurations, vul- nerabilities and threats, and deliv- ers guided remediation that equips developers with guardrails to avoid costly mistakes.   “We continue to deliver the broad- est range of cloud security capabili- ties in a single cloud-native platform for on-prem, private, public, hybrid and multi-cloud environments that scales,” said Amol Kulkar- ni, Chief Prod- uct Officer for CrowdSt r i ke. “CrowdStrike’s Security Cloud is one of the largest deploy- ments in the world, providing CrowdStrike has announced expand- ed  Cloud Security Posture Manage- ment  (CSPM) and  Cloud Workload Protection (CWP) capabilities for the CrowdStrike Falcon platform to deliver greater control, visibility and security for cloud workloads and cloud-native applications from build to runtime.  The expanded CSPM and CWP ca- pabilities for the CrowdStrike Fal- con platform identify and remediate vulnerabilities from development to production for a wide variety of cloud environments, including containers.  With the incorporation of frictionless security and automated protection early in the continuous integration/ continuous delivery (CI/CD) pipe- line, DevSec- Ops teams are empowered to deliver produc- tion-ready ap- plications with minimal impact to build cycles. A d d i t i o n a l l y, the new features will help organi- zations prevent compliance vio- New capabilities bring increased protection for cloud applications, reducing the attack surface and identifying vulnerabilities before deployment. a spike in cryptocurrency prices, it may be more profitable for them to infect some devices with miners. As a result, we see that the total number of DDoS attacks in Q4 remained quite stable. And we can predict that this trend will continue in 2021,” said Alexey Kiselev, Business Development Manager on the Kaspersky DDoS Protection team. To stay protected against DDoS at- tacks, Kaspersky experts offer the fol- lowing recommendations: • Maintain web resource operations by assigning specialists who understand how to respond to DDoS attacks • Validate third-party agreements and contact information, including those made with internet service providers. This helps teams quickly access agree- ments in case of an attack Kaspersky: DDoS Attacks in Q4 2020 Dropped by a Third Compared to Q3 • Implement professional solu- tions to safeguard your organi- zation against DDoS attacks. For example,  Kaspersky DDoS Protec- tion combines Kaspersky’s extensive expertise in combating cyberthreats and the company’s unique in-house developments The number of DDoS attacks detected by Kaspersky DDoS Prevention in Q4 2020 is 31% less compared to Q3 2020. This drop can be connected to the growing interest in cryptocurrency mining, said Kaspersky. us a unique vantage point in support- ing organizations’ shift to cloud-na- tive architectures and their adoption of development and IT operations (DevOps). The new capabilities se- cure development and deployment of applications in the cloud with greater speed, efficiency and confidence.” The new Falcon Horizon CSPM capa- bilities include cloud-native security posture management for multi-cloud environments, monitoring cloud iden- tities for least privileges and ensuring continuous compliance. The new Falcon Cloud Workload protection capabilities include broad support for container runtime secu- rity, identifing security threats prior to running containers in production, stopping threats when containers are most vulnerable, during runtime and uncovering hidden threats. As people began to spend more time online in 2020, it resulted in a boom of DDoS attacks. And in the fourth quar- ter, attacks on educational institutions continued globally.  Online gaming services also suffered DDoS attacks.  However, in Q4 2020 there were only 10% more attacks than in Q4 2019. And compared to Q3 2020, the num- ber of attacks in Q4 2020 fell by 31%, while Q3 2020 also saw a drop com- pared to Q2. Experts suggest that this can be caused by a surge in cryptocurrency costs. As a result, cybercriminals may have had to ‘re-profile’ some botnets so that C&C servers, that are typically used in DDoS attacks, could repurpose infected de- vices and use their computing power to mine cryptocurrencies instead. This is further proved by KSN statistics. Throughout 2019, as well as in the be- ginning of 2020, the number of cryp- tominers was dropping. However, from August 2020 the trend changed, with the amount of this form of malware increas- ing slightly and reaching a plateau in Q4. “The DDoS attack market is currently affected by two opposite trends. On the one hand, people still highly rely on stable work of online resources, which can make DDoS attacks a common choice for malefactors. However, with Amol Kulkarni, CrowdStrike The new capabilities secure development and deployment of applications in the cloud with greater speed, efficiency and confidence.” Maintain web resource operations by assigning specialists who understand how to respond to DDoS attacks.
  7. 7. For more information, please write to sales.value@redingtonmea.com 7 Nutanix has announced additional ransomware protections in the compa- ny’s cloud platform. These include new threat monitoring and detection, as well asmoregranulardatareplicationandro- bust access controls all natively built into theNutanixstack.Thesenewcapabilities build on Nutanix’s rich data services for network security, files and objects stor- age, virtualization, and business conti- Nutanix Extends Ransomware Protections to Help Secure Customers’ IT Environments leverage the following features as part of a complete data protection solution: •Eliminatedowntimeandminimizedata loss for Tier-1 VMware workloads with built-in CDP and achieve immediate re- coveries to a latest state or desired point in time providing the best recovery point objectives (RPOs). • Keep backups safe with immutable, hardened Linux repositories compliant with SEC 17a-4(f), FINRA 4511(c) and CFTC 1.31(c)-(d) regulations, preventing encryption by ransomware, accidental or malicious deletions; based on gener- al-purposeservers,withoutanyhardware lock-in. • Reduce the costs of long-term data ar- chival and retention by up to 20 times and replace manual tape management New Veeam Backup & Replication v11 Now Available ments that are prime targets for initial ransomware infection and spread. Closer to the application layer, the Nu- tanix cloud platform now also includes native ransomware detection for file storage services within Nutanix Files. File analytics, which is a feature includ- ed with Files, now detects abnormal and suspicious access patterns and identifies known ransomware signatures to block data access in real-time. To further protect application data from ransomware attacks, the Nutanix cloud platform now includes new features within the object storage solution, Nu- tanix Objects. Objects includes more granular permissions to access object data for primary and secondary storage. Specifically, Nutanix Objects now offers the ability to configure Write Once Read Many (WORM) policies for individual files and objects selected by an IT team to help guard against unauthorized de- letion or encryption of data, thwarting nuity to help enterprises prevent, detect and recover against ransomware attacks across multiple cloud environments. At a time when attacks are becoming even more common due to the rise of remote work, these capabilities make it easier to implement security and business conti- nuity best practices at the infrastructure level, rather than rely on a complex ma- trix of bolt-on security products. The Nutanix cloud platform now deliv- ersanomalydetectionbasedonmachine learning and IP reputation services with the company’s security networking op- erations and monitoring solution, Flow Security Central, a feature with Nutanix Flow. Flow Security Central helps iden- tify known attack vectors, including po- tential ransomware, at the network level before reaching the application and data layers.. Flow Security Central also moni- tors endpoints to identify traffic coming from disreputable locations, something especially helpful for defending Virtual Desktop Infrastructure (VDI) deploy- Hybrid and multicloud leader strengthens networking, storage and virtualization services. New 4-in-1 solution ​ combines backup, replication, storage snapshots and now, Continuous Data Protection (CDP). Rajiv Mirani, Nutanix Danny Allan, Veeam life cycle, while handling all the com- plexities of a multi-cloud environment for AWS, Microsoft Azure and Google Cloud Platform. “Veeam released V10 with more than 150 new enhancements just 12 months ago, and now has more than 700,000 downloads. Being able to launch the next version — Veeam Backup & Rep- lication v11 — with an additional 200 new and powerful backup, cloud, DR, security and automation enhancements speaks volumes to Veeam’s speed of in- novation, as well as our strong commit- ment to the needs and data reliability demands of our customers and part- ners,” said Danny Allan, Chief Technol- ogy Officer and Senior Vice President of Product Strategy at Veeam. New Veeam V11 enables businesses to Veeam Software has announced gen- eral availability of new Veeam Backup & Replication v11, enabling the most advanced data protection solution for cloud, virtual, physical and enterprise workloads. With more than 200 new features and enhancements, the sin- gle solution for comprehensive data management is powerful and flexible enough to protect each phase of the data with new native support for Amazon S3 Glacier (including Glacier Deep Ar- chive) and Microsoft Azure Archive Storage through end-to-end backup life cycle management with Veeam Scale-out Backup Repository Archive Tier. • New support for Google Cloud Storage for Veeam Scale-out Backup Repository Capacity Tier, providing greater choice of hot cloud object storage targets. • Achieve the lowest recovery time objec- tives(RTOs)with powerfulinstantrecov- ery for Microsoft SQL, Oracle databases and  NAS file shares from  the  pioneer of Instant VM Recovery. • Delivers end-user data backup for any macOS device, joining existing Veeam Agents  for Microsoft Windows,  Linux, IBM AIX and Oracle Solaris. • Leverage the services, solutions and ex- pertise needed to maximize the value of V11 by teaming up with Veeam-powered service providers for a fully managed backup experience. New Veeam Backup & Replication v11 is now available for download. many common ransomware attacks. Lastly, the Nutanix platform now deliv- ers support for Microsoft Windows Cre- dential Guard for virtual machines and virtual desktops running on the AHV hypervisor. Credential Guard adds op- erating system (OS) protection from malware using credential theft attacks on Microsoft OS environments, a com- mon vector used by ransomware to gain administrative privileges. Rajiv Mirani, Chief Technology Officer at Nutanix, said, “Enterprises need a defense in depth approach to security, starting with their IT infrastructure. However, the right security tools need to also be simple and seamless to imple- ment. Nutanix delivers a strengthened cloud platform out of the box, with an even richer set of ransomware protec- tions available now.” All new features are currently available to customers.
  8. 8. For more information, please write to sales.value@redingtonmea.com 8 Veritas Technologies has announced the launch of Veritas NetBackup 9. NetBackup 9 delivers significant new features to provide customers with ad- ditional choices for deployment across edge, core and cloud, while increasing operational simplicity. NetBackup 9 has been designed to answer the needs of customers op- erating demanding multi-cloud data centers with heterogenous environ- ments that require a data protection platform without compromise. With NetBackup 9, Veritas now adds Flex Scale, offering customers a scale-out deployment option based on Veritas’ validated reference design. This new architecture provides a hypercon- verged approach to data protection that delivers cloud-like simplicity and scalability in an on-premises data center. With NetBackup Flex Scale, businesses no longer need to forecast capacity needs and provision in antic- ipation of future growth. Instead, they are able to simply add more nodes as required. By empowering enterpris- es to extend their standardization on Veritas to include scale-out, customers can be freed from the management complexity associated with disparate point solutions for data protection. Deepak Mohan, Executive Vice Presi- dent, Products Organization at Veritas, said,“VeritasNetBackup9withFlexScale gives customers freedom of choice with the most flexible deployment models in the industry today by empowering them to protect over 800 workloads in a scale- out, scale-up, or cloud storage model.” NetBackup 9 is already available in more flexible deployment modes than is offered by any player in the industry. With the inclusion of its new scale-out VMware Refreshes vRealize Cloud Management Veritas Introduces NetBackup 9 hyperconverged mode, Veritas contin- ues to expand customer choice while reducing complexity, cost and risk. The launch of NetBackup 9 further reinforces Veritas’ focus on abstract- ing the complexity of enterprise IT. NetBackup streamlines management of the most dynamic environments through orchestrated automation of discovery, protection, and recovery. NetBackup 9 also includes new fea- tures to simplify enterprise data pro- tection for mission-critical OpenStack environments. Utilizing OpenStack native APIs, NetBackup 9 delivers seamless integration, multi-tenant controls, and intuitive self-service management. In addition to offering scalability and performance benefits, NetBackup 9 can dramatically reduce costs and the burden of administrative management while ensuring high-per- formance backup and recovery opera- tions for OpenStack, both on-premise and in public clouds. NetBackup 9 is available now. ize Log Insight Cloud, and VMware vRe- alize Network Insight Cloud. VMware vRealize Automation 8.3 de- livers enhanced solutions for custom- ers’ most critical automation use cases including self-service multi-clouds, network automation, and DevOps with actionable insights, greater secu- rity and improved performance Powered by AI and predictive analytics, vRealize Operations delivers continuous performance, capacity and cost optimi- zation, proactive planning, intelligent remediation and integrated compliance VMware vRealize Log Insight Cloud in- troduces enhanced machine learning (ML) analytics for errors and Knowl- edge Base (KB) correlation, ERI-FIPS compliance, VMware HCX and VM- ware Site Recovery Manager log integra- tion, and native data archiving support. VMware  vRealize Network Insight 6.1 and VMware vRealize Network In- sight Cloud provide an end-to-end net- work view by learning from multiple data sources across virtual and physical infrastructure. Using ML for applica- tion discovery as well as assurance and verification capabilities, vRealize Net- work Insight makes it easier to plan, build, and manage complex networks VMware Skyline  provides proactive intelligence across customers’  VM- ware  environments to help prevent issues and unscheduled downtime. The latest release of Skyline Advisor provides expanded visibility into the vulnerabilities Skyline identifies and improved Support Request visibility enables easier use of the Log Assist au- tomated log upload feature VMware vRealize Automation 8.3, VMware vRealize Operations 8.3, VM- ware vRealize Log Insight 8.3, VMware vRealize Suite Lifecycle Manager 8.3 VMware vRealize Network Insight 6.1 and Skyline Advisor are available. The new capabilities and enhancements to VMware vRealize Operations Cloud, VMware vRealize Log Insight Cloud and VMware vRealize Network Insight Cloud are also available. Purnima Padmanabhan, Senior Vice President and General Manager, Cloud Management Business Unit, VMware. “As more businesses pursue cloud as an agility strategy, vRealize Cloud Man- agement helps customers run their ap- plications anywhere while maintaining consistent operations and common governance across all environments.” VMware vRealize Cloud Management enables customers to consistently deploy and operate their applications, infra- structure, and platform services, from the data center to the cloud to the edge. It helps them accelerate innovation with quick and easy access to services, gain ef- ficiency by improving visibility and auto- mation, and improve control while mit- igating risk through unified operations and governance. Vmware has also intro- duced new releases including VMware vRealize Automation 8.3, VMware vRe- alize Operations 8.3, VMware vRealize Log Insight 8.3, vRealize Suite Lifecycle Manager 8.3 VMware vRealize Network Insight 6.1 and VMware Skyline; along withenhancementsacrossVMwarevRe- alize Operations Cloud, VMware vReal- VMware vRealize Cloud Management enables customers to consistently deploy and operate their applications, infrastructure, and platform services, from the data center to the cloud to the edge. NetBackup 9 has been designed to answer the needs of customers operating demanding multi-cloud data centers with heterogenous environments that require a data protection platform without compromise. Vmware has announced innovations across its  VMware vRealize Cloud Managementportfolio of on-premises and Software as a Service (SaaS) solu- tions. The new and enhanced capabil- ities combine to enable customers to more securely deploy and operate their hybrid and multi-cloud environments. “In today’s uncertain world, enterpris- es are seeking to increase agility and efficiencies to remain competitive and to drive faster business growth,” said Deepak Mohan, Veritas Purnima Padmanabhan, VMware
  9. 9. For more information, please write to sales.value@redingtonmea.com 9 14 million devices today, which are used to modernize supply chain and warehousing operations. As part of this, Ivanti Wavelink has validated over 50 enterprise rugged mobile devices with 10 device manufacturers, including Ze- bra, Honeywell, Apple, Samsung, Point Mobile, CypherLab, and JLT Mobile. Ivanti Wavelink, the supply chain busi- ness unit of Ivanti, has announced the launch of Ivanti Wavelink Velocity Solutions Directory. The new directo- ry enables device manufacturers offer- ing solutions for the supply chain and warehousing industries to now rapidly validate their solutions for the Ivanti Wavelink Velocity platform. It also pro- Ivanti Wavelink Expands Velocity Platform General Manager, Ivanti Wavelink. “This is a competitive advantage we extend to device manufacturers that accelerates engagement and improves their time-to-revenue by eliminating what is typically a lengthy validation process. Now, partners and customers are able to immediately leverage their Ivanti Wavelink Velocity validated de- vices within their environments.” Through the Ivanti Wavelink Solutions Directory, hardware and device man- ufacturers can rapidly validate their rugged industrial and consumer-grade devices running Android, iOS or Win- dows-based operating systems. For solution provider partners and customers, the Ivanti Wavelink Veloc- ity Solutions Directory provides a sin- gle portal for accessing fully validated Ivanti Wavelink devices. Ivanti Wave- link Velocity is deployed on more than vides a centralized portal where Ivanti Wavelink solution partners and cus- tomers can gain access to information on validated devices. “Ivanti Wavelink is proud to be the first to offer this type of solutions directory to our partners and customers,” said Brandon Black, Vice President and New Solutions Directory and Rapid Validation Capabilities enable device manufacturers serving the supply chain and warehousing industries to self-validate solutions. CyberArk Delivers New Identity Security Offerings to Drive Customer Success Company introduces new subscriptions, programs and tools to complement the industry’s most comprehensive identity cecurity capabilities. • CyberArk Identity Security As- sessment Tool – The Assessment Tool is fully aligned to the CyberArk Blueprint so organizations can assess and track their level of alignment with Identity Security best practices and compare their program maturity with peers across multiple parameters such as industry, region and organi- zation size. Identity Security Customer Success Plans – Success Plans are strategically packaged resources, guidance and ex- pertise to help customers successfully execute an Identity Security program while getting the most value from their solutions as quickly as possible. Udi Mokady, Chairman and CEO, CyberArk, said, “CyberArk’s privi- lege-led approach to Identity Security is designed to help enterprises adapt and embrace a risk-based strategy for defending against identity-based attacks as they support a distributed workforce, embrace the cloud and new cloud technologies, and deliver positive customer experiences.” With CyberArk Identity Security, or- ganizations can secure access across any device, anywhere, at just the right time through: • CyberArk Privileged Access solu- tions secure privileged credentials wherever they exist – defending against advanced attacks, speeding digital transformation and helping achieve compliance. • CyberArk Workforce Identity and Customer Identity solutions contin- uously monitor behavioral signals to make sure users are who they say they are. • CyberArk Secrets Management solutions enable applications and automation tools to securely access sensitive resources at scale – without burdening developers. individual identities – human or ma- chine – throughout the cycle of access- ing critical assets. The new announcements include: • Identity Security Subscription Offerings – Available in three new subscription offerings, customers can benefit from the combined power of Identity as a Service (IDaaS) and the industry’s leading Privileged Access Management solution in offerings that make the most sense for their specific users: Workforce User, External Ven- dor or Privileged User. • CyberArk Blueprint for Identity Security Success – The CyberArk Blueprint has evolved to expand prescriptive guidance across all identities and is centered on core Identity Security best practices gained through years of hands-on customer engagements. CyberArk has announced the avail- ability of new subscriptions, programs and tools designed to accelerate or- ganisations’ Identity Security initia- tives and time to business impact. These new offerings complement Cy- berArk’s Identity Security portfolio, which is centered on Privileged Access Management and focuses on securing Through the Ivanti Wavelink Solutions Directory, hardware and device manufacturers can rapidly validate their rugged industrial and consumer-grade devices running Android, iOS or Windows-based operating systems.
  10. 10. For more information, please write to sales.value@redingtonmea.com 10 For more information, please write to sales.value@redingtonmea.com 09 / 2020 | 11 @redingtonvalue
  11. 11. For more information, please write to sales.value@redingtonmea.com 11 For more information, please write to sales.value@redingtonmea.com 09 / 2020 | 11 @redingtonvalue
  12. 12. Empowering remote work with Microsoft Teams With more people working from home, fostering virtual connection is crucial. Empower your team to stay connected and keep business running smoothly using Microsoft Teams. EMBRACE ONLINE SHARE CONTENT STAY FOCUSED STAY CONNECTED Include an online link Share your screen Be mindful and inclusive Collaborate on ideas Turn on video Make up for missed hallway talk Blur your background Bring the team together Record the meeting Have fun! www.redingtonvalue.com sales.value@redingtonmea.com H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE

×