june 14

32
ECIND062014RS20 WWW.ENTERPRISECHANNELS.COM RS 20 | PAGES 32 | VOLUME 02 | ISSUE 05 IBM LEADS IN FLASH STORAGE SSA’S /05 JUNE 2014 PALO ALTO: “BLOCKING CONTENT IS COUNTER-PRODUCTIVE” /28 SECURITY NIGHTMARES Penetration of mobile devices, social media, cloud and analytics in enterprises is creating unprecedented security challenges that channel partners have the opportunity to address /20 FOR ENTERPRISES SMAC CREATING

Upload: enterprise-channels

Post on 31-Mar-2016

220 views

Category:

Documents


6 download

DESCRIPTION

This issue talks about the cyber security landscape in India. Plus, it talks about the surveillance market opportunity in the country.

TRANSCRIPT

Page 1: June 14

ECIND062014RS20

W W W . E N T E R P R I S E C H A N N E L S . C O MR S 2 0 | PA G E S 3 2 | V O L U M E 0 2 | I S S U E 0 5

IBM LEADS IN FLASH STORAGE SSA’S /05

J U N E 2 0 1 4

PALO ALTO: “BLOCKING CONTENT IS COUNTER-PRODUCTIVE” /28

SECURITY NIGHTMARESPenetration of mobile devices, social media, cloud and analytics in enterprises is creating unprecedented security challenges that channel partners have the opportunity to address /20

FOR ENTERPRISES

SMAC CREATING

Cover.indd 1 28/06/14 11:31 am

Page 2: June 14

Advts.indd 5 28/06/14 11:34 am

Page 3: June 14

PUBLISHER: SANJIB MOHAPATRAEDITOR: SANJAY MOHAPATRA ASSOCIATE EDITOR: NIVEDAN PRAKASHASSISTANT EDITOR: KARMA NEGIREPORTER: APARAJITA CHOUDHURY REPORTER: MANALI MISRADESIGN AND DEVELOPMENT: RAVI KUMARDESIGNER: AJAY ARYAVISUALIZER: MANAS RANJANLEAD VISUALIZER: DPR CHOUDHARY

MARKETINGMARKETING MANAGER: MANVI RAWAT SENIOR MANAGER: M RAJ CIRCULATION AND PRINTING: PANCHANAN BHOI

SALES CONTACTSDELHI6/103, KAUSHALYA PARK, HAUZ KHAS NEW DELHI-110016 PHONE: +91-11-41055458 I +91-9958264068E-MAIL: [email protected]

PRINTED, PUBLISHED AND OWNED BY SANJIB MOHAPATRA PLACE OF PUBLICATION: 6/102-103 , KAUSHALYA PARK, HAUZKHASNEW DELHI-110016, PHONE: 91-11-41657670 / 41055458PRINTED AT KARAN PRINTERS, F-29/2, 1ST FLOOR, OKHLA INDUSTRIAL AREA, PHASE-2, NEW DELHI 110020, INDIA.

SUBSCRIPTION: RS.200 (12 ISSUES).ALL PAYMENTS FAVOURING: ACCENT INFO MEDIA PVT. LTD.

© ALL RIGHTS RESERVED. NO PART OF THIS PUBLICATION CAN BE REPRODUCED WITHOUT THE PRIOR WRITTEN PERMISSION FROM THE PUBLISHER.

BANGALOREBINDIYA JADHAV#28/1, 3RD FLOOR, SRI LAKSHMI KRUPA, NEAR SHAMANNA PARK, MODEL HOUSE STREET, BASAVANAGUDI, BANGALORE - 560004EMAIL:[email protected]: 91-8861821044

CHENNAITHAGA PANDIAN NO-27, RAJAN STREET, KODAMBAKAM CHENNAI - 24 PHONE: 044-43066990

MUMBAITAHMEED ANSARI2, GROUND FLOOR, PARK PARADISE, KAY-BEES CHS. LTD., OPP. GREEN PARK, OSHIWARA, ANDHERI (WEST), MUMBAI - 400 053.PH. +91 22 26338546 FAX +91 22 26395581MOBILE: +91 9967 232424

KOLKATAS SUBHENDU BC-286, LAXMI APARTMENT, KESTOPUR KOLKATA-700101 PHONE: 9674804389

EDITORIAL OFFICEDELHI6/102-103 , KAUSHALYA PARK , HAUZKHAS , NEW DELHI-110016, PHONE: 91-11-41055458 [email protected]

BANGALORENO.103, 7TH MAIN9TH CROSS, BSK I STAGESRINIVAS NAGAR, BANGALORE – 50PHONE: 91-11-8861821044 [email protected]

S A N J AY M A H A PAT R A

S A N J AY @ E N T E R P R I S E C H A N N E L S . C O M

EDITORIAL

03JU NE 2014

Special Focus will be on

Security

As we are optimistic and looking at the future growth, there is no reason why we should give up now. Various factors indicate that people have started worrying about what this new government is going to do for them before even giving them time to breath. This is not the right attitude that one should evaluate or look up to any institution.

I know that the Union Budget 2014 is going to clear doubt about the intent of this government though railway budget has created a furore in the country but I see this from a construction point of

view that the present condition of railways is not at all good if one compares its standard with any of the growing countries in South East Asia or Middle East.

Besides, I feel there will be a sizable amount of money allocated towards security of the country– both physical and cyber. Why physical security? It is simply for the reason that the India would like to remain immune from the influence of what is happening in the neighbouring countries. Plus the bad boys of the world would certainly like to destabilize the regained normalcy of the country.

The country would like to keep the terrorism and naxalism at a bay. It would like to strengthen its intelligence, predictability and incident analysis and prevention. Therefore a lot of investment would come from the government side on strengthening cyber security and homeland security from physical security point of view.

So, clearly see security and surveillance business are going to grow. There will be a number of projects around surveillance and security where solutions around CCTV, access control, authentication, etc. will be involved in order to immune major establishments and public places of the country.

Keeping all these aspects in mind, we have dedicated this issue of enterprise channels to security and surveillance and tried to compile opinions of most of the stake holders of the industry.

What we found from the opinions of these people who are responsible for security and surveillance is that the security breaches starts primarily because of the human negligence. If timely attention is given to the networks and systems, the unforeseen incidents can be avoided.

On the surveillance side, it is the managed service that is going to gain prominence in the future surveillance market growth because the IP technology will have its positive impact on this market to make the surveillance affordable and scalable. Happy reading! Pls. send in your inputs also. ë

Edit.indd 3 28/06/14 11:28 am

Page 4: June 14

2014V O L U M E 0 2

I S S U E 0 5

J U N E 2 0 1 4

W W W. E N T E R P R I S E C H A N N E L S . C O M

INNOVATION /30TYCO SECURITY VIDEOEDGE NVR

4.5American Dynamics’

version 4.5 is a powerful, high-performance

VideoEdge NVR with new features that

provide customers more secure and efficient systems

for businesses and organizations

EDITORIAL ::::::::::::::::::::::::::::::::::::::::::::::::::: 03

CHANNELSTREET ::::::::::::::::::::::::::::::::::::: 05

CASE STUDY: ESCAN ::::::::::::::::::::::::::::::: 26

SECURITY CORNER ::::::::::::::::::::::::::: 28, 29

INNOVATION::::::::::::::::::::::::::::::::::::::::::::::::: 30

COVER STORY

FEATURE MY VIEWS /13

“Hackers are Targeting Cloud”

AMITABH JACOBDIRECTOR-CHANNEL, INDIA,

SYMANTEC

MY VIEWS /18

“Making the Programme More Adaptive”SCOTT ROBERTSONVICE PRESIDENT - APAC AT WATCHGUARD

GUEST TALK /19

Implementing security is seen as buying insurance

JAN VALCKECOO & PRESIDENT, VASCO

DATA SECURITIES

SMAC CREATING SECURITY NIGHTMARES FOR ENTERPRISESPenetration of mobile devices, social media, cloud and analytics in enterprises is creating unprecedented security challenges that channel partners have the opportunity to address /20

Surveillance Industry Coming of Age /14Now with affordability of the solutions and growing threat landscape, the time has come that the enterprises and government sectors move faster and start investing in surveillance technologies for a safety environment.

CONTENTS

04 JU NE 2014

Contents.indd 4 28/06/14 11:53 am

Page 5: June 14

IBM Leads in Flash Storage SSA’sAccording to a new research report from Gartner, IBM is the worldwide market leader in flash storage solid state arrays (SSA’s) based on revenue for 2013. More customers around the globe are turning to IBM and its flash storage systems than any other company for faster access to insights from Big Data announced the press release.

Flash, the memory technology used in every-thing from mobile phones and tablet PCs to thumb drives, is taking the enterprise by storm; helping businesses large and small improve the perfor-mance of applications as well as analytics in the era of Big Data.

Since IBM FlashSystem has no spinning disks, it offers ultra-high performance, extremely low latency, and lower costs from energy savings. According to Memorial Hermann, the systems have helped the health system cut power consumption by 96 percent, cooling requirements by 95 percent and physical storage space usage by 98 percent.

“Big Data provides tremendous opportunity

for our global clients,” said Akhil Kamat, Brand Leader, Storage, STG, IBM India/South Asia. “As organizations look to gain business insight out of the building digital tsunami, more are turning to IBM flash storage as a key accelerator.”

IBM offers flash solutions across its expansive storage portfolio, including the IBM FlashSystem 840 and IBM FlashSystem V840 all-flash arrays, and the DS8000 and Storwize V7000 families of advanced storage systems, that can be configured as all-disk, all-flash (Solid State Drives), or hybrid (disk and flash) systems. In addition, the IBM XIV Storage System can support up to 12 terabytes of flash cache.

“Big Data provides tremendous opportunity for our global clients,” said Jamie Thomas, General Manager, IBM Storage and Software Defined Systems. “As organizations look to gain busi-ness insight out of the building digital tsunami, more are turning to IBM flash storage as a key accelerator.”

RED HAT UPDATED TRAIN-ING COURSES FOR ENTERPRISE LINUX 7

Red Hat has launched several updated system administration training courses and certification exams, to teach and qualify students on how to install, configure, deploy, and troubleshoot Red Hat Enterprise Linux 7.

The courses continue to feature a hands-on, lab-based environment to provide IT professionals with the skill-sets they need to implement and maintain Linux deployments. The new curriculum places greater emphasis on enterprise administra-tion skills including command line administration, shell scripting, diagnostics and troubleshooting. The courses will be available via traditional classrooms, live virtual training, online, or on-site.

MANAGEENGINE IN GARTNER MAGIC QUADRANTManageEngine has been positioned by Gartner, Inc., in the 2014 Magic Quadrant for Client Management Tools.

“We believe our entry in the 2014 Magic Quadrant for Client Manage-ment Tools confirms ManageEngine’s commitment to provide best-in-class enterprise client management software,” said Mathivanan Ven-katachalam, director of product management, ManageEngine. “Desk-top Central’s ease of use and array of feature offerings have proved to be a good fit for our enterprise customers, and we feel our recognition in the Magic Quadrant reiterates it.”

AKHIL KAMAT, BRAND LEADER, STORAGE, STG, IBM INDIA/SOUTH ASIA

05JU NE 2014

CHANNEL

STREET

channel street.indd 5 28/06/14 11:27 am

Page 6: June 14

CA Releases SaaS-based ITSMCA Technologies has unveiled Cloud Service Management, a mobile-ready, SaaS-based IT Service Management (ITSM) solution that delivers simplicity and speed across the enterprise.

CA Cloud Service Manage-ment is designed with a unique ‘configure, don’t code’ approach that offers implementation in weeks without new development and maintenance resources or complex upgrades announced the press release. In fact, service delivery and resource provisioning can be automated in just a few minutes. And, it provides

a consumer-like experience to accelerate adoption and empower end users.

“The explosion of applica-tions and devices deployed in the enterprise has made service delivery a cornerstone of employee and business produc-tivity. CA has designed a solution that unlocks the full potential of SaaS by focusing on what matters to customers – employee satisfaction, speed of deployment and reduced cost of ownership,”

said Vic Mankotia, VP, CA Technologies

IN 2 YEARS $39 BN OF SAP SOLUTIONS TO SHIFT TO CLOUD

Research released by HCL Technologies has revealed that $39 billion of SAP landscape could move to the cloud in the next two years, as large enterprises plan to migrate 46% of their existing SAP on-premise environment.

The global survey of 100 executives from large enterprises focused on their current and future plans to deploy SAP applications and infrastructure in the cloud. It revealed that 45% of orga-nizations have increased their SAP cloud investments over the past year and that they expect to nearly double these investments in the next 12 months. Migration isn’t just being motivated by potential cost savings, as the research highlights business agility and speed (59%), access to new technologies (46%) and improved customer satisfaction (43%) as big drivers.

AVAYA HELPS GUJARAT-BASED LIBERTY CAREER TO EXPAND REACHAvaya Scopia videoconferencing capabilities has been selected by Liberty Career Academy to enhance its video-enabled learning platform – helping more students in remote locations benefit from access to education and delivering operational cost savings in the process.

Liberty Career Academy, a

private coaching institute in Gujarat, has deployed Avaya’s comprehensive video conferencing solutions across its 12 centers and 60 classrooms.

Core to the deployment was the

installation of the Avaya Scopia Elite 6110 multi-point control unit (MCU) which supports a true HD experience delivered via Avaya Scopia XT 4200 HD video-conference endpoints.

“Our video solutions are based on an open technology that enables effortless deployment in and among schools and across campuses. These solutions have essentially enhanced distant learning and have provided swifter inter-faculty collaboration by creating a multi-point video conference on the fly,” said Hrishi Parthasarathy, Director, Avaya.

SIEMENS LEADS IN CPDM MARKET SEGMENTSiemens has been recognized by leading product lifecycle manage-ment (PLM) management consulting and research firm, CIMdata Inc., as the market presence leader in the collaborative Product Definition management (cPDm) market seg-ment for the 13th year in a row, and in the Digital Manufacturing market segment for the ninth year in a row.

Additionally, as a result of its expanding family of software for simulation and analysis (S&A) – including the acquisition of LMS – Siemens improved its market leader-ship position to fourth in the S&A ranking, up six positions from the 2013 report. CIMdata’s findings are based on in-depth data and analysis of the global PLM market and were announced earlier this month.

“According to our market research, Siemens continues to lead the way in cPDm and Digital Manufacturing and has seen significant growth in S&A revenue,” said Peter Bilello, President of CIMdata. “This bodes well for Siemens as all three of these essential categories continue to grow and our data suggests that growth will continue well into the future.”

Over the next five years, CIMdata forecasts the comprehensive cPDm market segment will experience a compound annual growth rate (CAGR) of 5.2 percent, result-ing in a projected market size of approximately $6.2 billion by 2018, based on total software and services investments.

SCHNEIDER TO INTEGRATE VIGILENT’S COOLING OPTIMIZE WITH STRUXUREWARESchneider Electric has partnered with Vigilent to deliver Data Center Operation: Cooling Optimize, an add-on module for Schneider Electric’s Data Center Infrastructure Management (DCIM) offer, StruxureWare for Data Centers.

The enhancement uses closed loop control along with sophisticated monitoring and analysis capabilities to enable data centers to automatically self-correct issues with temperature and air flow, providing managers with improved control over operations.

VIC MANKOTIA, VICE PRESIDENT, SOLUTION STRATEGY, ASIA PACIFIC AND JAPAN, CA

HRISHI PARTHASARATHY

CHANNEL STREET

06 JU NE 2014

channel street.indd 6 28/06/14 11:27 am

Page 7: June 14

SECONDS6

CA Named Overall LeaderCA Technologies has been named an “Overall Leader” in identity provisioning in the recent Leadership Compass report issued by Kup-pingerCole, an analyst firm focused on identity-centric information security. In the “Leadership Compass: Identity Provisioning” report, Kup-pingerCole evaluated 26 vendors in the areas of innovation, product and market presence. Analysts calculated Overall Leaders based on a combined rating of those three categories.

“Based on the long history of the product and the market position of CA Technologies, it

is no surprise that CA has done a large number of deployments of CA Identity Minder. As a consequence, there is — besides a mature and rich feature set — a number of additional solutions from CA Services available which add to this functionality,” Martin Kuppinger wrote in the report.

Kuppinger also stated, “A particular strength of the product is the availability of the Xpress components such as the Policy Xpress for build-ing logic without coding and Connector Xpress for configuring new connectors.”

TREND MICRO, BROADCOM TO PROVIDE

GATEWAY SECURITY

Trend Micro has entered a joint collaboration with

Broadcom Corporation in the development of an

integrated security solution optimized to protect

home security networks from cyber threats and

improve network visibility without compromising

performance.

“Our integrated security solution for the home

network gateway is unique to the market with

its easy-to-use, yet powerful capabilities,” said

Dhanya Thakkar, Managing Director, India & SEA,

Trend Micro. “

CXP AND PAC TO BECOME ONE

CXP, an independent European application soft-

ware research and advisory firm, has announced

its merger with Pierre Audoin Consultants

(PAC), a leading market research and consulting

provider specializing in the field of IT services and

software. Capitalizing on 40 years of experience,

and with 140 staff present in eight countries (with

17 offices worldwide), the new company – CXP

Group – has become the leading

MALICIOUS ACTIVITY: HIDING IN PLAIN

SIGHT

Palo Alto Networks has revealed new research on

how attackers exploit commonly-used business

applications to bypass security controls -- and

provides helpful insight into how business leaders

and security practitioners need to reassess and

strengthen their security posture.

The findings are based on analysis of traffic

data collected from 5,500 network assessments

and billions of threat logs over a 12-month span

and are revealed in the 2014edition of the Palo

Alto Networks Application Usage and

APAC BYOD MARKET TO CONTINUE ITS

GROWTH MOMENTUM: IDC

According to IDC the Asia/Pacific Bring Your

Own Device (BYOD) market will continue strong

growth in 2014 and into 2015 as consumer

smartphone and tablet continue gain market

across the region.

In IDC’s latest BYOD studies, “Asia/Pacific

(Excluding Japan) Bring Your Own Device End-

User Survey 2014” and “Asia/Pacific Bring Your

Own Device 2014–2018 Analysis and Forecast”,

BYOD is defined as part of enterprise mobility.

The practice of BYOD refers to devices that users

have personally purchased with their own funds,

without help from the employer.

“The use of different tools for each silo is complicat-ing the implementation of any business-wide data

security plans due to different functionalities.”EARL PERKINS, RESEARCH VP, GARTNER

IN PUBLIC

FORTINET SUPPORTS VPN ACCESS TO MICROSOFT’S AZURE

As organizations continue to move mission critical applications to the cloud, secure access to sensitive data and application workloads remains critically important, therefore Fortinet has extended its support to access Microsoft Azure cloud platform.

The customers can benefit from a secure virtual private network (VPN) access to Microsoft’s Azure cloud offering while leveraging Fortinet’s broad and multi-layered security technologies across network, application and content security.

“Microsoft Azure’s cloud scalability, performance and economic benefits make it a convincing choice for customers wanting to leverage the cloud while continuing to use existing on-premises infrastructure,” said Venkat Gattamneni, Senior Product Marketing Manager, Microsoft Azure, Microsoft. “These customers require secure VPN access from office and branch networks to the cloud, and Fortinet’s next-generation firewall platforms extend on-premises datacenters to the cloud while enabling security.”

SCHNEIDER BAGS FIVECONTRACT FROM SHELLSchneider Electric has been awarded a five-year enterprise framework agreement (EFA) by Shell Global Solutions International B.V., for the design, fabrication and supply of its Gutor AC and DC uninter-rupted power supply (UPS) products for North American applications.

Under the EFA, Schneider Electric will also provide training, commissioning and maintenance service to some of Shell’s refining and chemical sites.

Schneider Electric provides customized Gutor UPS system solutions of a high technical standard as well as other related services which are mainly used in the global oil & gas, petrochemical, chemical and nuclear, conventional power generation industries. With specialized Gutor operations in Brazil, China, Germany, India, Japan, Malaysia, Mexico, Russia, Saudi Arabia, the United Arab Emirates and the USA, Schneider Electric and its strategic partners offer a global business and service network.

RAJESH MAURYA, COUNTRY MANAGER, INDIA & SAARC FOR FORTINET

CHANNEL STREET

07JU NE 2014

channel street.indd 7 28/06/14 11:27 am

Page 8: June 14

NETIQ ROLLED OUT NEXT-GEN WORKLOAD MANAGEMENT PRODUCTS

NetIQ has unveiled a new generation of PlateSpin workload management and disaster recovery products, including PlateSpin Forge 4, PlateSpin Protect 11 and PlateSpin Migrate 11.

When combined with PlateSpin Recon 4, the latest version of NetIQ’s planning and analysis tool, the PlateSpin family allows IT profes-sionals to set and maintain accurate service-level agreements (SLAs) for disaster recovery (DR), protect physi-cal servers in an increasingly virtual world, and speed up transfers while reducing downtime during server migration.

Today’s enterprises are challenged to meet increasingly aggressive recovery point objectives (RPOs) and recovery time objectives (RTOs), while protecting more server work-loads with stagnant or even shrinking budgets. What’s more, limitations of existing solutions prevent IT depart-ments from backing up both their physical and virtual workloads to the same infrastructure.

“Business user expectations – driven by their smartphone and tablet experiences – for access to corporate data are unforgiving: it’s access at anytime from anywhere. Those expectations feed the aggressive RPOs and RTOs IT administrators are pushing to meet,” said Mike Robinson, senior manager, Solution Strategy at NetIQ.

An optimized SUSE Linux Enterprise Server together with the new HP ConvergedSystem 900 for SAP HANA has set record-breaking benchmarks, operating more than twice as fast as similar SPARC solutions announced the press release.

SUSE worked with HP to make performance-enhancing changes to the Linux kernel that enabled the record-setting performance on HP hardware.

“Creating a ‘fastest-ever’ platform is not just a technical accomplishment – it means real-world value for enterprises of all sizes running high-performance and mission-critical solutions,” said Michael Miller, SUSE vice president of global alliances and marketing. “Working with partners and adapting Linux to unlock the full potential of their increasingly sophisticated hardware and software is what SUSE does best. In this case, our close collaboration with HP and SAP delivers

ground-breaking results that help our custom-ers succeed and will also benefits the greater upstream Linux community in the future.”

Paul Miller, vice president of marketing, HP Converged Systems, said, “Record-breaking performance never happens by chance. The HP ConvergedSystem 900 for SAP HANA is the best platform for real-time in-memory computing, and our work with SUSE helps customers get the most out of the architecture.”

HP and SUSE achieved these results by work-ing together to apply HP patches fine-tuning the Linux kernel, making changes to the semaphore and locking paradigms in the kernel (mutex locks, lockless reference counts) which enables the scaling of large numbers of processors. The process scheduler was also modified to help maximize the efficiency of the appliance. These modifications will be available to all users in future SUSE Linux Enterprise releases.

VMWARE HORIZON 6 FOR INDIAN ENTERPRISES LAUNCHED

VMwarehas unveiled Horizon 6, an integrated solution that delivers published applications and desktops on a single platform.

Horizon 6 is the industry’s most comprehensive desktop solution with centralized manage-ment of enterprise applications and desktops, including physical desktops and laptops, virtual desktops and applications and employee-owned PCs announced the press release.

“With India’s increasingly mobile and young workforce today, organizations are busy prepar-ing for the mobile cloud era. They want to transform their applications and enterprise desktops and extend access to employees on any device, from anywhere and want a comprehensive solution that is simple, secure and cost effective,” said Ramesh Vantipalli, Head EUC India & Regional SE Manager - South, VMware India.

SUSE with HP Set Record-breaking Benchmarks

JUNIPER AND ARUBA PARTNER TO OFFER CONVERGED SOLUTIONS

Juniper Networks and Aruba Networks have signed a strategic agreement to deliver open, con-verged wired and wireless network solutions based on best-of-breed technologies.

“With Aruba we jointly deliver a unique, interoperable wired and wireless solution that will enable customers to realize performance,

cost, intelligence and simplified management benefits. Additionally, Juniper’s Open Convergence Frame-work provides customers with comprehensive solutions optimized for the unique requirements of the Enterprise,” said Shaygan Kheradpir, CEO, Juniper Networks.

“Aruba’s joint development agreement with Juniper Networks

brings together the best in mobility technology with a leader in wired switching and routing. The resulting right-sized network will help automate and accelerate business operations and deliver an integrated mobility experience on which #GenMobile can depend,” said Dominic Orr, CEO, Aruba Networks.

DOMINIC ORR, CEO, ARUBA NETWORKS

CHANNEL STREET

08 JU NE 2014

channel street.indd 8 28/06/14 11:27 am

Page 9: June 14

MakeMyTrip.com Adopts Dell SolutionsDell has been chosen by MakeMyTrip.com to deliver improved performance and high avail-ability for its e-commerce site.

The Dell solution, comprising of Dell PowerEdge 12th generation servers and Dell PowerVault storage, provides a virtualized infra-structure helps improve operational efficiency for Makemytrip.com while reducing management time by 50 percent announced the press release.

MakeMyTrip wanted to consolidate its data center on high-performance servers to outpace market growth within the expanding online travel sector in India. They needed servers that deliver higher performance and could take more load without increasing density or energy consumption.

MakeMyTrip deployed Dell PowerEdge 12th

generation servers to consolidate its data center infrastructure running the company’s private cloud. MakeMyTrip used Dell PowerVault direct attached storage to provide additional storage capacity for its database and server needs. PowerVault Storage is also used as network storage when data needs to be shared across the LAN environment.

“When customers are searching for a particular travel package, they want highly targeted, quick results or they will simply go elsewhere. With high-performance hardware from Dell, our infrastructure is delivering 30 percent better performance to our site when compared with the existing hardware, which means we can serve our customers faster,” Sanjay Kharb, Vice President (IT), MakeMyTrip.com.

SAP SIMPLE FINANCE UNVEILEDSAP AG has introduced SAP Simple Finance, a set of solutions to bring the simplicity of SAP Cloud powered by SAP HANA to finance departments worldwide.

As a leader in finance solutions for the last several decades, SAP worked closely with custom-ers to identify the most complex tasks in finance and make them simpler to consume and perform announced the press release. The result is SAP Simple Finance, based on SAP HANA in SAP HANA Enterprise Cloud, delivering real time insights to CFOs and finance departments so they can transform their business.

SAP Simple Finance takes full advantage of the in-memory SAP HANA platform with new finance capabilities, offers a new and beautiful user experience for easy access, all deployed in SAP HANA Enterprise Cloud under a full subscription model, making it easy for finance departments to adopt these solutions further announced the release. This modern finance software is designed to help CFOs accelerate their finance transformation and deliver strategic outcomes to their business.

“Thousands of companies around the globe run their finance processes relying on SAP solu-tions. The launch of SAP Simple Finance defines a completely new era with solutions designed to help our customers foster agility, flexibility and therewith simplicity in every business process,” said Bernd Leukert, member of the Executive Board of SAP, Products & Innovation.

TECHNOPARK PARTNERS WITH HP

The Technopark-Technology Business Incubator (T-TBI) has added another enabler for startups looking to achieve global competitiveness by partnering tech major HP for cost-effective and dynamic cloud computing services.

With this the Technopark-TBI has become the first incubator in

India to roll out cloud computing technology for startups and the services is the first-of-its-kind for HP in India announced the press release.

HP Enterprise Service which will provide cloud services exclusively to TBI incubated companies at special, discounted rates through Trivandrum-based Techpool

Consultancy Services.Dr K C Chandrasekharan Nair,

Managing Diector, Technopark TBI, signed the memorandum of understanding with Regi Mathai, Managing Director, Techpool at a ceremony at Park Centre, Technopark on Thursday.

HP Enterprises Services Director Susanta Bhattacharya handed

over the HP operation letter to Technopark-TBI CEO Hrishikesh Nair.

“The service marks a new chapter for TBI and will be able to meet the growing computing infrastructure and data requirements of the incubatees and accelerate technical innovations in the IT sector,” said Nair.

RED HAT ENTERPRISE LINUX FOR SAP HANA LAUNCHEDRed Hat is expanding the company’s strategic alliance with SAP AG to make it easier for customers to adopt and run the SAP Data Management portfolio, including the SAP HANA platform, SAP Adaptive Server Enter-prise (SAP ASE), SAP IQ software, and the SAP SQL Anywhere suite on Red Hat’s open source solutions.

The expanded collaboration is expected to enable real-time, in-memory innovation by providing an open, scalable, integrated and highly-available platform for solutions from SAP along with those that are custom-built in an effort to expand customer choice when it comes to fueling business performance and helping enterprises realize increased value from cloud computing and big data announced the press release.

As the foundation of the enhanced partnership, Red Hat Enterprise Linux is now available and qualified for production use of SAP HANA and supported by partners’ SAP-certi-fied hardware solutions. SAP HANA enables customers to capture business transactions to help make smarter, faster decisions through real-time analysis and reporting combined with dramatically accelerated business processes. Customers can now also enjoy expanded choice when it comes to their deployments of SAP HANA to experience the industry-leading reliability, quality and stability offered by Red Hat Enterprise Linux.

CHANNEL STREET

09JU NE 2014

channel street.indd 9 28/06/14 11:27 am

Page 10: June 14

SIEMENS LAUNCHED APAC COC IN MUMBAI

AKAMAI ENABLED ECI WEBSITE DURING ELECTION RESULTSAkamai Solutions, built on its Intelligent Platform, provided the reliability and scalability needed to support high levels of user traffic for ECI website on the day of the election results. ECI website (http://eci.nic.in/) recorded 450 million user hits in a single day and at peak offloaded 99 percent of its traffic on Akamai’s Intelligent Platform.

“On the day of the election results, we saw a massive spike in traffic on our website with 450 million hits, the largest ever online hits on our election site. Managing such high volumes of traffic on a single day requires a robust online infrastructure. With the support of Akamai, we were able to offload 99 percent of our traffic onto their platform and deliver a fast, reliable and seamless user experience. This has delighted our organization and helped us deliver a flawless online experience to the citizens of India,” said Dr. Alok Shukla, Deputy Election Commissioner, ECI.

“Information access has become instantaneous and the Internet is becoming the dominant source for consuming news. Our role in being able to deliver the results for the elec-tion online further shows the strength of our global Intelligent Platform,” said Sidharth Malik, MD and VP (India), Akamai Technologies.

HP Moonshot Innovations Redefine Data Center PerformanceHP announced HP Moonshot innovations that give enterprises the speed, agility and lower eco-nomics to build next-generation data centers that will power tomorrow’s successful organizations.Data centers are reaching an unsustainable point—in the next five years the average enterprise will see data capacities grow more than 800 percent.(1) Enterprises need to be able to manage this exponential growth in data while introducing new applications, such as big data and analytics, using delivery models such as virtualized infrastructure and the cloud. Yet, enterprise innovation is constrained by the complexities of outdated IT. Organizations must optimize and modernize to deliver a New Style of IT that accelerates revenue generation, drives innovation and reduces business risk, while at the same time reducing overall costs.HP understands what is needed in the data center of the future and is driving innovation that

addresses IT challenges created by social, cloud, mobile and big data. Enhancements to the HP Moonshot system include:With HP ConvergedSystem for Hosted Desktops, clients can deliver the business graphics and mul-timedia performance of a traditional desktop PC with 6 times faster graphics frames per second, compared to other virtual desktop infrastructure solutions. “Organizations across the region are under enor-mous pressure to build an efficient infrastructure to grow, compete and be ready for what’s next,” said Vikram K, director, Servers, HP India. “Today’s announcements demonstrate HP’s con-tinued commitment to transforming the server landscape with customer-inspired innovations to Moonshot servers that enable organizations to be faster, smarter and more efficient now and into the future.”

HID GLOBAL WINS AIM AWARDHID Global has been awarded Most Innovative Use of RFID Technology in the AIM 2014 RFID Case Study competition for its solution that combines RFID tags with NFC-enabled smartphones at Bodega Norton Winery in Argentina. Use of the company’s RFID technology was also integral to Snapsportz being name a runner up for the Most Innovative Use of RFID in the RFID Journal Awards.

Both awards were announced in conjunction with RFID Journal Live!, where HID Trusted Tag Services was also a finalist for Best in Show.

“HID Global is pleased to be recognized by two of the most prestigious and influential orga-nizations in the industry for our cutting-edge expertise and innovative solutions, as exemplified by their use by Bodega Norton Winery and Snapsportz at Princeville Ranch Adventures,” said Marc Bielmann, vice president of Identification Technology with HID Global. “These honors validate our industry leadership and reinforce the value of working with our trusted partners to deliver customized solutions that meet the unique needs of our customers.”

Siemens has introduced a Centre of Competence (CoC) for Data centers for the Asia Pacific region, head quartered in Mumbai, India.

The CoC will drive and support the growth of Siemens products and solutions for customers in Data Center vertical covering 10 countries across Asia Pacific region. The totally integrated solutions

from Siemens help create reliable and efficient Data centers and help reduce operating costs announced the press release.

Philip Krause, Head (Data center CoC), Asia Pacific, said, “Asia is one of the fastest growing markets in the Data center vertical and the CoC is strategically placed to offer global competency locally to the custom-

ers. Siemens has a unique strength to offer a wide portfolio of products and solutions spanning from power, safety, security, data center manage-ment solution and services from a single reliable partner. With our Account managers located in key countries, we are locally present at the customers place and this makes us unique.”

PHILIP KRAUSE, HEAD (DATA CENTER COC), ASIA PACIFIC

CHANNEL STREET

10 JU NE 2014

channel street.indd 10 28/06/14 11:27 am

Page 11: June 14

WEB CLIPSSEAGATE TO ACQUIRE LSI’S FLASH BIZ

FROM AVAGO FOR $450 MILLION

Seagate and Avago Technologies, a provider of

semiconductor device supplier to the enterprise

storage, wired, wireless and industrial end mar-

kets, have entered into a definitive asset purchase

agreement under which Seagate will acquire the

assets of LSI’s Accelerated Solutions Division

(“ASD”) and Flash Components Division (“FCD”)

from Avago for $450 million in cash.

The acquisition strengthens Seagate’s

strategy to deliver a full suite of storage solutions,

providing Seagate with established Enterprise

PCIe flash and SSD controller capabilities to

deliver solutions for the growing flash storage

market. LSI’s ASD business, which is the second

largest player in the PCIe flash space, offers a

highly differentiated enterprise-grade PCIe flash

solution focused on the high-growth cloud and

hyperscale markets.

PERSISTENT OPENS NEW BUILDING IN

GOA

Persistent Systems has opened a new office

building adjacent to the existing one in Verna,

Goa. The new building is fully constructed and

measures 3000 square meters. This doubles the

existing area and the combined facility will accom-

modate 700 developers.

Keeping with the tradition of naming buildings

after prominent Indian figures, Persistent

announced that the two buildings will be named

Bhaskar and Charak. Bhaskar is a well-known

mathematician from the Seventh Century and

Charak is known for his contributions to Ayurveda.

DELL EXTENDS PARTNERSHIP WITH

IRIS COMPUTERS

Dell has partnered with Iris Computers for the

distribution of its enterprise and end user prod-

ucts and solutions. The partnership will initially

cover the Northern and Eastern parts of India

before extending nationally. The deal includes

the distribution of Dell’s end user computing and

enterprise range of products and solutions.

The partnership with Iris is expected to further

enhance Dell’s newly launched distribution

strategy, enabling Dell to reach Iris’s 3500 plus

partner base.

Vishal Sopory, CEO, Iris Computer Ltd., said,

“Dell has always given us great business oppor-

tunities. While this deal is presently applicable for

the northern and eastern markets only, we look

forward to implementing it nationally.”

Nucleus Software win AwardsICICI Bank and its technology partner Nucleus Software have been named the winners of the Best Lending Platform Project Award during the eighth Asian Banker Technology Implemen-tation Awards Programme, held at the Kuala Lumpur Convention Centre, Kuala Lumpur on May 21st 2014. The awards ceremony was held in conjunction with The Asian Banker Summit 2014, the foremost annual meeting for decision makers in the financial services industry in the Asia

Pacific region.ICICI Bank and its technol-

ogy partner Nucleus Software introduced MARC, a mobile-based Automation of Receipts on Collection Activities Processing System (CAPS), a solution that allows customers to make payment anytime, anywhere while eliminating the need for hand-written receipts. This mobile-based software has been implemented on Android and Symbian OS. It updates transaction details, generates payment receipts on a paired

blue-tooth printer, and pushes SMS and e-mail confirmations of transactions to the customer. The system enables straight-through processing and tracks payment on a real-time basis and has resulted in consider-able cost savings by freeing up over 200 bank employees involved in physical receipt issuance and reconciliation and manual updating of receipt details into core systems. It has been implemented at 50 locations with 150 channel partners.

NUMBER GAMEMOVEMENTS

Cisco named new leader-ship for India with DINESH MALKANI becoming President - Sales for India & SAARC;AMIT PHAD-NIS becoming President

- Engineering & India Site Leader; and V C GOPALRATNAM (GOPAL) assumes as President - Strategy, Planning and Opera-tions, India and CIO, Asia Pacific and Japan

& Greater China.

Symantec has named ADRIAN JONES as SVP for its AP and Japan region.

Dell Services has named PRASAD THRIKUTAM as president and global head, Application Services. NetApp has appointed HARISH ARORA to vice president of engineering.

4.9%

increasehappened in Worldwide Security Software Market during 2013

WIPRO TO OFFER MOBILITY SERVICES FOR SAP MOBILE SOLUTIONS

Wipro has signed an agreement with SAP through to deliver managed mobility services for SAP mobile solutions.

Through this offering, Wipro intends to help customers improve business outcomes, increase agility and help reduce costs. Wipro’s managed mobility services offering will bring together its industry-domain expertise and systems-integration experience with SAP’s industry-leading mobile solutions announced the press release.

Wipro’s cloud-based, managed mobility services offering for SAP mobile solutions will span SAP solutions including the SAP Mobile Platform, the SAP Work Manager mobile app and the SAP Mobile Secure solution for mobile device and application management.

CHANNEL STREET

11JU NE 2014

channel street.indd 11 28/06/14 11:27 am

Page 12: June 14

TOYOTA ADOPTS SIEMENS’ TEAMCENTER SOFTWARE

SAP TO DOUBLE ADDRESSABLE MARKET BY 2015SAP has ambitious goals for 2015 – to double the size of its addressable market, achieve revenue of euro 20 billion and reach 1 billion people – goals which can only be reached as an open innovator in collaboration with our rich partner ecosystem. With more than 420 partners today in India, SAP provides both local and worldwide support for all SAP markets and solutions to help fuel innovation and provide choice for customers of all sizes. By 2015, at least 40 percent of SAP’s software revenue will come from partners.

“Speed-to-market is the winning edge in today’s highly networked economy, and that’s why our partners are adopting SAP technologies for use in their solutions. They want to expedite development and create innovative offerings without having to invest more in R&D. When they turn to SAP business innovation platforms they accelerate their development, they help grow the ecosystem, which in turn fuels more innovation,” said Anthony McMahon, Senior Vice President, Global Partner Operations, SAP Asia Pacific Japan.

Developed to support partners with latest innovations, often tailored to a specific industry or use case by the ecosystem, SAP’s new approach aims to lead to a future of personal-ized products and services.

Blue Star Broadens Partnership with Grasp TechnologiesBlue Star Infotech broadens of its strategic part-nership with Grasp Technologies Inc., a leading provider of custom reporting, data management, and data consolidation solutions. Through this expansion, both organizations will continue to build a 360 degree relationship that will include joint product development, service delivery, go to market and customer engagement.

Blue Star Infotech will offer solutions based on Grasp’s platform and will bolster its implementa-tion services / solutions delivery. Furthermore, a joint go-to-market strategy will complement both Blue Star Infotech and Graph’s plan to cross leverage mutual synergies and address business reporting problems for their customers worldwide.

After Blue Star Infotech’s strategic investment in Activecubes India Pvt. Ltd., a leading provider of Business Intelligence and Analytics Solutions in the last fiscal year, the partnership with Grasp

will further enhance its capacity in the analyt-ics sector with diverse world class solutions. Commenting on the occasion, Sanjeev Sethi, President, Blue Star Infotech (America), Inc. said, “We see this association as an opportunity to utilize Grasp’s expertise to expand our prospects and build even more robust solutions. By combining our strengths, we are well suited to handle the increased traction in BI and Analytics across any number of industry verticals. This will further enhance our capabilities and strengthen our foothold in the global analytics market which is growing exponentially.”

As part of this partnership, the two companies will work together to develop solutions that will address the emerging needs of their customers in the BI and Analytics sector. It will provide a significant potential for both companies to accel-erate their growth momentum and strengthen their ability to serve a large base of customers.

KPMG LAUNCHES NEW GLOBAL DATA & ANALYTICS INSIGHTS LAB

KPMG has launched KPMG Insights Labs in Bangalore, a virtual R&D center that will serve as a global innovation hub with the aim to incubate and develop data-driven business solutions for KPMG member firms’ clients.

The creation of KPMG Insights Labs is the latest step KPMG has taken in recent months to expand its portfolio of data & analytics (D&A) solutions and services, with new innovative solutions to help member firms’ clients unlock the value of their data.

In November 2013, KPMG International announced the launch of KPMG Capital a fund created to accelerate innovation in D&A services and solutions. And, since December 2013, KPMG member firms in the U.S., U.K. and Australia announced a number of acquisitions or partnerships that are designed to offer D&A and digital solutions to clients helping them manage risk and cost, and drive growth.

Toyota Motor Corporation has expanded its vehicle safety informa-tion management system based on Siemens’ Teamcenter software. The system has been in use since Janu-ary 2013 as part of a comprehensive initiative to produce safe vehicles for its customers.

Teamcenter was selected based on the proven track record of its technology and its widespread

usage throughout the global manufacturing industry.

After evaluating several PLM software systems, Toyota selected Teamcenter. Toyota cited the widespread adoption of Teamcen-ter by the global manufacturing industry and Siemens’ open policy for PLM technology as important factors in its decision. Toyota’s successful deployment of Teamcenter has allowed it to enhance collaboration

between multiple divisions and significantly improve traceability management. This facilitates its ability to comply with functional safety standards.

“We are extremely proud to have earned the confidence of Toyota for such an important global initiative,” said Chuck Grindstaff, president and CEO of Siemens PLM Software.

CHUCK GRINDSTAFF, PRESIDENT & CEO, SIEMENS PLM SOFTWARE

CHANNEL STREET

12 JU NE 2014

channel street.indd 12 28/06/14 11:27 am

Page 13: June 14

for cybercriminals to penetrate these data-rich cloud platforms for profitable motives. While attackers are customizing their threats to target each of these platforms to steal confidential information, loss/theft of mobile devices present new ways in which critical data is compromised. Attackers are also using information about individuals’ personal lives from social networking sites and other online destinations to craft attacks that are targeted at specific people, through which they gain entry into the corporate network.

Security and virtualization suites must be integrated for hybrid environments, so that a single console may be used to manage security across physical, virtual, and cloud infrastructure. To meet the challenges of rapid provisioning, it will also be important that contextual security information be made available to non-traditional security staff, while maintaining established separations of duties and privileges. To derive the greatest value from information and safeguard this key business asset, organizations need to use people, processes and technology, along with a holistic and information-centric approach to security. The key is to focus on basic fundamental building blocks of security that aim to protect information no matter where it resides, in a holistic, risk-based and policy-driven manner, one that protects information and infrastructure.

What should be the security solutions for enterprises going forward – should they be on-premise (appliance or software based) or off-premise (services)?With the uptake in the trend of enterprise mobility, businesses are exposed to threats from multiple endpoints. Corporate information is now available across platforms and on multiple devices. As the threat profiles complicates and newer techniques are used to administer targeted attacks; CIOs must be alert and craft their security measures strategically. Enterprises need holistic coverage to adequately detect and respond to targeted attacks. Symantec Managed Security Services -Advanced Threat Protection (MSS-ATP), a managed service significantly reduces the time taken to detect, prioritize and respond to security incidents by producing inte-gration between its endpoint security and third-party network security vendors’ products. This data enables customers to rapidly and effectively contain, investigate and remediate unknown and zero day attacks that evade traditional security solutions. By prioritizing real threats, IT organi-zations can reduce false positives and operating costs and ensure that they are protecting against the most significant vulnerabilities. ë

With growth in Virtualisation, Cloud Computing and BYOD adoption, security risks are also rising. How should enterprises counter this problem? Mobility, BYOD, Cloud, Virtualization and Big Data, to name a few, are disruptive forces radically changing enterprise technology today. The combination of these has triggered an explosion in the quantity of data being created, shared, and managed by enterprises. As IT infrastructure

becomes more complex and information is dispersed across devices, apps, locations, physical, virtual and cloud, attackers have new avenues and gaps to exploit. Also, increasingly enterprises and individuals are using public clouds to store and access data. As per the latest Norton Report 2013, 29 percent individuals in India and 24 percent across the world are already practicing this trend. With the rise in usage of platforms such as cloud for both personal and official information, it is highly likely that we will see this as an easy target

IN AN INTERVIEW WITH ENTERPRISE CHANNELS, AMITABH JACOB, DIRECTOR-

CHANNEL, INDIA, SYMANTEC TALKS ABOUT HOW THE ENTERPRISE SECURITY

SPACE IS EVOLVING WITH VIRTUALIZATION, CLOUD AND MOBILE GETTING

POPULAR

“Hackers are Targeting Cloud”

AMITABH JACOBDIRECTOR-CHANNEL, INDIA, SYMANTEC

MY VIEWS

13JU NE 2014

My Opinion_Symantec.indd 13 28/06/14 11:04 am

Page 14: June 14

SECURITY

Surveillance Industry Coming of AgeEnough discussions have been done around the presence of surveillance mechanism in strategic time and locations. Now with affordability of the solutions and growing threat landscape, the time has come that the enterprises and government sectors move faster and start investing in surveillance technologies for a safety environment.

n W O R D S : S A N J AY M O H A PAT R A < S A N J AY @ E T E R P R I S E C H A N N E L S . C O M >

With unbridled growth in security breaches, terrorism activities and rise in criminal activities, investment on surveil-

lance technology and solutions has really picked up in India. For the enterprises those who are doing business with the global market, surveil-lance at India operations has almost become a compliance need. All the public offices and places are now covered under the surveillance and it is growing every year. The objective is very simple. The organizations are examining their security risks in greater detail and ensuring that they protect their people, assets and infrastructure. The government is encouraging smart and safe cities. The administration – be it private or government - has stepped on the gas to defuse unforeseen events by implementing more and more surveillance mechanism. Technologies such as access control, HD CCTV and Auto-matic Number Plate Recognition (ANPR) are

seen implemented increasingly. The increased investments on infrastructure – transportation, modern airports, metro rail, nuclear and thermal power plants and ports are also triggering growth of the surveillance solution as these projects demand very high levels of security. Growth in BFSI, BPO, education, retail and realty sectors are also helping grow the security market. Result of which the India Video Surveillance market is expected to reach Rs.5,717.64 cr (US$952.94 million) by 2016, with a CAGR of 32.49% from 2011-2016. In 2011, though analog based surveillance systems have accounted for majority of the share of nearly 68% in the overall market, yet IP based surveillance systems are expected to grow with relatively higher CAGR of 41.78% from 2011-2016.

From the trend perspective, Rajeev Samanta, Regional Sales Director South Asia, Tyco Security Products, says, “The transition from analog to digital technologies continues to gather momentum. Most projects being implemented

today involve network cameras. With all the advances in digital technology and connectivity, the tipping point in favor of digital is just 2-3 years ahead. Edge devices are making inroads.” “Edge intelligence that allows network cameras to process images, perform image analysis and make decisions is gaining traction in the industry. For example, exacqVision Edge server software from Tyco Security Products can be loaded directly on the camera instead of a PC based server. It stores video to the camera’s SD memory card, and can archive to networked storage. exacqVision edge runs on every camera, eliminating a single point-of- failure for multi-camera systems,” he adds.

Manoj Khadikikar, Head of channel solutions, Zicom Electronics, adds, “Products plus Services are becoming more and more relevant and popular as compared to Products per se. Customers are looking for business value in surveillance security solutions. All pervasive, online and proactive solutions are on the fore driving the technology roadmap.”

FEATURE

14 JU NE 2014

Feature-Surveillance.indd 14 28/06/14 11:02 am

Page 15: June 14

When there is a huge growth opportunity opening up in the country, the concept of surveil-lance as a service is also catching up. Distributed

enterprises such as retail networks who do not wish to make expensive investments on security systems and manpower, for them getting the security becomes viable as they need to pay a monthly fee to the service provider. They get web access from anywhere and even back up video recordings at central locations.

Samant says, “While this idea is catching on abroad it still has to take off in a real sense here in India. Yes, it can have a bright future here too provided the industry invests in building aware-ness and provided band-width costs come down substantially. As the trend towards IP continues, providing service on the cloud will become

popular as IP cameras can be managed remotely.” Khadikikar says, “As the products become

more commoditized, the services will be the one and only differentiating factor. Various Services like Remote Managed Alerts as a Service or RMAaaS, e-Sense and e-Track have seen admi-rable acceptance and adoption by the customers. Businesses are looking at how a security solution, like any other asset, delivers a business value to the enterprise and also helps in reducing the TCO. Services – Online and offline need to be integrated at the Solution Providers’ end, so that there is coherent information emanating from various alarms and alerts from a variety of

VIDEO SURVEILLANCE MARKET IS EXPECTED TO REACH RS.5,717.64 CR (US$952.94 MILLION) BY 2016

FEATURE

15JU NE 2014

Feature-Surveillance.indd 15 28/06/14 11:02 am

Page 16: June 14

sensors and making the security a proactive and complete solution.”

Because of the availability of a lot of brands in the region, the products per se are becom-ing affordable. Plus the increasing awareness regarding the requirements of better security the buying behavior of the customers are also change for better. This situation opening doors for all big and small players in this domain.

INNOVATIONFrom the technology innovation perspective IP based solution is clearly making gains over the analogue devices. The IP-based network cameras are offering great flexibility, scalability and reliability. The picture quality of network cameras is a clear advantage. IP video systems can also be easily integrated with other IP systems like access control, intrusion and corporate databases. Network cameras can have intelligence in-built. Features like motion detection, alerts etc. make recording, monitoring and search easier and more efficient. Investiga-tions can be done more quickly. On a total cost of ownership criteria, network cameras and large IP networks also work out more cost-effective. As the customers are demanding more control

RAJEEV SAMANTREGIONAL SALES DIRECTOR

SOUTH ASIA, TYCO SECURITY PRODUCTS

“Most projects being implemented today

involve network cameras.”

KAUSHAL KADAKIAPRODUCT MANAGER– VIDEO SURVEILLANCE SOLUTIONS,

MATRIX COMSEC

“The provision of integration with access

control as well as the fire alarm panel allows the user to obtain high-end

security.”

MANOJ KHADIKIKARHEAD OF CHANNEL SOLUTIONS,

ZICOM ELECTRONICS

“Products plus Services are becoming more

and more relevant and popular as compared to

Products per se.”

THE ADMINISTRATION – BE IT PRIVATE OR GOVERNMENT - HAS STEPPED ON THE GAS TO DEFUSE UNFORESEEN EVENTS BY IMPLEMENTING MORE AND MORE SURVEILLANCE MECHANISM.

over their assets, they are asking for prompt and proactive solutions, which IP based cameras are able to do. The devices are catering exactly to the need of the customers by providing intelligence and analytics instead of only video alerts. These new crop of solutions are completely doing away with the manual intervention to make it more automated.

Kaushal Kadakia, Product Manager– Video Surveillance Solutions, Matrix Comsec, says, “With the latest video compression technique H.264 being adapted for optimization of band-width as well as storage capacity, video surveil-lance market offers the user benefits of saving cost. The provision of integration with access control as well as the fire alarm panel allows the user to obtain high-end security. Object Recogni-tion as well as Identification is possible using

the various video surveillance techniques which satisfy the various needs of users.”

Aditya Khemka CEO & Director, Aditya Infotech Ltd. added, “Innovation is aimed at more specific products for customer needs. The customer can either one who is using the old system, undergoing transition or opted for system upgrade."

Recently, Aditya Infotech introduced HDCVI technology, which raises the bar of video quality with its ability to work with lossless transmission over long cable runs as long as half a kilometre. Another important induction from the company was Quadra series, which aimed at cameras’ workability in higher voltage range with surge protection, heatless design, crisp image, least optical interference and so on. Khemka main-tains, “We, at Aditya Infotech Ltd, are committed

FEATURE

16 JU NE 2014

Feature-Surveillance.indd 16 28/06/14 11:02 am

Page 17: June 14

more than 1800 different camera models, is easily deployable in a virtual environment and has versatile mobile applications to help you see live or recorded video from any location. Our intru-sion alarm brands include DSC, SUR-GARD, BENTEL and Visonic –spanning wired, wireless and hybrid technologies. Elpas has a great portfolio of location based tracking of assets and staff in healthcare and commercial applications. Proximex is a global leader in PSIM.

Samant adds, “We are uniquely respected for our interoperable, unified solutions. Our prod-ucts are designed and manufactured to perform reliably and to protect your investments. New systems are compatible with earlier versions –so your previous investments are always secure.”

Zicom offers multiple solutions with an assur-ance of 24x7 response management service in case of any emergency. Further, customized MIS Reports can be accessed by its customers by a simple secured login. Khadikikar says, “The com-petitive advantages our customer get are that we offer our ground services in over 1000 locations across the country. We cover tier 1 to tier 5 cities effectively. Our state-of-the-art Zicom Command Centre monitors our customer’s security system and gives real time updates.”

Similarly, Matrix offers video surveillance range of products includes Network Video Recorder, Hybrid Video Recorders, Digital Video Recorders, Analog and IP Cameras which are sold as an enterprise solution along with the centralized management software (CMS) and a mobile application for Android and iPhone (SATATYA MV) for remote management. Kadakia adds, “Our products are most suitable for enterprises who demand much more than just monitoring the area. The reliable solution provides multiple modes of remote and local monitoring, real time notification in the form of email and SMS, flexibility in recording along with other functions like backup management, user management leading to more security and productivity for enterprises.”

GO TO MARKETUntil some point when the surveillance market had not achieved its scale, the vendors were selling the products directly to the customers but for last 4-5 years, most of the vendors have started engage the channel partners to distribute product. Matrix as a domestic company promotes the products through trade fairs, exhibitions, road-shows and advertisements. Kadakia says, “Matrix always operates through a well-defined and trained channel network consisting of consultants, resellers, system integrators and distributors.”

Zicom runs its business through Traditional Security and IT Channel partners. It has presence over 500 cities and town across India and the number is steadily increasing. Khadikikar says, “We are perhaps one of the very few security solutions providers with pan India presence both for products and customer support.”

As far as Tyco Security Products is concerned, most of the company’s products are manufac-tured abroad and the company believes in having a strong support structure here to back them. So, they are very choosy about our distributors and system integrators. However, in India, they operate through two distributors for their access control and video surveillance business and one distributor for the intrusion security business. Samant maintains: “These distributors are a reflection of us – helping us with brand recognition and customer support. We have more than forty five system integrators as our partners across India. These integrators are trained and certified in our products and capable of taking on projects small and large; from the corner market to something the size of the T3 Terminal at Indira Gandhi International Airport in New Delhi.”

Aditya Infotech being the distribution company for many of the security and surveil-lance brands believes in channel empowerment, education and training as go to Market strategy. Hence, it has strong and dedicated backend team to train the channel partners on new technologies and products.

Khemka says: “We understand that the security needs of every single business vertical are different, with challenges that are unique to the particular business unit or region. These challenges need to be met with solutions that have been tailored to suit the needs, environment and surely, the budgets.”

FINALLY…With the given potential of the market in India, there is no local manufacturing or R&D activities in the country except one or two exceptions. So there is a need of the hour that the government creates a policy to attract more investments from big international players and to encourage local R&D is required. This will encourage those engaged in high-end technology. More rules need to evolve on aspects like cyber security, privacy, surveillance of staff at the work place etc. Secondly the vendors should come out with aggressive subscription model to trigger a high growth. With the change of guard at the Centre, there is every possibility the government sector will step up the home land security therefore adoption of surveillance and security is bound to happen in all the sector in next 2-5 years. ë

ADITYA KHEMKA CEO & DIRECTOR, ADITYA

INFOTECH LTD.

“We, at Aditya Infotech Ltd., are

committed to bring best-of-technologies and

products at value for money proposition.”

to bring best-of-technologies and products at value for money proposition, thereby, redefining best in the video surveillance industry.”

SOLUTIONSAddressing the diverse needs of the customers Tyco Security Products offer unified solutions in access control, video surveillance, intrusion detection and location-based tracking. In these separate categories the company has twelve different brands. Within access control the company offers three brands: Software House, CEM Systems and Kantech. They are designed keeping different kinds of projects/security needs in mind –from access control for large, global enterprises to infrastructure projects to easy, quick to set up access control for SMEs. The company has a world renowned video brand in American Dynamics. It represents the best video technology that money can buy. In DSC we have a video brand that is a good value proposition –price wise, for customers in APAC and India.

ExacqVision is one of the most amazing video management systems in the world. It is scalable from a single camera solution to an enterprise solution with thousands of cameras. It supports

FEATURE

17JU NE 2014

Feature-Surveillance.indd 17 28/06/14 11:02 am

Page 18: June 14

What all modifications that have been brought into the revised WSP program?There are many new enhancements to the WSPP, probably too many to list here but one of the common complaints we hear in the market when the topic of channel programs is mentioned is the timeliness of rebate payments. A delayed pay-ment can not only impede the flow of business and success of winning a deal but the overall profitability for the partner waiting for a rebate to hit their account. It’s important our WSP’s have the opportunity to gain competitive advantage through up-front discounts and under the new program they not only have this but additional ways to increase margin such as using the new online deal registration system to lock in new opportunities. Once the new opportunity is qualified, they earn additional margin for that deal immediately!

How will this open a window of opportunities for your existing partners in terms of building revenues, increasing profitability and business expansion?We have many new ways for partners to grow with WatchGuard. Firstly, we run a series of webinars and end user events that we co-sponsor with partners so that we work hand in hand to educate their market and build a strong healthy pipeline together. Our partners know The WatchGuard Value Proposition is the most compelling in the market – we provide the highest UTM throughput, the only vendor with best in class security services from world leading brands such as Websense, Trend Micro and Kaspersky and the most comprehensive management platform highlighted by the recently launched visualisation tool, Watch-Guard Dimension.

How are you going to leverage this program to tap in new/potential partners in the country?We welcome all resellers to connect with WatchGuard and learn about our products and services and I encourage all reading this article to register their interest via www.watchguard.com/partners/ and we’ll be sure to get in contact with you. Having said that, it’s important to strike a good balance between quantity and quality. As a WSP you don’t want to invest time in conducting a PoC only to lose a deal to a discount house down the road so to that end we work hard to ensure our WSP’s, who have committed to our joint business, are protected as best possible when time is invested. ë

What is the rationale behind re-launching the popular WatchGuard Secure Partner Program?WatchGuard is a 100% channel focused company so we’re always looking at ways to improve our channel engagement model. The new program is designed to enhance partner opportunity and profitability in three key areas – growth, value and expertise. We have introduced new programs and investment in activities designed to grow business with our most loyal and technically capable

partners. At the same time, we understand Indian customers seek value in their IT acquisitions as so we’re introducing The WatchGuard Value Proposition to help top partners align security with core business goals and objectives. All of this is not possible without a strong security capability and while we continue to innovate on the product side, it’s important to keep partners educated, trained and certified with the latest developments and we offer this through our both on-site and on-line training facilities.

RECENTLY WATCH GUARD LAUNCHED AN AGGRESSIVE PARTNER PROGRAMME

OFFERING AMPLE SCOPE FOR THE PARTNERS TO GROW AND MAKE HEALTHY

MARGIN. SCOTT ROBERTSON, VICE PRESIDENT - APAC AT WATCHGUARD

OFFERED HIS PERSPECTIVE.

“Making the Programme More Adaptive”

SCOTT ROBERTSONVICE PRESIDENT - APAC AT WATCHGUARD

MY VIEWS

18 JU NE 2014

My Opinion_wg.indd 18 28/06/14 10:55 am

Page 19: June 14

Implementing security is seen as buying insuranceThe companies shouldn’t underestimate the importance of investing in security as well. Just as in the rest of the world, hackers’ attacks are increasingly fierce.

SECURITY

n W O R D S : JAN VALCKE , C O O & P R E S I D E N T , VA S C O D ATA S E -

C U R I T I E S TA L K S A B O U T T H E G R O W I N G S I G N I F I C A N C E O F S E C U R I T Y

F O R S M B S A N D I N T E R N E T C O M PA N I E S

n P H O T O : S H U T T E R S T O C K

India’s small and midsize businesses (SMBs) lack complete understand-ing of the IT security landscape and tend to be reactive, rather than proactive, which can turn out more costly to manage. The market has some specifics that have to be kept in mind when doing business there. Not only the Indian customers’ well-known expertise of technology and the market’s price-sensitiveness are some characteristics, but also the country’s extensiveness and its huge number of various cultures and languages spoken are distinguishing. This has of course implications in terms of buying preferences.

India is a fast growing economy and so investments made across various sectors and markets are aggressive. The companies shouldn’t underestimate the importance of investing in security as well. Just as in the rest of the world, hackers’ attacks are increasingly fierce.

Hackers’ main target is where there are quick wins. Still, implementation of effective cyber security procedures is not up to the standards. Failure to effectively protect sensitive data can result

in millions of dollars in damages, which can potentially shatter business and consumer confidence in these industries.

Irrespective of whom the target is, according to the 2014 Data Breach Investigation Report from Verizon, the number one way hack-ers are gaining access to informa-tion on computer networks is –still - through the misuse of usernames and passwords. The report found that two out of three breaches exploit weak or stolen passwords.

With India being in the world’s top five for the highest number of incidences in cybercrime, there is still a lot of work to be done. More-over, the recent hacking incidents in the whole world have proven the insecurity of static passwords.

Unfortunately, implementing security is seen as buying insurance all too often: companies pay for it because it is cheaper than the possible disaster. Though, some recent hacks prove that security can be a critical key factor of existence. One of the most destructive outcomes though, is the reputa-tion damage caused by a hack, leading to customers staying away: a

disastrous consequence that cannot be quantified.

In short, strong authentication makes a company feel better safe than sorry: it prevents a damaged reputation and guarantees strong customer trust.

Investing in security is not something a company WANTS to do; it is something it HAS to do to stay in business.

If a company gives the guarantee that only the correct people can get access to particular applications, it will receive a favorable opinion with its customers. Currently, customers have high expectations of responsiveness and service from the organizations they do business with. Two-factor authentication can strengthen the relationships between a company and its customer or business partners.

Online application vendors and service providers are sharing user accounts, which can result in revenue losses and potential security threats. Strong authentica-tion addresses these problems. On the one hand, it secures the end user and his credentials. On the other hand, it ensures that only properly

authenticated users can gain access to online accounts. Hence authen-tication is not only a guard against end user security breaches; it is also available tool in the protection and retention of revenue.

Security has become an all-important matter, and we are sure it will become an even more paramount necessity in the years to come. High time to realize that applications should and can be properly protected!

Security has become a key factor to stay in business. A serious hack with all its consequences can break a company or organization. Look at the image damage Target had to deal with after the news that customer data were stolen.

The security of online accounts will remain one of the major challenges for the Internet sector, most certainly also in India. With the ever continuing growth of the Internet as a sales channel (as well as the growth of online selling applications) and the explosion of social media as communication and business channels, the need for adequate online security has never been more prominent. ë

GUEST TALK

19JU NE 2014

Guest Talk-Jan Valcke of Vasco.indd 19 28/06/14 11:53 am

Page 20: June 14

Penetration of mobile devices, social media, cloud and analytics in enterprises is creating unprecedented security challenges that channel partners have the opportunity to address

n W O R D S : S A N J AY M O H A PAT R A < S A N J AY @ A C C E N T I N F O M E D I A . C O M > n P H O T O : S H U T T E R S T O C K . C O M

SMAC CREATING SECURITY NIGHTMARES FOR ENTERPRISES

COVER STORY

20 JU NE 2014

Cover Story.indd 20 28/06/14 10:52 am

Page 21: June 14

The threat landscape continues to change due to pervasiveness of technology ranging from Virtualization to mobility to Big Data Analytics and so does the security landscape. The blurring lines between enterprise IT and personal IT

are putting stress on IT security objectives. As result, in the myriad of such technology evolution, the key question for a CIO remains to be ‘where to start’ in order to combat security challenges. Additionally, stringent SLAs and compliance regularities put lots of deployment complexities. Also, lack of clarity on data access is leading to insider threats.

Most of the organizations have large distributed networks, remote partners, external and internal employees, there is changing workforce so probability of having more open avenues for attackers are high.

“Moreover, with employees bringing their own devices into work and working across desktops, laptops and mobile devices, personal or company-owned, the number of devices that need to be secured has soared. In such a profit driven organized crime environment, attacks are becoming more sophisticated and any breach can result in huge expense for the violated business,” Kailash Katkar, Managing Director and Chief Execu-tive Officer, Quick Heal Technologies Pvt. Ltd., said .

“While Virtualization, Cloud and BYOD have opened up various business opportunities, these trends have further impacted the security landscape by enabling data accessible

to entities outside the scope of business,” said Vic Mankotia, Vice President, Solution Strategy, Asia Pacific & Japan, CA Technologies.

“The growing use of cloud-based and virtualised comput-ing resources drives dramatic efficiency gains—but security designed for physical servers can erase those gains when deployed in virtual environments,” Dhanya Thakkar, Managing Director, Trend Micro, India & Saarc said.

The increasing exposure of corporate networks to the Internet is primarily due to the adoption of mobile computing, web 2.0, and cloud-based applications, and more recently BYOD, said Jyoti Prakash, country director, HP ESP India & SAARC. “Every enterprise now is vulnerable to stealthy online infiltration by attackers who want to steal valuable proprietary information.”

OPPORTUNITY IN DISGUISEThe awareness for IT security is rising among Indian busi-nesses says The Enterprise IT Investment Trends Survey” conducted by Ernst & Young in India. The survey revealed Information security remains as one of the top priorities. Organizations with revenues higher than INR 50 billion have identified information security as a key priority.

The enterprise security market in India has seen a consider-able and consistent growth over the last few years. Rise in use of technology enabled services/ solutions, improved internet

COVER STORY

21JU NE 2014

Cover Story.indd 21 28/06/14 10:52 am

Page 22: June 14

penetration and evolution in digital consumption by enterprises, amongst others are some of the key trends that have fuelled this growth. According to RS Market Research Solutions the enterprise security market in India was estimated at Rs 3,423 crore in 2012 and is likely to grow at 14.76 percent to reach Rs 4,508 crore in 2014.

This presents a huge opportunity for partners who can expect high returns by focusing on this market. “Anyone involved with providing security solutions for an enterprise in the current

market should play the role of a consultant. It is imperative to understand the customers needs, risks, budget and then propose solutions,” Altaf Halde, Managing Director, Kaspersky Lab -South Asia said.

Cloud makes business data truly liberated with virtually no boundaries, as it can flow across applications over many user devices of differ-ent form factors. Therefore, the opportunity in security lies beyond box selling and in acting as consultants to businesses.

“It is no longer about securing end point devices or network boundaries, but now the emphasis is on securing data. This is done by defining and enforcing ownership, access and usage policies and having the right set of tools and applications to continuously monitor data transmission and usage,” Rajesh Ganesan, Director of Product Management, ManageEn-gine said.

“The technologies here have a varied usage and have their own set security strengths like

AMIT SINGH COUNTRY MANAGER, DELL

SONICWALL, INDIA

“Organizations should look at securing layered

portals for trusted communications as

security relies not only on standard security

implementations such as VPNs, IDSs and firewalls, but also to

more advanced security tools.”

SUNIL SHARMAVP SALES & OPERATIONS,

INDIA & SAARC, CYBEROAM

“The bottom-line of such policy should

reduce vulnerability of attacks and

better the business continuity.”

AMITABH JACOBDIRECTOR-CHANNEL, INDIA,

SYMANTEC

“Security and virtualization suites

must be integrated for hybrid environments,

so that a single console may be used to manage security

across physical, virtual, and cloud

infrastructure.”

RAJESH MAURYACOUNTRY MANAGER, INDIA & SARRC, FORTINET

“Most malicious infections are the result of exploits on vulnerable hosts, particularly those with out-of-date operating systems and application patches, weak passwords or poorly configured security settings.”

COVER STORY

22 JU NE 2014

Cover Story.indd 22 28/06/14 10:52 am

Page 23: June 14

THREAT STATISTICSin virtualization and BYOD and their own weaknesses. Organizations have to not only look at technologies but also ensure that processes & policies adequately support it,” said Vishal Bindra, CEO at ACPL.

WHAT SHOULD CISOS DO?CISOs face challenges on many fronts when it comes to making necessary strategies to secure the organizations. According to the Global Security Survey Report 2014, one of the most critical issues they encounter is the lack of awareness and insufficient education about the importance of security as a priority, among the employees.

“Organizations should look at securing layered portals for trusted communications as security relies not only on standard security implementa-tions such as VPNs, IDSs and firewalls, but also to more advanced security tools such as PKI and Authorization or Privileged Management Infrastructure (PMI),” Amit Singh Country Manager, Dell SonicWALL, India said.

Thus a multifaceted security approach, a com-bination of security solutions, helps organizations

India showed continuous growth, particularly in the percentage of victims of ransomware and online banking malware as a portion of the global total.

5%In Q1, about 5% of all malicious and high-risk apps were downloaded in India. 1 in 75 scanned apps were found malicious.

4%The number of spam sending IP addresses in India has been very high. It went up over the quarter and is also the 8th in world (4% of the entire quarter).

RANSOMWARE TARGETED USERS

28% US

22% Japan

9% India

6-8MILLIONEVERY MONTH, USERS IN INDIA ARE BLOCKED FROM VISITING 6-8 MILLION MALICIOUS SITES

Mini PC’s

www.rdp.inRDP Workstations Pvt. Ltd. , Sri Lakshmi Arcade, # 8 - 2 - 248 / B / 32,Journalist Colony, Banjara Hills -3,Hyderabad - 500 034. PH : 040 - 6457 1110.

1.5 GHz / 1 GB Ram / 8 GB Flash, 40 mm (W) x 200 mm (H) x 200 mm (D)

Pentium Dual Core(3 GHz) / 2 GB Ram / 500 GB HDD 60 mm (W) x 230 mm (H) x 205 mm (D)

Core i3 (3.3 GHz) / 2 GB Ram / 500 GB HDD,78 mm (W) x 222 mm (H) x 212 mm (D)

1800 200 2444call for free demo more details visit

XL-700 XL-600 XL-200

SMALLpowerful - efficient- reliable L

AUN

CHING

LAUNCHING

Ideal for Corporate, Healthcare, Education, Government, Financial services, Manufacturing Industries and Homes

COVER STORY

23JU NE 2014

Cover Story.indd 23 28/06/14 10:52 am

Page 24: June 14

KAILASH KATKARMANAGING DIRECTOR AND CHIEF EXECUTIVE OFFICER, QUICK HEAL

TECHNOLOGIES PVT. LTD.

With employees bringing their own devices into

work and working across desktops, laptops and

mobile devices, personal or company-owned, the number of devices that need to be secured has

soared.”

VIC MANKOTIAVICE PRESIDENT, SOLUTION STRATEGY, ASIA PACIFIC & JAPAN, CA TECHNOLOGIES

“While Virtualization,

Cloud and BYOD have opened up various business

opportunities, these trends have further

impacted the security landscape by enabling

data accessible to entities outside the scope of business.

RAJESH GANESANDIRECTOR OF PRODUCT

MANAGEMENT, MANAGEENGINE

“It is no longer about securing end point devices or network

boundaries, but now the emphasis is on

securing data.”

to secure their corporate networks while not impeding resource access.

“Educating the new employees while spreading awareness about the latest security concerns among the existing employees should be the priority item for any CISO on their strategy list and security program,” Singh added.

Security simply needs to be maintained whether CISOs have sufficient staffing, budget or tools in place or not. The actions they take may very well save your organization from being

the next security breach headline, which in turn results in a loss of customers, loss of income and job cuts.

According to Rajesh Maurya, Country Man-ager, India & SARRC, Fortinet, “Most malicious infections are the result of exploits on vulner-able hosts, particularly those with out-of-date operating systems and application patches, weak passwords or poorly configured security settings. Vulnerability scans are one of the most useful tools against these threats, identifying weaknesses

before the bad guys do.”“CISOs need to integrate smarter and holistic

security solutions into overall IT infrastructure in order to combat security threats in faster and seamless manner leading to ultimate resolution, Mankotia said.

“Identity is becoming new perimeter, compelling CISOs to gain clarity on informa-tion access management. Additionally, wider business objectives are forcing organizations to adopt customized solutions. One size simply does not fit all. It is important for CISOs to understand these dynamics and adopt platform-agnostic security solutions,” Mankotia added.

Rather than go by the traditional budget-ary approach to create a security framework, CISOs should take a network-centric approach and evaluate solutions that offer a holistic

MULTIFACETED SECURITY APPROACH, A COMBINATION OF SECURITY SOLUTIONS, HELPS ORGANIZATIONS TO SECURE THEIR CORPORATE NETWORKS WHILE NOT IMPEDING RESOURCE ACCESS.

COVER STORY

24 JU NE 2014

Cover Story.indd 24 28/06/14 10:52 am

Page 25: June 14

VISHAL BINDRACEO AT ACPL

“The technologies here have a varied usage and have their own

set security strengths like in virtualization and BYOD and their

own weaknesses. Organizations have to not only look at

technologies but also ensure that processes & policies adequately

support it.”

DHANYA THAKKARMANAGING DIRECTOR, TREND

MICRO, INDIA & SAARC

“The growing use of cloud-based and

virtualised computing resources drives

dramatic efficiency gains—but security

designed for physical servers can erase those gains when

deployed in virtual environments.”

ALTAF HALDEMANAGING DIRECTOR,

KASPERSKY LAB -SOUTH ASIA SAID.

“Anyone involved with providing

security solutions for an enterprise in the current market

should play the role of a consultant.”

needs to be tracked as well, there are no trusted networks anymore, and hence a Hybrid approach is the most suitable,” Thakkar said.

“Security and virtualization suites must be integrated for hybrid environments, so that a single console may be used to manage security across physical, virtual, and cloud infrastructure,” Amitabh Jacob, Director-Channel, India, Symantec said.

To derive the greatest value from information and safeguard this key business asset, organiza-tions need to use people, processes and technol-ogy, along with a holistic and information-centric approach to security.

“The key is to focus on basic fundamental building blocks of security that aim to protect information no matter where it resides, in a holistic, risk-based and policy-driven manner, one that protects information and infrastructure,” Jacob said. ë

security policy, opined Sunil Sharma, VP Sales & Operations, India & SAARC, Cyberoam. “The bottom-line of such policy should reduce vulnerability of attacks and better the business continuity.”

“Any rigid rule to enforce security that impacts convenience for users, will compromise one of productivity or security, Ganesan said.

CISOs need to invest time and effort to come up with solutions that ensure information security architecture that does not come in the way of productivity offered by other pieces of technology. “For example, instead of having a policy of never allowing usage of Dropbox for business, CISOs should employ tools that will unobtrusively keep track and monitor usage of Dropbox within business context and raise appropriate flags before things can go wrong,” Ganesan opined.

ON PREMISE VS OFF PREMISEWith changing IT infrastructure, changing threats scenario, need for faster & better protec-tion from the new and advance threats, levering the cloud to provide security will be the key for the future.

“It’s typically the SMB who are the ones more likely to adopt the SaaS model faster due to obvious reasons, larger companies may prefer a Managed security services model that could also be delivered like a SaaS or a Hybrid SaaS where some of the aspects of security are delivered from the cloud,” Thakkar of Trend Micro said.

“There will still be systems on the network that would need to be protected from the inside out threats typical of the Advanced Persistent Threats (APTs) that would imply that communication with the network and to the outside world

COVER STORY

25JU NE 2014

Cover Story.indd 25 28/06/14 10:52 am

Page 26: June 14

“Securing the end-points” n W O R D S : S A N J AY M A H A PAT R A < S A N J AY @ E N T E R P R I S E C H A N N E L S . C O M >

OVERVIEW Shalimar Paints is one of the leading paints manufacturing companies of India. Shalimar has three manufactur-ing units and more than 54 branches and depots all across the country. The company has a wide product range in Decorative / Architectural and Industrial segments. The Architectural coatings cover both Interior and Exte-rior segments. The company also has tinting systems under the brand name ‘Color Space’ where it offers more than 9000 shades across all product lines to its customers.

Shalimar’s vision is to become one of the leading paint manufacturing companies of the country, a leader in product innovation, and customer satisfaction. The company intends to build long term value relationships with all its suppliers and customers. Its mission is also to maximize returns of each stakeholder in the company

– be it customers, shareholders, suppliers or employees and become a socially responsible global corporate citizen.

BUSINESS CHALLENGES Shalimar Paints faced the daunting task of finding the exact solution that would meet the company’s Internet security and productivity requirements. “We had a need to provide secure and controlled Internet access to all our employees in India,” says Mathew Joseph, VP – Systems, Shalimar Paints.

The company was looking for a solution that would meet the following set of criterion:

1) Controlled and Secure InternetAccess to the web had become more than just a requirement for any business to survive. The company felt that while

the Internet brings about a whole lot of promising features, it also brings potential threats that its IT infrastruc-ture and data could be exposed to. There was a growing need to block third-party proxy websites and tunneling applica-tions that could be used to bypass certain security measures thus exposing them and the data at large.

2) Effective Filtering SystemShalimar Paints was also looking for an effortless management system wherein administrators could easily categorize all machines within the network. Moreover, the need to filter out spam and malicious attachments was in need of the hour.

3) Intrusion Prevention System The company also wanted that bypass-ing legitimate means to access otherwise blocked sites needed to be prevented and logged. This basically boiled down

CONTACTFOR MORE INFORMATION ON WHAT ESCAN CAN DO FOR YOUR BUSINESS, CALL US AT +91 95 0318 8489 OR [email protected]

MICROWORLD SOFTWARE SERVICES PVT. LTD.PLOT NO. 80, ROAD NO. 15, MIDC, MAROL,ANDHERI (E), MUMBAI - 400 093

MATHEW JOSEPHVP – SYSTEMS, SHALIMAR PAINTS

“AFTER THE DEPLOYMENT OF ESCAN CORPORATE, WE ARE WITNESSING A 90% PERCENT DECREASE IN ISSUES RELATED TO ENDPOINT SECURITY WHICH WASCONSIDERABLY BETTER THAN WHAT WE HAD ESTIMATED.”

With the implementation of eScan security solutions, Shalimar Paints has effectively secured its organizational boundaries

CASE STUDY / ESCAN

26 JU NE 2014

Case Study-Shalimar Paints.indd 26 28/06/14 10:13 am

Page 27: June 14

to blocking unwanted applications or even malware from hooking on to legitimate apps in order to gain internet access.

SOLUTION DEPLOYED In order to deal with these challenges, Shalimar Paints decided to deploy an effective security solu-tion that could meet all their requirements. After carefully evaluating different security products and solutions available in the marketplace, the company finally zeroed on eScan Corporate and Endpoint Security product suites.

With eScan Corporate installed, Shalimar Paints has been able to prevent unauthorized use of USB devices within the organization. eScan’s Endpoint Security has given Shalimar Paints added control of their PCs and Laptops. Now only white-listed USB devices are allowed to get connected, thus restricting the usage of unauthor-ized USB devices.

“Unlike competing solutions, eScan’s Endpoint Protection integrates antivirus, antispyware, firewall and device control into one single pack-age that empowers organizations to customize the level of endpoint protection with technologies that work together. Requiring less memory and consuming fewer resources, while increasing protection. It also gave administrators the ability to fine-tune the product, allowing it to use fewer resources during periods of high user activity,” adds Joseph.

The inclusion of the management console gave administrators even more flexibility as far as deployment was concerned. eScan Corporate could now be remotely deployed across the network from a single management console, thus significantly reducing the number of administra-tive overheads. The centralized management console also provided better control over all end-points, enhanced protection along with the least downtime due to a controlled environment which further maximized the availability of systems.

Joseph further states, “With a unified console

manager administrators can take a direct approach to endpoint security giving administra-tors the ability to create and manage policies, view logs, and run reports for endpoint security activi-ties. It provides a very comprehensive overview through graphical reporting, centralized logging, and alerts. The unified console gives a better overview of all endpoints and provides central-ized software updates, policy updates, reporting, and license maintenance.”

SCORING OVER COMPETITION eScan comprises of futuristic and advanced technologies that makes it capable of identify-ing the threats before-hand with regards to any technology that they may adopt. Businesses need solutions that helps efficient management of endpoints, hence the latest version of eScan for Corporates comes with an efficient management console that helps simplify endpoint security administration and even helps lower total cost of ownership by reducing administrative overhead as well as the cost associated with managing multiple endpoint security products.

It provides single client that is administra-tion and provides operational efficiencies such as single software updates and policy updates, unified and central reporting and a centralized licensing and maintenance program. It also includes an advanced Application Control feature that allows users to block or permit applications on the local computer, thus safeguarding you from critical threats.

eScan’s Application Control includes White list module that allows execution of only selected applications, while restricting the execution of rest. Moreover, with its USB Vaccination feature, eScan plays role of a ‘vaccine’ that provided for removable USB devices, which prevent USB devices from becoming a source of infection.

eScan offers advanced IT management through comprehensive Asset Management, managing

print activity and customized real-time reporting modules. It also neutralizes the requirement of any other third-party software for meeting your specific requirements in managing, monitoring and controlling security on network computers.

Meanwhile, this whole deployment process was done by the IT team of Shalimar Paints and partner under the guidance of eScan Support. A total of 150 HO machines were completed in 5-6 days. Remote installations were done as per the availability of the machines. The AV policy for the organization was then decided upon and deployed from the parent server.

REAPING THE BENEFITS Post the implementation of eScan security product suites, Shalimar Paints has seen the following results:

1) Reduction in security incidents. 2) Reduction of administrative overhead. 3) Zero incidents of a network breach. 4) Total control of all PCs and laptops within

the network. 5) Highly effective device control preventing

data loss. “After the deployment of eScan Corporate, we

are witnessing a 90% percent decrease in issues related to endpoint security, which was consider-ably better than what we had estimated. Our previous security model just provided a point-in time view of all connected endpoints,” asserts Joseph.

“We therefore experienced instances where the status of the device was unknown. With eScan’s Endpoint Security Manager installed, we have had real time visibility of all. To state its performance, eScan has deployed a simple all in one solution that effectively secures all connected systems from malware. Besides, the most discerning factor in eScan Corporate lies in its remote deployment/access capabilities. It is the overall simplicity of the product that we have come to like the most,” concludes Joseph. ë

CASE STUDY / ESCAN

27JU NE 2014

Case Study-Shalimar Paints.indd 27 28/06/14 10:13 am

Page 28: June 14

As Internet users, the education sector is not spared from cyber-attacks and vulnerabilities. The growing adoption of enterprise applications to support certain

operations or organisation functions inevitably means that education institutions are more exposed to Advanced Persistent Threats (APTs). Furthermore, as education institutions today are dealing with more data about students, staff and prospective candidates, they become a prime target for malicious hackers looking to gain access to personal information.

The threats and challenges facing the education sector are no different than those faced by other sectors. IT departments of schools in India need to be aware of new technology adoption – which includes the usage of smartphone and tablet devices in the BYOD era, cloud services such as Dropbox, and even social networks such as Facebook and LinkedIn. With students in India becoming more technologically savvy, IT departments need to ensure that they are not stifling innovative use of technology in order to stay protected from threats.

Furthermore, creating awareness within the student community on cybersecurity will help provide them with better exposure and under-standing of the cyber threats. To that extent, we play a responsible role in providing educational institutions across the globe with both content and curriculum that allows for classroom learning with network security as a key subject – something that adds value to young and aspiring “IT network security experts.”

CYBERBULLYING ON THE RISEThe issue of cyberbullying has its roots in the

attitude and mentality of those who seek to take advantage technology to exploit those who are weaker. It is a behavioural issue which can be clas-sified as cybercrime if it crosses the line of the law. As a technology company, we believe that we have the responsibility to support government initiatives towards curbing such behaviours by monitoring networks of our customers and end-users.

Social and Mobility are two major phenomenon’s of our evolving society. Both have a huge influence on IT security and we therefore need to plan our cybersecurity strategy and deployments keeping this reality in mind. While social networking sites are becoming more popular with both employees and students of schools in India, they also pose a threat to the institution’s security as it forms a gateway for cyber criminals to access the networks. The design of social networking sites which openly allow for file sharing makes it a convenient platform for attackers.

SECURING STUDENTS WITHOUT CONTROLLINGSchools should adopt a Zero Trust Model towards network security, to tackle modern threats, and provide better security in an efficient way that eases compliance burdens and operational costs.

With the Zero Trust model, the network is better able to prevent malicious content from coming through, stripping away all previous assumptions about trust in the network, and not trusting users, packets, interfaces or the network. It also proposes that controls be consistently applied through the entire network, whether it is internal or external malicious users.

In fact, the real issue is how to enable the safe use of applications by students. Blocking applications or prohibiting the access to Internet is not the answer

PALO ALTO

Blocking content is counter-productiveAnil Bhasin talks about the growing need for security in the education sector but insists that blocking content is the solution ANIL BHASIN

MANAGING DIRECTOR – INDIA AND SAARC, PALO ALTO NETWORKS

“The issue of cyberbullying has its roots in the attitude and mentality of those who seek to take advantage technology to exploit those who are weaker.”

if we really want our educational institutions to be progressive. So the onus really is on OEMs like us.

Most of the attacks that we are seeing in the market today occur at the endpoint, as a result of growing usage of mobile devices. For institutions to achieve more effective cybersecurity, a platform is required that includes a disruptive approach at the endpoint. To address modern cybersecurity chal-lenges, enterprises, including education institutions, need a next-generation enterprise security solution that offers an integrated solution and approach towards the protection of the network and the end-point devices.

Such integrated enterprise-level solutions can provide advanced control, based on an application signature that provides control at the application layer. This provides increased security because as it allows the application layer to be monitored before the threat is advanced to the rest of the network.

In India, Palo Alto Networks has worked closely with Virtualization and SDN partners to enable the security service layer in the virtualized data centre to be as flexible as the networking and compute. Changes that typically took days or weeks in the past can now be completed in minutes, just like any other virtual service deployed in the data centre. ë

SECURITY CORNER

28 JU NE 2014

Security corner-Palo.indd 28 28/06/14 10:26 am

Page 29: June 14

When you see advanced attacks and APTs (Advanced Persistent Threats) in the news, you can’t help but wonder if

they’re overblown hype or real hazards. While news stories use APTs to generate buzz, APT tools and techniques are also real weapons in data thieves’ attack arsenals. Too much hype has clouded the facts surrounding a very real danger for organizations of all sizes. APTs have become a major concern for IT security professionals around the world. Recent attacks targeting Cana-dian government officials, French government officials, RSA, and elements of the European Union have all been linked to APTs. Huge corpo-rations like Google and Adobe were among the first targets of advanced attacks, wherein invaders stole classified information, exposed financial data, and copied source code.

WHAT “APT” MEANS.A = Advanced: APTs use sophisticated attack technologies.

P = Persistent: APTs don’t quit until they hit their goal.

T = Threat: APTs pose enormous danger to top-secret data.

Some types of advanced attacks, includ-ing APTs, are so stealthy that they’re almost impossible to detect. APTs, like many advanced attacks, slip into target organizations unnoticed, often disguised as harmless-looking links in emails. But once inside, APTs are masters of infiltration as they plant malicious code and ship out confidential data. They can also hide out or

take on different disguises – so they’re almost impossible to detect. APTs use sophisticated, blended techniques that leverage both web and email channels to deliver malware that has never been seen before and can live undetected for months. APTs are targeted, multifaceted, ongoing efforts designed to elude traditional defenses of signature-based antivirus and firewalls for the theft of intellectual property and confidential data in a government setup or large enterprises. Some of the most prominent examples of APTs include Stuxnet, Aurora, Flame, Nitro, Night Dragon and Duqu.

THE APT PROCESSThe APT process includes three major phases that occur over a period of months.l Phase 1 - Reconnaissance, Launch, and

Infect: The attacker performs reconnaissance, identifies vulnerabilities, launches the attack, and infects target hosts.l Phase 2 - Control, Update, Discover, Persist:

The attacker controls infected hosts, updates code, spreads to other machines, and discovers and collects target data .l Phase 3 - Extract and Take Action: The

attacker extracts data from the target network and takes action (sells data, etc .)

An APT attack might start with a few highly targeted email messages under the guise of professional correspondence from a trustworthy organization (e.g., a bank) or personal acquain-tance from a friend or colleague. Embedded inks in these messages lead to a site which might appear legitimate, but is likely to be compro-mised. Once the system is breached, the malware

WEBSENSE

APT: Not Your Average MalwareAs the enterprises are increasingly deploying virtualization and cloud commuting at the back and ByOD at the front for the workers, they are moving into the hands of vulnerability. In this situation, proper security strategy is expected.

SURENDRA SINGHREGIONAL DIRECTOR - SAARC AT WEBSENSE INC

“Whether you work for a government agency or a private business, you need to clearly understand and protect against APT techniques.”

infiltrates confidential data over a secure FTP or HTTPS channel to servers run by the APT. Then prize data trickles out of the network, avoiding any high-volume bursts of traffic that might alert network administrators or security personnel to the presence of an attack.

Attacks on high-profile organizations tend to target sensitive corporate or government information for industrial espionage purposes.

Each year, apart from APTs, CISOs must deal with the business-as-usual security issues. The biggest challenge CISO’s face is ‘Where to begin first?” as every aspect of a business is important. Traditional security measures do not adequately address today’s threats. Without a new security posture, many more attacks using APT tech-niques will succeed in victimizing their targets.

A sound defense against APT techniques needs to monitor inbound and outbound traffic for content, context, and data, preferably for both email and web communications. More specifi-cally, the defense layer should monitor outbound communications for the detection of data-theft behavior. Organizations need a new security architecture that keeps new and unknown threats out and their intellectual property within their environment. ë

SECURITY CORNER

29JU NE 2014

Security corner-websense.indd 29 28/06/14 10:18 am

Page 30: June 14

HP has expanded its HP ConvergedSystem portfolio for SAP HANA, delivering the largest SAP-certified solution for SAP HANA platform-based workloads, helping clients reduce costs and improve response time to business demands.

The new HP ConvergedSystem 900 for SAP HANA is certified by SAP to deliver up to 12 terabytes of data in a single memory pool to power the most mission-critical business applications. The commercialization resulting from the HP and SAP co-innovation initiative “Project Kraken,” HP ConvergedSystem 900 for SAP HANA is a massively scalable system that enables clients to manage and analyze extremely large and diverse data sets from a single system to facilitate real-time business deci-sions. In addition, the system’s flexible configurations and high availability let clients consolidate mission-critical business apps to a centralized platform, helping reduce costs and simplifying the IT environment.

HP also introduced HP Proactive Care Advanced as the recommended level of support for HP ConvergedSystem 900 for SAP HANA. It provides clients with a single point of accountability for support of all system components. In addition, HP announced new HP Consulting Services for SAP HANA that deliver rapid deploy-ment and a smooth migration to HP ConvergedSystem 900 for SAP HANA.

American Dynamics’ version 4.5 (A Tyco Security Product) is a powerful, high-performance VideoEdge NVR with new features that provide customers more secure and efficient systems for businesses and organizations that require an active surveillance environment.

VideoEdge Network Video Recorder (NVR) adds a new level

of ease and efficiency for surveil-lance operators announced the press release. With features such as Auto Discovery, users can locate cameras on the network and assign IP addresses to any VideoEdge NVR with the click of a button, reducing time significantly.

VideoEdge’s powerful Heat Mapping tool lets retailers see where

customers are lingering – important information that lets retail marketers see where the hot items are, or where they may need additional promo-tional displays. This feature is also very useful in other markets such as sports and entertainment, health-care, and other venues for tracking foot traffic patterns, ensuring visitors are receiving adequate assistance.

KEY CAPABILITIESn The Watermarking pro-cess allows security officials to assign a unique visual mark to the video that is specific to its business. This maintains the integrity of recorded video and protects the owner from fraudulent use of the video. n The victor Unified Client helps you manage all of your live and recorded video from VideoEdge, exacqVision, Intellex and ADTVR video recording solutions, all from one, intuitive interface.

Tyco Security VideoEdge NVR 4.5

PLEASE SEND YOUR FEEDBACK AT [email protected]

HP CONVERGEDSYSTEM 900 FOR SAP HANA

KEY CAPABILITIESn Increase operational efficiency by consolidating mission-critical applica-tions on the same platform. n Rapidly respond to business needs by quickly scaling system capacity with 6TB/8-socket and 12TB/16-socket scale-up configurations using Intel Xeon processor E7v2 family. n Reduce downtime with HP Service-guard for SAP HANA, which provides high-availability and disaster-tolerant features for enterprise data protection.n Focus on business continuity with up to 12 TB of in-memory computing. This allows clients to smoothly and securely transition their landscape running SAP HANA from legacy databases. n Increase IT staff efficiency with intel-ligent manageability features that pro-vide IT a single point of management for the server, blades, fault-tolerant fabric and enclosure.

INNOVATIONS

30 JU NE 2014

Innovations.indd 30 28/06/14 10:17 am

Page 31: June 14

TS-EC1679U-SAS-RP

REXP-1600U-RPExpansion EnclosureScale-up

NAS Storage up to

Achieve unparalleled expandabilitywith SAS-Enabled Turbo NAS

500TB

Equipped with a Quad-Core Intel® Xeon® 3.4GHz processor, 8GB DDR3 ECC RAM and 10GbE support, the TS-EC1679U-SAS-RP deliversover 3,000MB/s throughput, 400,000+ IOPS, SSD caching and thin provisioning to drive your business forward.

Supporting a wide range of 2.5”/3.5” SAS/SATA 6Gbps hard drives & SSDs, the TS-EC1679U-SAS-RP can also naturally expand your storagecapacity with the flexible & economical REXP-1600U-RP/REXP-1200U-RP expansion enclosures to support over 500TB raw capacity.

The Windows AD and LDAP directory services greatly save IT administrators time and effort in account setup. The Windows ACL (AccessControl List) feature offers sophisticated shared folder permission settings that simplifies IT management and privilege control.

Designed purely to fit business needs, the TS-EC1679U-SAS-RP offers unified storage for both NAS and iSCSI applications and is idealfor server virtualization storage, business data backup, file sharing and IP surveillance storage.

Extreme Performance

Flexible Storage Options & Scalability

Effortless Privilege Management

Built for Business

www.qnap.comCopyright © 2013 QNAP Systems, Inc. All rights reserved.

TS-EC1279U-SAS-RP TS-EC1679U-SAS-RP SS-EC1279U-SAS-RP SS-EC1879U-SAS-RP SS-EC2479U-SAS-RP

C

M

Y

CM

MY

CY

CMY

K

14021712_IN-Enterprise_Channels_TS-EC1679U-SAS-RP_SAS_full_0217_Print-.pdf 1 2014/2/17 下午 06:58:26

Advts.indd 2 18/02/14 9:58 pm

Page 32: June 14

www.cyberoam.com

Turning CIO into thenext-generation catalystCyberoam NGFWs enable enterprise CIOs harness IT & network transformation with insights beyond security,

helping them innovate, monetize and differentiate.

Key business benefits of Cyberoam NGFWs to CIOs:

• Next-generation threat protection

(also secures critical infrastructure / SCADA networks)

• Wirespeed gigabit performance

• Visibility into BYOD and Virtual environments

• Easy compliance

• On-appliance Web Application Firewall (WAF)

Cyberoam Product Line :

Network security appliances(Next-Generation Firewalls/UTMs)

Centralized Management(Hardware & Virtual)

Centralized Reporting

© Copyright 2014 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. | For more information contact : [email protected]

Also available through

NICSI / NIC

RNI NO: DEL ENG/2013/49006Postal Reg. No.: DL-SW-1/4169/13-15

Date of Publication: 18 of Every MonthDate of Posting: 20 & 21 of Every Month

Advts.indd 4 26/02/14 10:28 am