+ All Categories
Home > Documents > Channelworld Magazine October 2012 Issue

Channelworld Magazine October 2012 Issue

Date post: 07-Mar-2016
Category:
Upload: sreekanth-sastry
View: 229 times
Download: 2 times
Share this document with a friend
Description:
Channelworld Magazine October 2012 Issue
Popular Tags:
47
FOCAL POINT: Find out how emerging containerization technologies create encrypted zones on smartphones. PAGE 39 CHANNELWORLD.IN Cover Story Why solution providers aren’t buying heavily into the mobile solutions story—at least not yet. PAGE 22 Case Study Meridian Infotech, a solution provider from the small town of Vadodara, was given first-go at a large deal to help the Essar Group go mobile. But could it play with the big boys? PAGE 32 Feature Are solution providers and security vendors engaging coherently to execute a profitable and sustainable BYOD journey? PAGE 34 Opinion Smartphones have changed the world around us. Even in its success, there are areas which are dysfunctional. Do device- makers need a new perspective? PAGE 38 Inside OCTOBER 2012 VOL. 6, ISSUE 7 STRATEGIC INSIGHTS FOR SOLUTION PROVIDERS | COVER PRICE Rs.50 ChannelWorld hanne JITEN MEHTA, Director, Magnamious Systems, is fully prepared to service enterprise mobility demands but isn’t sure where the market is going. Indian CIOs want to invest in mobility solutions. But channel partners say they aren’t really keen. What’s going on? >>> Page 22 MOBILE MOBILITY SPECIAL ( ( ( ( ( ( ( ( ( (
Transcript
Page 1: Channelworld Magazine October 2012 Issue

FOCAL POINT: Find out how emerging containerization technologies create encrypted zones on smartphones. PAGE 39

CHANNELWORLD.IN

Cover StoryWhy solution providers aren’t buying heavily into the mobile solutions story—at least not yet. PAGE 22

Case StudyMeridian Infotech, a solution provider from the small town of Vadodara, was given first-go at a large deal to help the Essar Group go mobile. But could it play with the big boys? PAGE 32

FeatureAre solution providers and security vendors engaging coherently to execute a profitable and sustainable BYOD journey? PAGE 34

Opinion Smartphones have changed the world around us. Even in its success, there are areas which are dysfunctional. Do device-makers need a new perspective? PAGE 38

InsideOCTOBER 2012 VOL. 6, ISSUE 7

STRATEGIC INSIGHTS FOR SOLUTION PROVIDERS | COVER PRICE Rs.50ChannelWorldChannelWorldJITEN MEHTA, Director, Magnamious Systems, is fully prepared to service enterprise mobility demands but isn’t sure where the market is going.

Indian CIOs want to invest in mobility solutions. But channel partners say they aren’t really keen. What’s going on? >>> Page 22

MOBILE

MOBILITY SPECIAL((((( (((((

Page 2: Channelworld Magazine October 2012 Issue

+Þ Inbound Response Management

Priya Sharma v:1800 209 3062 f:022 66765553

Enterprises need a new approach - a strategic, innovative

solution that allows them to spend less on their network

infrastructure and more on revenue generating and

productivity enhancing technologies that help them gain a

competitive edge.

Juniper Networks o�ers such a solution - a new class of

Ethernet switches for the enterprise, designed specifically to

meet the demands of today’s high-performance businesses.

With the EX Series, businesses can deploy a cost-e�ective

family of switches that delivers the high availability, unified

communications, integrated security and operational

excellence they need today, while providing a platform for

supporting the requirements of tomorrow.

Welcome to the future of enterprise switching at juniper.net

Authorized Distributor: Ingram Micro India Limited | Sadhaka Nanda | �Email: [email protected]

JN_CW_AD_V1.3.indd 8 9/26/2012 5:52:14 PM

Page 3: Channelworld Magazine October 2012 Issue

n EDITOR’S NOTE

Vijay Ramachandran

Work Smart not Hard

I’ve noticed an unhealthy obsession that some business leaders have with how much time their staff spend in of-fice as well as how many things that their employees can juggle with at the same time. One solution provider I re-

cently met is so particular that his team start work at exactly 10 am, that he’s gone to the extent of providing complimentary breakfast at 9.30 am. Now before you point to the challenging times we face and the need to slog it out, ask yourself this: Are you more concerned about the hours your chaps fill in or how much they actually achieve in them?

Take multitasking, which many view as an extremely efficient busi-ness practice. Admittedly, it’s not like attending to several things at a time is a new ‘information age’ trait. Humans have had the capability for thousands of years. What has changed in the Internet era is the quantum of tasks and the haste with which we’re called upon to deal with them. When else in history could you conduct mul-tiple IM conversations, flip through 14 browser tabs, scan though three spread-sheets, view the corporate dashboard, be on a con-ference call and send out mail, concurrently?

An extreme example? Possibly. An efficient use of technology? Definitely.

Productive? Unlikely.Research over the past

few years reveals that multitasking costs us and our organizations dearly in productivity losses and bad decision making. And, this does not even take into account the stress caused by toggling between multiple tasks simultaneously.

A study, conducted by the Institute of Psychiatry at the University of Lon-don, found that “workers distracted by e-mail and phone calls suffer a fall in IQ”. Big deal, right? Then consider that the study found that continual use of e-mail and SMS lowered IQ by as much as 10 points, while smok-

ing marijuana regularly, caused only a four point drop in intelligence!

Pointing to the ‘infoma-nia’ in today’s work envi-ronment another study has discovered that organiza-tions employing knowledge workers are greatly impact-ed by information overload. Infomania, the studies au-thors observe, is the mental state of continuous stress and distraction caused by the combination of queued messaging overload and in-cessant interruptions.

In one organization, the authors found that staff “averaged 11 minutes on any one ‘working sphere’ before switching to an-other altogether.” This extreme fragmentation of work resulted in a severe cumulative time loss, with some estimates as high as 25 percent of the work day. Their research found employees in a chronic state of mental overload in practically every company and organization in the industrialized world. In a world that’s increas-

ingly outcome driven, the other issue that has me stumped is the anachronis-tic insistence of using In-dustrial Revolution norms of hours worked or physi-cal presence as a measure of accomplishment. Value creation in the knowledge worker space can hardly be equated with assembly line output, can it?

Yet, a recent survey of corporate managers reveals that employees who are always present in office during business hours are thought of as highly “dependable”, with employees who work late or over weekends being viewed as “committed” and “dedicated”.

Author Robert C. Pozen in his book Extreme Pro-ductivity: Boost Your Re-sults, Reduce Your Hoursobserves that “…many or-ganizations are undermin-ing incentives for workers to be efficient. If employ-ees need to stay late in or-der to curry favor with the boss, what motivation do they have to get work done during normal business hours?… It’s no surprise, then, that so many profes-sionals find it easy to pro-crastinate and hard to stay on a task.”

Pozen offers a way out: “Instead of counting the hours you work, judge your success by the results you produce.” Amen to that! nVijay Ramachandran is the Editor-in-Chief of ChannelWorld. Contact him at [email protected]

n Using Industrial Revolution norms of hours worked or physical presence as a measure of accomplishment is daft.

To do two things at once is to do neither.— Publilius Syrus, Roman slave, first century B.C.

Don’t tell people how to do things, tell them what to do and let them surprise you with their results.— George S. Patton, US Army General, 1941

OCTOBER 2012 INDIAN CHANNELWORLD 1

Page 4: Channelworld Magazine October 2012 Issue

■ NEWS DIGEST05 Providing An Easy Way In | Some Oracle databases have what experts say is a serious flaw in

the login system that a hacker can use to retrieve and change stored data.

06 Public Cloud Spend to Explode | Worldwide spending on public IT cloud services is expected to touch the $100 billion mark in 2016, as companies accelerate their shift to the cloud services model, according to IDC. Public IT cloud services are de-signed for, and commercially offered to a largely unrestricted marketplace of potential users.

06 Welcome Aboard the OpenStack Project | The newly-formed OpenStack Board of Directors voted to accept VMware, along with Intel and NEC into the project as gold members.

08 Extending the Mainframe Lineage | IBM’s latest mainframe, the zEnterprise EC12, is built with

InsideINDIAN CHANNELWORLD ■ OCTOBER 2012

FOR BREAKING NEWS, GO TO CHANNELWORLD.IN

data analytics and hybrid clouds in mind because the company must focus on new applications to ensure datacenter technology remains relevant.

■ OPINION01 Editorial: Vijay Ramachandran believes that the anachronistic insistence of using Industrial Revolution norms of hours worked or physical presence as a measure of accomplishment does not work well for an organization. 38 Scot Finnie: Smartphones have changed the world around us and how we do things. Even in its success, there are areas which are dysfunctional. Do device-makers need a new perspective?

44 Thornton A. May: The one thing we definitively know about the future is that we will spend the rest of our lives there. And yet people don’t think enough about the future. IT leaders—your own customers—spend too little time imagining the future. That’s a big problem.

■ NEWS ANALYSIS10 Can Dell Make the Jump?| For anyone who has not been living under a rock, the moves Dell has been making to move away from its traditional PC business have been evident. But as the company transforms itself into an end-to-end solution provider, the question is: Can Dell go the distance?

22

■ SPECIAL REPORT

22 Mobile Disconnect CIOs of Indian companies—across sizes—say they are already investing—and want to continue to put money into—mobility solutions. But enterprise channel partners say there isn’t money in it and are giving mobility the cold shoulder. What’s going on?

■ FEATURE34 DLP+MDMSolution providers need to engage coherently with security vendors to execute a successful, profitable and sustainable BYOD journey across their enterprise customers.

■ CASE STUDY32 Big Boy TurfMeridian Infotech, a solution provider from the small town of Vadodara, was given first-go at this large deal to help Essar Group go mobile. Could it hack it?

■ FOCAL POINT 39 To Each Its Own Containerization is an emerging class of management tools that carve out a separate, encrypted zone or policy bubble on a user’s smartphone within which some corporate apps and data can reside. This helps create a separate, protected workspace on employees’ personal smartphones.

Cover Photograph by KAPIL SHROFF Cover Design by UNNIKRISHNAN A.V

MOBILITY SPECIAL((((( (((((

Page 5: Channelworld Magazine October 2012 Issue
Page 6: Channelworld Magazine October 2012 Issue

CHANNELWORLDGeetha Building, 49, 3rd Cross, Mission Road, Bangalore - 560 027, IndiaCHANNELWORLD.IN

Publisher, President & CEO Louis D’MelloAssociate Publishers Rupesh Sreedharan, Sudhir Argula■ EDITORIALEditor-in-Chief Vijay RamachandranExecutive Editors Gunjan Trivedi, T.M. Arun Kumar Associate Editor Yogesh GuptaDeputy Editor Sunil ShahAssistant Editor Online Varsha ChidambaramSpecial Correspondents Radhika Nallayam,Shantheri MallayaPrincipal Correspondents Anup Varier, Gopal Kishore, Madana PrathapSenior Correspondent Sneha JhaCorrespondents Aritra Sarkhel, Debarati Roy, Eric Ernest, Ershad Kaleebullah, Shweta Rao, Shubhra Rishi Chief Copy Editor Shardha SubramanianSenior Copy Editor Shreehari Paliath Copy Editor Vinay KumaarLead Designers Jinan K.V., Suresh Nair, Vikas KapoorSenior Designer Unnikrishnan A.V.Designers Amrita C. Roy, Sabrina Naresh

■ SALES & MARKETINGPresident Sales & Marketing: Sudhir KamathVP Sales Parul SinghGM Marketing Siddharth SinghManager Key Accounts: Jaideep M., Sakhee Bagri Senior Manager Projects: Ajay ChakravarthyManager-Sales Support Nadira HyderMarketing Associates: Anuradha Iyer, Benjamin Jeevanraj, Dinesh P.Project Co-ordinator Rima Biswas, Saurabh Patil Lead Designers Jitesh C.C., Pradeep Gulur Designer Lalita Ramakrishna

■ EVENTS & AUDIENCE DEVELOPMENTSenior Manager Projects: Ajay Adhikari, Chetan Acharya, Pooja Chhabra Manager Tharuna PaulSenior Executive Shwetha M.Project Co-ordinator Archana Ganapathy

■ FINANCE & OPERATIONSFinance Controller Sivaramakrishnan T.P.Sr. Manager Accounts Sasi Kumar V.Sr. Accounts Executive PoornimaManager Credit Control Prachi GuptaSr. Manager Products Sreekanth SastrySr. Manager Production T.K.KarunakaranSr. Manager IT Satish Apagundi ■ OFFICES Bangalore IDG Media Pvt. Ltd. Geetha Building, 49, 3rd Cross, Mission Road, Bangalore 560 027, Karnataka Tel: 080-30530300. Fax: 080-30586065Delhi IDG Media Pvt. Ltd.DLF Corporate Park, Tower 4 B,3rd Floor, Room 301, MG Road, DLF Phase 3, Gurgaon- 122001, Haryana Tel: 0124- 3881015Mumbai IDG Media Pvt. Ltd.201, Madhava, Bandra Kurla Complex, Bandra East, Mumbai 400051, Maharashtra Tel: 022-30685000. Fax: 022-30685023

All rights reserved. No part of this publication may be reproduced by any means without prior written permission from the publisher. Address requests for customized reprints to IDG Media Private Limited, Geetha Building, 49, 3rd Cross, Mission Road, Bangalore - 560 027, India. IDG Media Private Limited is an IDG (International Data Group) company.

Printed and Published by Louis D’Mello on behalf of IDG Media Private Limited, Geetha Building, 49, 3rd Cross, Mission Road, Bangalore - 560 027, India. Editor: Louis D’Mello, Printed At Manipal Press Ltd, Press Corner, Manipal-576104, Karnataka, India.

This index is provided as an additional service. The publisher does not assume any liability for errors or omissions.

Emerson Network Power India Pvt. Ltd . . . . . . . BC

Juniper Networks India Pvt.Ltd . . . . . . . . . . . . . IFC

HP- PSG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . IBC

Dell India Pvt. Ltd . . . . . . . . 11, 13 & Cover gatefold

HP-IPG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

D-LINK (INDIA) LTD. . . . . . . . . . . . . . . . . . . . . . 25

Fujitsu India Pvt. Ltd . . . . . . . . . . . . . . . . . . . . . . . . .9

Ricoh India Ltd . . . . . . . . . . . . . . . .3 + flap on cover

Symantec Software Solutions Pvt.Ltd . . . . . . . . . . 7

ADVERTISERS’ INDEX

■ THE GRILL15 Judson Althoff, senior vice president-Worldwide Alliances, Channels & Embedded Sales,

Oracle, underscores the company’s long-term channel strategy.

■ON RECORD19 Patrick Lo, chairman and chief executive officer, Netgear, talks about market competition and partner strategy in the India market. He

believes that if the customer is happy with the value-addition created, then the chances of being profitable rise proportionally.

FOR BREAKING NEWS, GO TO CHANNELWORLD.IN

InsideINDIAN CHANNELWORLD ■ OCTOBER 2012

■ FAST TRACK18 Manu Mehta, director, Fore Solutions, says that they have placed themselves in a reasonable position by maintaining a shoe-string budget and

retaining manpower by putting employees on performance-based incentives.

21 Deepak Hoskere, managing director, Peak XV Networks, had to rebuild the company in an en-tirely different space. The mantra of giving customers the best, without under-selling, stood him in good stead.

19

15

Page 7: Channelworld Magazine October 2012 Issue

PAGE 06: Public Cloud Spend to Explode

PAGE 06: Welcome Aboard The OpenStack Project

PAGE 08: Extending the Mainframe Lineage

PAGE 10: Can Dell Make The Jump?

WHAT’S WITHIN

F I N D M O R E A R T I C L E S AT C H A N N E L W O R L D . I N

News

SECURITY

Providing An Easy Way In

Managing customer relationships has become companies’ top priority in the APAC region, according to Forrester’s new report, ‘The Changing Face of CRM in Asia Pacific’.

Companies recognise the importance of management of customer relationships for continued business success and are now thinking about the CRM lifecycle beyond legacy CRM tools.

Forrester emphasises the importance of local language

support for core CRM capabilities to successfully grow across the region.

Forrester suggests that CRM providers in APAC in search of growth should evaluate CRM solutions on region-, country-, and vertical-specific needs; understand that CRM projects will involve strong business support and not be IT-led; and help manage expectations.

— By Anuradha Shukla

Customer is Priority

CRM

Mitnick, a well-known white-hat hacker and founder of Mitnick Security Consulting, said in an email. “Basically, an attacker can get to the data stored in the database, and even change it.”

When a client connects to the database server, a ses-sion key is sent with a salt. Because this happens before the authentication process is finished, a hacker working remotely can link the key to a specific password hash.

“Once the attacker has a session key and a salt, the at-tacker can perform a brute-force attack on the session key by trying millions of

passwords per second until the correct one is found,” Fayo told Kaspersky Lab’s Threatpost blog.

Because the hack occurs before authentication is done, no login failure is recorded in the server, so a person can gain access without trigger-ing an abnormal event.

Oracle, which did not respond to a request for comment, patched the flaw in the latest upgrade of the authentication protocol, version 12. However, the company is not planning a patch for the flawed version, 11.1, Fayo said. Even with the upgrade, database adminis-trators have to configure the server to only allow the new version of the protocol.

“There are many large companies and critical infrastructure agencies which cannot afford the time or risk to upgrade all their Oracle clients and servers,” said Clarke, a security researcher at Cylance.

“Oracle’s choice to lock this patch to an upgrade really forces the hand of those organizations with longer technology refresh periods and puts a lot of strain on the trust relation-ships they have with Oracle as a vendor,” Brent Huston, chief executive of security testing company Micro-Solved, said in an email.

— By Antone Gonsalves

SOME ORACLE da-tabases have what experts say is a serious flaw in the

login system that a hacker can use to retrieve and change stored data. The flaw, in Oracle Database 11g Releases 1 and 2 leaves the token that is provided by the server before authentica-tion is completed open to a brute-force attack, said Este-ban Martinez Fayo, the ap-plication security researcher that discovered the flaw. If successful, an attacker can gain access to the database. “An authentication bypass is quite serious,” Kevin

OCTOBER 2012 INDIAN CHANNELWORLD 5

Page 8: Channelworld Magazine October 2012 Issue

-

Akamai Technologies announced that it has crossed the 100 customers mark in the fast-growing Indian market. To meet the diverse needs of the growing customer base in India, Akamai also announced the opening of two new offices in Mumbai and Delhi. Akamai’s new customers in India include RedBus, India’s largest bus ticketing service and BSE.

LifeSize is taking another step in expanding its portfolio with the recent launch of its UVC Multipoint, reportedly the industry’s first standards-based, interoperable multi-party virtualized video calling solution. UVC Multipoint seeks to connect people across multiple devices, and time zones.

HDS announced the launch Hitachi Unified Storage VM (HUS VM) which enables 90 percent faster data migration and 30 percent better TCO compared to non-virtualized systems.

In 2012, IDC expects global public IT services spending to amount to more than $40 billion (Rs 213, 520 crore) with public IT cloud services said to see a compound annual growth rate (CAGR) of 26.4 percent over the period from 2012-2016—five times

that of the IT in-dustry overall.

The study, ‘Worldwide and Regional Public IT Cloud Ser-vices 2012-2016 Forecast’,noted that by 2016,

public IT cloud services will account for 16 percent of IT revenue in five key technology categories: applications, system infra-structure software, plat-form as a service (PaaS), servers, and basic stor-age—cloud services will generate 41 percent of all growth in these categories by 2016.

“Quite simply, vendor failure in cloud services will mean stagnation,” Gens said.

IDC stated that while SaaS will claim the largest share of public IT cloud services spending over the next five years, other categories such as basic storage and platform as a service, will show faster growth. It was also point-ed out that faster PaaS rollouts over the next year and a half will be critical to maintaining the strong cloud momentum.

The US will continue to be the largest public ser-vices cloud market, followed by the Western Europe and APAC regions (excluding Japan), IDC said. Interest-ingly, the fastest growth in public IT services spending will be seen in the emerging markets, which will account for almost 30 percent of net-new public IT cloud services spending growth in 2016.

IDC noted that it expects public clouds to mature and eventually integrate many of the features—primarily security and availability—that make private clouds an attractive option.

—By Computerworld India

Short TakesCLOUD COMPUTING

Public Cloud Spend to Explode

WORLDWIDE SPENDING on public IT cloud services is ex-

pected to touch the $100 billion (Rs 533, 800 crore) mark in 2016, as companies accelerate their shift to the cloud services model for IT consumption, according to IDC.

Public IT cloud services are de-fined by IDC as those offerings designed for, and commercially of-fered to, a largely unrestricted mar-ketplace of potential users.

“The IT industry is in the midst of an important transformative period as companies invest in the technologies that will drive growth and innovation over the next two to three decades,” said Frank Gens, senior vice president and chief analyst at IDC.

The newly-formed OpenStack Board of Directors voted to accept VMware, along with Intel and NEC into the project as gold members. Jonathan Bryce of Rackspace, who is one of the leaders of the OpenStack project, alerted OpenStack Foundation members via an e-mail.

VMware applied to join the OpenStack project

a few weeks ago but at the OpenStack board of directors’ last meeting in late August, there was no vote on applications for new companies to join the project. The board convened during a special meeting accepted all three gold member applications. Gold member companies pay between $50,000 (Rs 27 lakh) and

$200,000 (Rs 1 crore) to be a part of OpenStack, based on the company’s annual revenue. Other gold members include Cisco, Cloudscaling, Dell, Dreamhost, ITRI, Mirantis, Morphlabs, NetApp, Piston Cloud Computing and Yahoo.

VMware’s acceptance into OpenStack comes on the heels of it closing on the $1.2 billion purchase of software defined networking company Nicira.

They also worked with some OpenStack-partner companies, such as Piston Cloud, to integrate its Cloud Foundry platform as a service into the OpenStack project. Some have questioned though whether VMware’s official role in OpenStack will mean the company’s ESX hypervisor will be further supported in the project beyond the base level of integration.

— By Brandon Butler

OPEN SOURCE

VOTED IN: VMware has been accepted as a gold member.

Welcome Aboard The OpenStack Project

26.4%Projected compound annual growth rate

of public cloud between 2012-16.

6 INDIAN CHANNELWORLD OCTOBER 2012

Page 9: Channelworld Magazine October 2012 Issue
Page 10: Channelworld Magazine October 2012 Issue

MAINFRAME

Extending the Mainframe Lineage

Cisco CEO Hints at RetirementCisco CEO John Chambers says he may retire in two to four years and named several executives who could succeed him, according to Bloomberg.

There are as many as 10 candidates to assumed leader-ship of Cisco when Chambers retires, he told Bloomberg. They include Robert Lloyd, executive vice president of worldwide operations; Chuck Robbins, senior vice president of the Americas; and Edzard Overbeek, senior vice presi-dent of global services.

Cisco’s board reviews potential successors to the

Around

The World

CEO quarterly, Chamber said. Chambers said he’d then stay on as chairman “assuming the board wants me to and as-suming the shareholders do.”

- Jim Duffy

Lenovo Acquires StonewareLenovo said it plans to acquire Stoneware, a small U.S. based company specializing in cloud products for schools and governments, as part of the PC maker’s strategy to bolster its cloud computing offerings.

While Lenovo did not disclose financial terms of the deal, it said it expects to complete the acquisition of the Indianapolis-based Stoneware by year’s end.

-Michael Kan

IBM: Programs for Service Partners

IBM’s launched a new set of programs where managed service provider (MSP) partners can now get financing, marketing assis-tance and technical exper-tise when pursuing clients, according to the company.

This new package of incentives aims to alleviate some of the challenges MSPs face, including obtaining technical expertise, improv-ing marketing efforts and reducing financial concerns.

-Joab Jackson

IBM’S LATEST main-frame, the zEnterprise EC12, was built with data analytics and hy-

brid clouds in mind.And that’s good, analysts

say, because the company must focus on new applica-tions like those to ensure that its workhorse data-center technology remains relevant—and continues to generate big profits—at a time when CIOs can choose from a wide array of alter-native technologies.

Charles King, an ana-lyst at Pund-IT, said new IBM mainframes always include “an interesting mix of significant performance bumps [and] new features.” Without new capabilities, he added, the technology would “get stuck as just a credit card and bank state-ment transaction platform.”

He noted that the new system is capable of meeting the computational require-ments that come from, say, RFID-generated data and smart electricity meters.

David Wade, CIO of finan-cial services firm Primerica, said he intends to upgrade to the EC12 from its predeces-sor, the zEnterprise 196, in a year to 18 months.

Primerica has installed 19 mainframes during Wade’s 32 years at the company. The IT shop uses primarily IBM systems, including System p and Wintel computers.

Wade said Primerica is committed to the tradi-tional mainframe platform. He said he knows of other organizations that have migrated away from main-frames only to return. He

called such moves “a waste of time and money.”

It’s because of people like Wade that IBM continues building mainframes, de-spite competition from a growing number of highly capable alternatives—in-cluding the company’s own Unix- and IBM i-based Power systems.

IBM says the new system offers 25 percent more per-formance per core than its predecessor, and some work-loads will see performance gains of upto 45 percent.

Joe Clabby, an analyst at Clabby Analytics, said the increase in cache helps improve performance. The new system is “better at da-ta-intensive workloads,” he

said. “The closer you can put the data to the processor, the faster it can be executed.”

Initially, the flash mem-ory will be used internally for efficient paging of virtu-al memory, diagnostics and better handling of work-loads, said Frey. Eventually, he added, IBM’s DB2 data-base and Java will directly

exploit the flash memory, providing “huge improve-ments” in the performance and scale of DB2, buffer pools and Java.

The zEnterprise EC12 was also adapted to a type of datacenter design that does not include raised floors.

— By Patrik Thibodeau

8 INDIAN CHANNELWORLD OCTOBER 2012

Page 11: Channelworld Magazine October 2012 Issue

Fujitsu recommends Windows® 7.

■ Up to Intel® Core™ i7 processor■ Windows® 7 Professional 64-bit■ Stylish and slim design combined with

small form factor at only 1.6 kg■ Optional embedded 3G/UMTS, WLAN

and Bluetooth

■ Intel® Core™ i5 vPro™ processor■ Windows® 7 Professional 64-bit■ Maximum Security with Advanced

Theft Protection (ATP), optional TPM module and fi ngerprint sensor inclu-ding Omnipass Security Software

■ Comfortable working thanks to anti-glare display and port replicator

■ Intel® Core™ i5 vPro™ processor■ Windows® 7 Professional 64-bit■ Modular bay for a second battery,

second HDD, DVD/Blu-Ray drive or weight saver

■ Optional integrated 4G/LTE or 3G/UMTS (incl. GPS)

LIFEBOOK UH572 LIFEBOOK S792 LIFEBOOK T902

The extensive Fujitsu LIFEBOOK portfolio offers you a wide range of mobile devices to meet every requirement. From elegant ULTRABOOKs guaranteeing highest security and boundless mobility to touch-based tablets providing ultimate versatility, every Fujitsu LIFEBOOK provides the greatest reliability for all business tasks either in the offi ce or on the move.

Perform with style

lifebook.in.ts.fujitsu.com

■ Up to Intel® Core™ i7 processor■ Windows® 7 Professional 64-bit■ Stylish Matt soft Finish with

14” (35.6cm) HD Display■ HD Camera, SpillProof KB & Anytime

USB Charge

LIFEBOOK LH532

To fi nd out more, call: 1800 102 3457or email: [email protected]

Prices Start From ` 23999*Buy a Windows 7 PC and get Windows 8 Pro for INR 699.Offer valid from 2 June 2012 to 31 January 2013; for complete details visit http://windowsupgradeoffer.com

Copyright © 2012 Fujitsu India Pvt. Ltd. All rights reserved. * Conditions Apply. Taxes & Levies extra.

with the 3rd Gen Intel® Core™ vPro™ processor family – Enriches your life.

Page 12: Channelworld Magazine October 2012 Issue

tried to do different things with its PC division. In 2004, IBM shelved its PC business. Dell, too, reached that crossroads and like any smart business, chose to di-versify and become an end-to-end solution provider.

“The margins in hard-ware are really being squeezed so Dell is trying to be a total solution pro-vider. It’s trying to position itself as an alternative to HP and IBM and become a true post- PC era enter-prise player,” says Vishal Tripathi, principal research analyst at Gartner.

Hardware, clearly, was not the way forward for Dell, agrees Sanchit Vir Gogia, a senior analyst at Forrester Research. “What happened with Dell was that they were so highly vested into the top-line, that the bottom line be-came a question mark. Due to this they were too depen-dent on their PC business. So, portfolio diversification is a natural progression.”

Getting analysts to en-dorse its transition is pos-sibly the easy part of Dell’s transformation. To be able to get the skills needed to be a solutions provider fast, Dell’s diversification has been peppered with acquisitions. Sample these numbers: It’s made 27 ac-quisitions since 2006 and spent $5 billion (Rs 26, 010 crore) in acquisitions in the past year alone. Of that $2.4 billion was spent just to buy Quest Software. In April this year, Dell bought five companies.

Post the acquisitions, Dell has a more promising portfolio, with a blend of hardware, software and services. If you were look-ing for a pattern in Dell’s acquisitions, there is one. Rekuram Varadharaj,

ABOUT TWO months ago, at the Brainstorm Tech 2012

conference, Micheal Dell made an alarmingly stale statement: “Dell is a pretty different company”.

For anyone who has not been living under a rock, the moves Dell has been making to move away from its traditional PC business have been evident. But as the company transforms itself into an end-to-end solution provider, the question is: Can Dell go the distance?

D(W)ELLING ON THE PASTThe fact that there is a

new Dell in town is obvi-ous from the numbers. Where once Dell’s focus was entirely on PCs—it sold those for 28 years—today, about half its profit margin comes from other revenue streams.

There’s good reason for Dell to transition out of the PC market. At one point the market belonged overwhelmingly to it, but over time that changed as new leaders emerged. Dell isn’t the only hardware gi-ant to move its focus away from boxes. In fact, it’s probably late to the party. HP, at some stage, realized that the PC business wasn’t where the money is, and

Can Dell Make the Jump?

Dell is making a transition from a hardware-centric vendor to a solutions- based giant. Can it go the distance? By Radhika Nallayam

n NEWS ANALYSIS

10 INDIAN CHANNELWORLD OCTOBER 2012

Page 13: Channelworld Magazine October 2012 Issue
Page 14: Channelworld Magazine October 2012 Issue

marketing director, enter-prise solutions and growth markets, Dell India, says, “Our aim is to expand by adding adjacent capabili-ties to three important core domains: Workforce, data-center, and cloud/services. At the same time, we are also looking at acquiring strategically important large platforms. So we are not starting from zero; it’s a

calculated strategy to grow our capabilities and foot-print in the market.”

TRACING THE START When did Dell really start to make the transition? It depends on who you ask. But if you study its expan-sion portfolio over the last few years, from PCs to printers, then to the server business, it becomes obvi-

ous that Dell has been mov-ing towards the solutions business for sometime. Almost every acquisition, it seems in hindsight, was made with a purpose.

But of all its buys, Dell’s acquisition of Perot Systems in 2009 marked a clear be-ginning. The company then added more capabilities to its services kitty, by buying out Make Technologies and

Clerity in April this year. In-terestingly, both acquisitions happened in a span of just two days. Adding services and consulting capabilities clearly was a game chang-ing move and it put Dell di-rectly in competition with the services superpowers in the industry.

The Perot Systems ac-quisition also highlighted how important India is in the company’s scheme of things. “Since the purchase of Perot Systems, Dell has learned the services side of the business, because sell-ing hardware is different from selling services and solutions. Besides, Dell un-derstands the importance of India as a services mar-ket. The domestic market for services is far higher than anywhere else. That’s where the real opportunity is,” says Gogia of Forrester.

Out of the 27 acquisitions that Dell has invested in since 2006, 13 companies have a presence in India, a very important mar-ket for the vendor. “This means that our capabilities are ready to be leveraged in a key market like India, especially in the mid-market which is growing at a faster pace compared to the overall industry,” points out Varadharajan.

Dell plunged into the software business as well, with a series of acquisi-tions, the most recent one being Quest. Dell’s soft-ware division now has the tough goal of achieving $5 billion in software sales, al-most a five-fold jump, in the coming years. The recent IP acquisitions like Son-icWall, AppAssure, Wyse technologies and Boomi, will help Dell be better prepared for markets like desktop virtualization and cloud. At the same time, it

The acquisition of SonicWall by Dell raised eyebrows, especially among the partner community in India. But Richard Ting, VP-Asia Pacific, Dell SonicWALL, says it’s business as usual.

Dell is still not perceived as very channel-friendly company, despite its recent effort to get closer to chan-nel. Traditional SonicWALL partners are naturally anxious. Your comments. When the acquisition was announced, there was a lot of concern within the channel, particularly in India. Some of that is related to the fact that SonicWALL, prior to the acquisition, did all its busi-ness through the channel, whereas Dell is known for its direct sales force. Many of our channel partners—some of whom are Dell partners as well—have at times competed with Dell’s direct sales team. But we have already told

our partners that Sonic-WALL will continue to sell through channels. Dell has mandated inter-nally that SonicWALL will continue to be a channel-led product. What that means is that if the Dell direct sales team wants to sell any SonicWALL so-lution to the end customer, it will be fulfilled through the channels.

But partners still feel that Dell’s eventual goal is to go back to its original direct model or a cloud model, and that right now, Dell needs partners only to reach out to markets where it has no presence. I think that ob-servation is inaccurate. If you look at Dell, more and more business worldwide is coming from the chan-nel. Of course, they do have a very strong direct sales force, and that is not going away. But most of the business will be contributed by the chan-nel. We can already see that evolution within Dell, especially in markets like North America

Will SonicWALL partners get an opportunity to sell the larger portfolio that Dell carries? Absolutely.

SonicWALL partners will be introduced to the Dell PartnerDirect program. In addition to SonicWALL so-lutions, they will also have the ability to sell a much broader portfolio of Dell solutions as well. But we are not mandating them to do that because many of these partners also have relationships with compet-itors of Dell. Partners will also get an opportunity to sell in the enterprise seg-ment in association with a larger brand like Dell.

On the other hand, Sonic-WALL partners are already facing fierce competition from Dell’s partners in the security space. I think that is a good thing. In fact, from the SonicWALL side, our intent was to grow our partner base. We are not going to stay static with the number of partners. Even if Sonic-WALL was not acquired by Dell, growing our channel partner commu-nity is something that we would have done. Besides, I think the partners who have invested already in SonicWALL can differen-tiate themselves from the rest, with the help of their strong expertise.

The Growing Dell Channel Community

n NEWS ANALYSIS

12 INDIAN CHANNELWORLD OCTOBER 2012

Page 15: Channelworld Magazine October 2012 Issue
Page 16: Channelworld Magazine October 2012 Issue

n NEWS ANALYSIS

has been filling the gap in its datacenter portfolio by buying out a lot of network-ing, storage and manage-ment companies as well.

EASIER SAID THAN DONE The acquisitions have ensured that Dell has the makings of a solution pro-vider—at least on paper. To follow through, the com-pany will have to ensure that it can integrate its pur-chases well. “Acquisitions don’t mean the job is com-plete, the war is only half-won. How they integrate these new capabilities with the existing ones and how they position it, is going to be very important,” says Tripathy of Gartner.

On it’s part, Dell is taking the integration seriously. “We are working at inte-grating all the companies that we have acquired so far. Some of the integra-tions have been completed successfully and that gives us the confidence with the rest,” says Varadharajan.

Industry analysts, how-ever, believe that enter-prise customers are more

different billing models. That maturity is very hard to come by overnight,” says Gorgia. He believes that Dell is very margin-ally present in most large outsourcing, or SI or man-aged services contracts.

Nor is Dell a threat yet, in the consulting space, to established players like Accenture, Infosys or TCS. The managed services space is still dominated by an IBM or HP, while in the SI space, the Wipros and HCLs continue to be the undisputable players. But it’s too early to judge Dell. In Tripathy’s words, “Right now, they are a marginal player in some areas, but at least they have made a start. Two years down the line, things could change”.

So what does the compa-ny have on its side? Brand recall, believes Varadhara-jan. “We have strong mind-share in most areas and we will continue to work with some of our key partners (like Microsoft, VMware and Citrix) to leverage and scale-up. Our acquisitions do not displace these part-nerships. We understand that the transition to an end-to-end player can’t happen overnight.”

DELL’S TEN MOST IMPORTANT ACQUISITIONS COMPANY YEAR TECHNOLOGY

Quest Software July 2012 IT Management Software

SonicWall April 2012 Security

Wyse Technology April 2012 Cloud Client Computing

Force10 July 2011 Datacenter Networking

Compellent December 2010 Storage Systems

Boomi November 2010 Cloud Integration

Scalent July 2010 Datacenter Management

KACE Networks February 2010 Systems Management Appliance

Perot Systems September 2009 IT Services

EqualLogic January 2008 Storage Area Network

14 INDIAN CHANNELWORLD OCTOBER 2012

We understand that the

transition to an end-to-end player can’t happen overnight.” REKURAM VARADHARAJ, MARKETING DIRECTOR, ENTERPRISE SOLUTIONS AND GROWTH MARKETS, DELL INDIA

likely to prefer players who are better experienced in services and at providing solutions. “Let’s compare them with IBM or the

likes, which has almost a lakh in staff in India, working for international customers across a variety of service portfolios, with

CAN Dell transform itself from a hardware maker into a full-fledged soft-

ware vendor? Based on its recent shopping spree, it sure is trying.

Dell is in the midst of a turnaround plan to reduce its dependence on PCs and expand into more profitable areas such as software and services. It has moved to acquire more than a half-dozen software firms recently.

Dell’s goal isn’t to build an independent software business and compete with Oracle and SAP. Rather, it wants to com-bine its hardware, software and

services into prebuilt packages that it says will make it easier for midsize firms to adopt tech-nologies like data warehousing and virtualization. Dell has to retrain its sales staff to sell complex systems com-bining software and hardware. It also needs to reeducate thou-sands of channel partners.

Plus, Dell has some integra-tion work to do. Dell planned to launch a hosted analytics ser-vice using its Boomi software this year, for instance, but that rollout has been pushed back to 2013.

CTO of Tippet Studio Sanjay Das says he gets attentive ser-

vice from Dell, and for that rea-son he would take a close look at its software. He’s evaluating Dell’s Kace management appli-ance, which includes software for rooting out problems.

But building a software business will be an uphill battle for Dell, Das says. Not only is it traditionally a hardware vendor, but it doesn’t have a history of research and innovation the way a rival like HP does, he says. “I think it’s a humongous challenge for Dell.”

He notes that buyers favor vendors with expertise in a par-ticular technical area.

—By James Niccolai

THE SOFT DELL

Page 17: Channelworld Magazine October 2012 Issue

SAP is a big rival of Oracle. In the cloud, virtualization and big data domains you compete with EMC, IBM and others. Does the increasing list of competitors worry you? We believe that we have four major competitors. SAP is certainly competition in the classic on-premise application space, but we don’t see them much in the cloud or industry specific areas. Salesforce.com has undoubtedly been at the forefront. However in a reasonably short space of time we are number two with over a billion dollars in business through the cloud. IBM has been a long-time competitor, but we maintain co-opetition with them. As we release products like Exadata,

n THE GRILL

Senior VP-Worldwide Alliances, Channels & Embedded Sales, Oracle, underscores the company’s long-term channel strategy.

Judson Althoff,

it indirectly competes with EMC. If a customer buys such an engineered system there is no more storage RFP.

To counter competition, we will look at direct focus through specialization. We have a focused sales-team where some teams sell only CRM to beat Salesforce. Similarly, we have other teams dedicated to different domains. We introduced specialization within OPN (Oracle PartnerNetwork) to work with competent go-to partners.

The large acquisition of Sun pitches you against server giants like IBM and HP. Gartner’s Q1/2012 report lists Cisco at number five while Oracle did not feature

DossierName: Judson Althoff

Designation : Senior Vice President-Worldwide Alliances, Channels & Embedded Sales

Company : Oracle

Current Role: He reports to Mark Hurd, and is responsible for the development and execution of Oracle’s Alliances and Channels programs and strategies, partner revenue-generating business initiatives, Oracle PartnerNetwork and OPN Specialized program. He also manages Oracle ISV/OEM and Java-sales globally.

Career Graph: Althoff has worked for Oracle for more than 12 years. Earlier, he was an Area BDM and District Sales Manager for EMC, responsible for a team of direct and indirect sales-staff in a five-state region in the Midwestern United States.

Ph

oto

gra

ph

by

KA

PIL

SH

RO

FF

Page 18: Channelworld Magazine October 2012 Issue

n THE GRILL | JUDSON ALTHOFF

in the top five. Is Sun (now Oracle) fast losing its shine? I am quite bullish on hardware business. Let me tell you why. I think some of these reports are a bit misleading as they tend to report holistically on the server landscape. From a unit volume stand-point, even perhaps from a revenue perspective, we would never be number one in that landscape. We specifically do not compete in the commodity market, which consists of single digit margin in the x86 businesses. The real innovator is Intel and we have a close alliance

with the chip giant which is the backbone of our engineered systems. We believe x86 should be competent in engineered systems and not become a major focus for us. We are truly the only vendor with Intellectual Property (IP). HP has no IP as their IP is Red Hat, Intel and VMware are fast losing their value to customer. We have more than 40 percent share of the entire enterprise software market. Increasing our hardware business over and above our software dominance will squarely put us on top, while we stay profitable.

Partners in India disillusioned by the Heritage Sun strategy are either shifting their business to competition or continue remain unsure of selling Sun portfolio. Comment. To be fair, we took longer time in India and I do understand their impatience. The Sparc T-series servers are the best in class. There is nothing superior than to sell Oracle software under Oracle hardware. We have invested in Sun ZFS series which competes with storage leaders like NetApp. For server-storage attach ratio, ‘Oracle on Oracle’ solutions means that superior proactive customer support than rely on cross-engineering competitors, though EMC/NetApp claim to be well certified on HP/IBM servers. Finally, there is no better DB solution than Exadata. I request partners to give a second thought to our extensive R&D and consistent partner strategy around hardware.

SaaS, social media, cloud and BYOD. Are these tech trends on the hype-cycle or do you see adoption by enterprises? There is a certain amount of hype, stickiness and fad around these words. However, cloud brings a new IT delivery paradigm but it won’t be the only answer. The cloud provides simplistic way to deliver standard IT services to the market quickly and at a low cost. Applications like HR and CRM would move to the cloud for most enterprises. The trick will be wiring those cloud services back to the infrastructure, and partners have a huge role in developing these services.

BYOD is fairly immature. It’s a big part of the Java strategy to move data (encrypted at our end) from laptop to mobile devices. The estimated explosion of mobile devices from three

billion to 50 billion in next couple of years will be a big opportunity.

What makes Oracle a favored vendor for ISVs and systems integrators? It was fundamentally anchored around writing applications of ISVs around our database. We have grown into a true comprehensive platform—from middleware to DB, infrastructure layer, virtualization and down to server and storage. We are certifying ISVs on engineering systems like Exadata and Exalogic under the Exastack program. We have doubled ISV business over the last couple of years. Our expertise in Java enables us to be the only company to provide technology from the device back to the datacenter. Billions of devices produce data and is classified as big data, which we manage at the back-end.

Unlike our competitors, we do not really invest in consultancy. Oracle in the last eight years, through all the acquisitions, has grown in terms of product portfolio, but the consulting resource numbers are relatively flat. With OPN, we are getting SIs specialized in role-specific training to help incubate their business.

With Oracle spearheading diverse technologies, partners are compelled to increase T&C. What ROI can they anticipate for a long-term profitable partnership? It depends on the scope and scale of thepartners. We have many boutique partners. And larger partners, capable of competencies in application to disk, are extremely profitable. It is a uniquevalue-proposition to deliver end-to-end solution, and we lead the way. Other companies claim to be end-to-end vendors too. For an SI with end-to-end solutions in their portfolio, we are the best partner as there are fewer moving parts and fewer areas of failures.The new partner program provides good margins for selling right products in right markets. More programs for cloud opportunities will be launched. Our big data strategy includes Exadata and BI like Exalytics through acquired Hyperion assets which we engineered for real time Analytics. There lies the big money for partners. —Yogesh Gupta

For an SI with an ‘end-to-end’

portfolio, we are the best partner as there are fewer moving parts and fewer areas of failure.

16 INDIAN CHANNELWORLD OCTOBER 2012

Page 19: Channelworld Magazine October 2012 Issue
Page 20: Channelworld Magazine October 2012 Issue

CHANDIGARH-BASED FORE Solutions was set-up in 2001. This was a time when IT was predominantly a

box-pusher market which consisted of assemblers and domestic manu-factures. Fore Solutions, with a dedi-cated and skilful bunch of employees has traversed successfully by coun-tering the challenging business envi-ronment through their innovative so-lutions. “We have placed ourselves in a reasonable position by maintaining a shoe-string budget and retaining manpower by putting the employees on performance-based incentives and fast promotions,” says Manu Mehta, director, Fore Solutions.

Today, Fore Solutions is a brand in itself, and can boast of partnering the best of OEMs’ in the IT sector.

n FAST TRACK

Fore Solutions

A service-centric organisation, the company has stayed ahead by intro-ducing new products and solutions,

and have constantly kept an eye out for new market segments to keep a healthy growth rate. Owing to these initiatives, Fore Solutions clocked Rs 22 crore in 2011-12.

GAINING MOMENTUMSince its inception the company has worked with vendors like IBM, Cisco and HP among others. “Today, we are a preferred SI for any large client that wants to implement back-up and storage solutions,” states Mehta.

Two projects that the SI executed did a great deal of good for their reputation. It set course for suc-cess. The first being a project for Chitkara University, where the SI implemented basic cabling, supply-ing PC’s, servers, switches, firewall, wireless and security. The second project involved an end-to-end net-working solution for Gates India, which had only recently set-up its office near Chandigarh. They accom-plished this in partnership with IBM and Cisco. “This project became a reference case for us which helped us later with some of our other projects. Since then, there has been no looking back,” recalls Mehta.

As they steadily course through this fiscal year, the SI has increased its focus on the government segment and is actively participating in net-working and storage tenders for the future. “We are looking at a 30 per-cent growth over the last year’s Q2,” states Mehta.n

—Aritra Sarkhel

Founded: 2001

Headquartered: Chandigarh

Other Key Executives: Manu Mehta, Director-Marketing and Finance; Sanat Khullar, Head, Service Operations; Sanjeev Mehta, Head-Networking and Security Division; Renny Thomas, Head-Logistics and Commercial

Revenue 2009–10: Rs 15 crore

Revenue 2010–11: Rs 18 crore

Revenue 2011–12: Rs 22 crore

No. of Employees: 60

Key Principals: IBM, HP, Lenovo, VMware, Symantec, TCS, Cisco, Ruckus, AMP, D-Link, WatchGuard, Radware

Business Activities: Networking, bandwidth management, security, servers

Website: www.foresolutions.net

Snapshot

Shoe-string budgets and a skilled team have worked well for us, says Manu Mehta, director, Fore Solutions.

VERTICAL SPLIT

SOURCE: FORE SOLUTIONS

32%SME

24%Education15%

Government

14%Hospitality/

Health

8%Research

7%Telecom

18 INDIAN CHANNELWORLD OCTOBER 2012

Manu Mehta (L), Director, and Rajesh Puri, Director and CEO.

Page 21: Channelworld Magazine October 2012 Issue

Chairman and CEO,

Netgear, talks about market

competition and partner

strategy in the India market.

By Aritra Sarkhel

Over the years, what has redefined the networking market, which was more about switches and routers? LO: Presently, the network is the system. There is not a single computer present which will service all the demanding tasks and there is no single datacentre that can hold all the data that you need. Therefore, work is distributed over multiple servers and storage for which networking is a must. Right now, the network is the centre of gravity, and that’s why we see the emer-gence of players like Cisco prominently, as compared to companies like HP and IBM. All the other compa-nies have either changed themselves to service ori-ented companies or become completely irrelevant.

Networking to a large extent is a commodity market.

The SMB segment is attaining maturity in terms of connectivity, but is highly price sensitive and not really ‘brand conscious’. Comment.LO: Well, the answer is yes and no. The economy goes through multiple phases of maturity. During the early stage, which is the survival stage, the important thing is to get things done be-cause one starts from noth-ing to achieve something. India is at the early stage of maturity in the market. So, the general tendency is to just do it. But, the good thing lies in the fact that the market here is grow-ing at a rapid pace. Even though it is a commodity, everyone seems to have a stake in it. But as the economy matures, you will get a lot more competition, and in order to survive, one would need to add value. So, as an organization, one has got to be more sophis-ticated and differentiated.

Fighting the price war in the SMB space means lesser profitability for you and your partners. How have Netgear books been in past 12 to 18 months in this seemingly slow economy?LO: Profit is the measure of appreciation by customers for the value-addition that you create. If the customer appreciates your value ad-dition, then the customer is willing to give you a lot more profit and if not, you don’t profit either. For ex-ample, China is less price-sensitive than India and their economy is more ma-ture than the India’s. At this stage of fast growth, talking about profitability wouldn’t make sense because no one is going to appreciate your value-addition.

Netgear books have been doing very well. Our

Patrick Lo, ON RECORD n

Ph

oto

gra

ph

by

SU

JIT

H

OCTOBER 2012 INDIAN CHANNELWORLD 19

Page 22: Channelworld Magazine October 2012 Issue

growth in 2011 over 2010 was 32 percent and our growth in 2010 compared to 2009 was 35 percent. Moreover, the growth dur-ing the first half of 2012 as compared to 2011 has been 16 percent. So, in this kind of an economy, you cannot complain much. We are cer-tainly growing much faster than any of our competitors like D- Link, Cisco or HP.

How easy or difficult is it to be an end-to-end networking vendor for SMBs, as there is a need for continuous R&D to encompass latest range of routers, NAS and other networking products?LO: We started opera-tions 16 years ago purely in switches. We then went on to add routers,

firewalls, wireless LAN, NAS, and recently we have added video-surveillance to our portfolio of products. When the market matures, customers demand sophis-tication and value-addition in terms of completeness of solution and services. And we provide better service to our customers through our full portfolio of products.

We already have 60 R&D engineers in India and plan to continue ex-pansion through next the year. The fastest growing team in our organization is R&D. In China, we have over 120 engineers, which is double of what we had the year before and we have also doubled our tally from 150 to 300 in the U.S.A. Unlike other com-panies who are moving

their jobs away from US, we are actually recruiting back there.

Netgear also competes with entry-level brand like Zyxel, TP-Link, Belkin and local Indian brands like DAX in the SOHO/SMB segment. So, why should a systems integrator work with you? LO: We have a robust port-folio of products as com-

pared to the above men-tioned companies. People who buy Zyxel and DAX are few in number. We are number one in every prod-uct we provide.

The SI would stay with us for our full portfolio of solutions, and they would not have to look at multiple vendors or face multiple issues. Our products are more expensive than most of the competing brands, yet the reason the customer pays that price for our products is because of the value-addition we provide. Also, the partners end up with better margins.

Your close rival D-Link is moving fast towards enterprise segment without losing grip on the SMB

market in India? Why is Netgear staying clear of the enterprise and upper mid-market?LO: D-Link has been losing out in the SMB space and has nowhere to go. They are naive enough to think that they have enough market in the enterprise segment. I urge them to pit themselves against HP or Cisco. While we have been gaining 16 percent year af-ter year, D-Link has been declining by 7 percent.

Networking has a big role play in datacentres backed by virtualisation, collaboration and cloud applications. What is your innovation in these emerging technologies and how can partners leverage the same?

LO: We are the number one NAS provider in the SMB segment that started sup-porting virtualization. In cloud computing, we have introduced the unified storage that would enable our channel partners to provide cloud services to our customers and will let our them build their own private cloud. With the introduction of the Ready-SHARE Cloud, we are enabling our customers to access their data from any mobile platform.

What is your roadmap for BYOD in terms of product and partner strategy?LO: When people are plug-ging their devices to the office network, our wire-less LAN will be able to let it plug into the network

with security. We are investing a lot in this wire-less LAN technology and have a skilled team that is building a next generation wireless LAN controller coupled with our security appliances, which would accommodate the BYOD.

How has Netgear fared in the India market in past year in terms of partner business and customer numbers?LO: Presently, in India, as compared to D-Link, we are still pretty small. We still have a vibrant pres-ence in Chennai, Hyder-abad, Bangalore, Mumbai and Delhi and have atleast 40 to 50 partners in each of these metro locations. We do have some direct con-nect with partners in tier-2

cities and some of the major city SIs’ have connect with the smaller companies too.

How have you been innovating so that partners benefit well?LO: On ground, we have a better developed pro-gramme in North America and Europe, and plan to implement the same gradually in India. The most important aspect is to protect our partners’ margins. We have a true deal registration in place wherein we treat every deal on the partner por-tal as a secret. In case of companies like Cisco and HP, many partners are involved in the during the bid, and often these ven-dors bid directly. This is never the case with us. n

32% The growth recorded by

Netgear,globally, in 2011 compared

to 2010.

Profit is the measure of appreciation by customers for the value-addition you create. If well-appreciated, the customer

is willing to give you more profit, if not, you don’t profit either.

n ON RECORD | PATRICK LO

20 INDIAN CHANNELWORLD OCTOBER 2012

Page 23: Channelworld Magazine October 2012 Issue

FOR A company that hadn’t started off as a traditional SI, Peak XV Networks has indeed treaded a long way. An MNC consulting com-

pany that is now a hardcore IT solu-tions provider, Peak XV is a growing entity with six years of IT reselling under its belt

“Rebuilding an entity in the domestic market in an entirely dif-ferent space wasn’t an easy task. In our earlier avatar, we were only into remote support, network design and interoperability testing,” recalls Deepak Hoskere, managing director of Peak XV Networks.

What triggered the change? Ho-skere, who bought the Indian op-erations of Peak XV in 2003, soon realized that pure play consulting is not going to sell as a proposition

n FAST TRACK

Peak XV Networks

in the Indian market. “Customers in India almost don’t always pay for consulting. Hitherto, being a consult-

ing company, we hadn’t cultivated a sales team. So, began the change,” he says.

Today, Peak XV works with the topmost networking vendors such as Cisco and Juniper, besides a host of others while also being a remote infrastructure management com-pany. A combination of services and solutions is the company’s win-ning ticket to the customer. A proud Hoskere claims that the Peak XV’s existing customer retention rate is very stable, and is proof of the fact that the company is tracing the right path to growth. A mix of pres-tigious clientele, particularly in the highly competitive defence sector, makes Peak XV a name to reckon with. “A particular project for a defence customer, where we set up gateway security, had as many as 4000 nodes to be dealt with. The challenges were aplenty, but our usual mantra of giving our custom-ers the best, without underselling ourselves, stood us in good stead,” adds Hoskere.

Going ahead, Peak XV Networks is all geared to meet the IPv4 to IPv6 migration and sees huge potential there. Also, the fact that IP-based surveillance as a big mandate will work in its favor, feels Hoskere. “We want to be ready for the next wave, and have considered investing enough time and resources in making the big leap for the coming fiscals.” n

— Shantheri Mallaya

Founded: 2000

Headquartered: Bangalore

Key Executives: Deepak Hoskere, Managing Director; Vishwanath Venkatram, Head-Network and Security Practice; Venkat Rao, Business Development Manager; Raghavendra Bhat, Manager-Strategic Sales

Revenue 2010–11: Rs 7.65 crore

Revenue 2011–12: Rs 10.20 crore

Projected 2012-13: Rs 15.00 crore (projected)

Employees: 30

Key Principals: Cisco, D-Link, HP, Dell, Lenovo, Symantec, Fortinet, Watchguard

Business Activities: Networking solutions, security, wireless solutions, structured cabling,cloud computing, voice and unified communications, storage and virtualization

Website: www.peakxv.in

Snapshot

We don’t believe in underselling ourselves, states Deepak Hoskere, managing director, Peak XV Networks.

Ph

oto

gra

ph

by

SR

IVA

TS

A S

HA

ND

ILY

A

VERTICAL SPLIT

SOURCE: PEAK XV NETWORKS

10%Healthcare

35%Enterprise

25%Government

15%SMB

15%Education

OCTOBER 2012 INDIAN CHANNELWORLD 21

Page 24: Channelworld Magazine October 2012 Issue
Page 25: Channelworld Magazine October 2012 Issue

MOBILITY IS a great concept and we are prepared to ser-vice enterprise demands. But, we can’t tell where the

demand for mobility is headed. Even if CIOs are ready to buy into the concept, their CFOs might put a spoke in the wheel because of licensing and hard-ware inventory costs,” says Jiten Meh-ta, director of Mumbai’s Magnamious Systems, a well-heeled player with large enterprise players in its kitty.

If you get a sense of uncertainty in Mehta’s outlook for mobility, you aren’t imagining it. Plenty of enterprise chan-nel partners are taking, let’s call it, a conservative approach to the potential of the mobile market.

At the same time, there are others who are more outspoken with their views. Take for example Subramaniam

Madhira, founder and CEO of Chennai-based OmniNet Systems, which has been doing work in the mobility area, at the device and network level, for some years now, and has customers in logistics, microfinance, and insurance.

“Where is the ROI in a mobility solu-tion? I will not waste my sales resources pitching mobility as a standalone piece, when I am fully aware it’s more of a creamy layer concept, one that is re-stricted to a company’s top and middle management,” he says, adding that until mobility trickles down to the masses of an organization, partners like himself aren’t going to see the returns they want. “I would much rather divert time, money, and effort to network audits, which are a larger concern.”

It’s hard not to be surprised by these opinions—especially if you know that

Indian CIOs are extremely gung-ho about mobility and want to invest in it. According to CIO magazine’s Mid-Year Review Survey 2012 (See Mobility: The New Watch Word) mobility is the new hot area for Indian enterprises. (CIO is a sister publication to ChannelWorld). The survey of over 190 CIOs, reveals that Indian companies, immaterial of their size, are already investing in mo-bility—and will continue to do so.

The question now is: Why is there a disconnect between partners and CIOs? And is the mobile solutions mar-ket really worth an enterprise channel partner’s time?

WHERE ARE THE PARTNERS?According to the Mid Year Review, 24 percent of IT decision makers at very large Indian enterprises (Rs 10,000

Indian CIOs want to invest in mobility solutions. But channel partners say they aren’t really keen. What’s going on? By Aritra Sarkhel & Shantheri Mallaya

MOBILE

Disconnect

OCTOBER 2012 INDIAN CHANNELWORLD 23

MOBILITY SPECIAL((((( (((((P

ho

tog

rap

h b

y K

AP

IL S

HR

OF

F

Page 26: Channelworld Magazine October 2012 Issue

34%Of primary discussions for enterprise mobility are done with independent software vendors.

Most SIs don’t have the requisite depth of experience to deploy BYOD systems. A challenge for them and vendors is that customers look at investments in mobility solutions as an ongoing process, which may hamper ROI and increase their TCO.”VILAKSHAN JAKHU, SVP AND CIO, BPTP

Most SIs don’t have Most SIs don’t have the requisite depth of the requisite depth of experience to deploy BYOD systems. A challenge for them and vendors is that customers look at investments in mobility solutions as an ongoing process, which may hamper ROI and increase their TCO.”VILAKSHAN JAKHU,

AND CIO, BPTP

24 INDIAN CHANNELWORLD OCTOBER 2012

n COVER STORY

Source: Zinnov

crore and above), say that the unavail-ability of good system integrators is one of their top three challenges, edg-ing out more standard complaints like a lack of funding or having too many projects to implement. And, if you look at the numbers across company sizes, one in every 10 Indian CIO has the same complaint.

While CIOs feel a need for better system integrators for all projects—not just their mobility ones—the fact is a significant number of enterprise projects have something to do with mobility (if you study the number of CIOs saying they want to pursue or are pursuing mobility-based projects).

Take for example, Vilakshan Jakhu, CIO of Gurgaon-based real estate-developer BPTP. “Mobility is a much abused word. We need to understand whether it means the development of an application on a mobile device or MDM or just a mobile device. Many SIs do not have requisite experience in deploying BYOD systems.”

BPTP is an early adopter of mobile device management (MDM) through

MobileIron. BPTP’s adoption of a Saas model for its MDM needs is a case in point of how Indian enterprises are exploring mobile options—without the intervention of partners.

Yedunandan S., principal consul-tant, Mobility at Cisco India, agrees that there is a shortage of partners with mobile know-how. “The dearth of skilled partners is true to an ex-tent. If you look at the customization of certain apps for different business environments, you’ll see a lack of skill sets in India, as of now. It’s an emerg-ing area in India and may not have extremely mature partners.”

Sumanth Tarigopula, director, Global Delivery-India, HP Enterprise Services, also agrees. “CIOs are still struggling to find true mobile part-ners. BFSI and e-commerce are areas where we are seeing a mobile explo-sion. However, the day is not too far, when stakeholders will see mobility as a differentiator, as well a value-added service.”

The challenge Tarigopula, points out, is that, “Most mobility partners have a one-sided perspective: Sell mobility as a me-too strategy. What enterprise CIOs need is a true mobil-ity business partner who can enable enterprise-to-enterprise mobile solu-tions for business executives on the move, increase agility, and their abil-ity to run business from anywhere.”

The list of stakeholders who concur that there is a lack of mobility skills in the channel to service enterprise demands extends to the channel itself. “CIOs are in a fix because they are not confident of the big OEMs. The OEM might provide them with the software and hardware but when it comes to the

Page 27: Channelworld Magazine October 2012 Issue
Page 28: Channelworld Magazine October 2012 Issue

26 CHANNELWORLD JANUARY 1, 2009

n SPECIAL REPORT

Mobility: The New Watch WordBased on a survey of over 190 Indian CIOs, it’s clear that there’s plenty of interest in mobility solutions.

Mobility Outlook

15% not interested

Company Size: M

19% will implement in 6 months

25% upgrading/ refining

41% currently implementing

In the next six months, companies—across all sizes—will continue to heavily invest in mobility.

Company Size: XL Company Size: L

30% will implement in 6 months

41% will implement in 6 months

24% currently implementing

21% upgrading/refining

14% not interested

23% currently implementing33% upgrading/refining

14% not interested

CIOs Spent On (Company Size: XL)

26%Business process management

32%Cloud computing (private)

34%Mobile/Wireless

34%Customer service/CRM

34%Content/document management

40%Reporting (using BI tools)

42%Enterprise resource planning

42%Collaboration tools

47%Analytics (not reporting)

55%Video conferencing/telepresence

Invested in MobilityMobility is one of the areas Indian companies—across all sizes—have already invested in during the last six months.

CIOs Spent On (Company Size: M)

Mobile/wireless44%

Reporting (using BI tools)44%

Enterprise resource planning39%

Business process management31%

Cloud computing (private)31%

Customer service/CRM28%

Video conferencing/telepresence28%

Analytics (not reporting)26%

Collaboration tools23%

Content/document management15%

500 Cr -1,999 CrM

2,000 Cr -9,999 CrL XL Above 10,000 Cr

Revenue in 2011-12

So

urce

: CIO

Res

earc

h

45%

40%

38%

CIOs Spent On (Company Size: L)

Reporting (using BI tools)

Video conferencing/telepresence

Enterprise resource planning

Content/document management19%

Collaboration tools19%

Business process management21%

Analytics (not reporting)26%

28%Cloud computing (private)

34%

34%Mobile/wireless

Customer service/CRM

Page 29: Channelworld Magazine October 2012 Issue

21% upgrading/refining

“Where is the ROI in a mobility solution? I’m not wasting my sales resources pitching mobility as a standalone piece, when I am fully aware that it’s restricted to a company’s top and middle management.”SUBRAMANIAM MADHIRA, FOUNDER AND CEO, OMNINET SYSTEMS

“Where is the ROI in

when I am fully aware that it’s restricted to a company’s top and middle management.”

AND CEO, OMNINET SYSTEMS

integration part, there is a lack of skill sets present among partners,” says Sanjay Patodia, CEO of Mumbai-based Galaxy Automation.

One of the reasons Patodia puts forth for the lack of know-how is the complexity that comes with mobility. “In mobility, there are multiple tech-nologies and product lines which need to be integrated. So there is a need to have multiple levels of investment across various technologies.”

Patodia sees the challenge as an opportunity. He says that in the last few months his company has begun to undertake an assessment of the market and is investing a little. But he says that there needs to be more support. “We need more support in terms of knowledge of vendor products, more whitepapers, and technology training all woven around mobility.”

Jayesh Shah, director at Mumbai’s Orient Technologies, agrees. “Not all applications are mobile ready. Also, many vendors are not being able to port legacy applications. Moreover, many solutions are still evolving in terms of security.”

Orient works with customers to understand their application require-ments and infrastructure. Interest-ingly, the solution provider has gone ahead and invested in an application development unit which makes sure that applications are available on mo-bile devices based on customer need. “Currently, there are very few players who are working with the customers in this area. Not all of them are address-ing all the issues,” says Shah.

In the larger SI space, companies like TCS and other service providers are building many mobility solutions

for the enterprise, with a focus on certain verticals including insurance, banking and retail. Most of them have coverage in three or four industries and also have an adequate workforce in place to develop mobility solutions for their clients.

At the same time, they are part-ners with some technology solution vendors, who help them develop device management capabilities and application development platform capabilities. “These service providers offer a one stop-shop solution where-in, they will help you build your mo-bility strategy in a strategic partner-ship with platform providers or device management providers,” says Anshul Gupta, principal research analyst, Gartner. “I think, these companies are the best to look at when one is about to develop a mobile strategy unless,

Ph

oto

gra

ph

by

R C

HA

ND

RO

O

MOBILITY SPECIAL((((( (((((

OCTOBER 2012 INDIAN CHANNELWORLD 27

Page 30: Channelworld Magazine October 2012 Issue

Joydeep Dutta, CTO, ICICI Securities

Enterprises are looking at mobility as a force of change. Will this trend continue? The adoption of mobile technology is increasing by leaps and bounds. There are almost as many mobile con-nections as our country’s population and world-wide, more mobile devices are sold than laptops and desktops. With so much competition in the mobile device space, costs are coming down. Internet connectivity on these devices is also be-coming cheaper and more reliable, both of which are big catalysts to mobile adoption. Tablets too

are very popular in the enterprise segment.

Have you implemented mobile solutions at your organization? We have implement-ed mobility solutions, both in the B2E and the B2C space. We have also imple-mented low-bandwidth, browser-based solutions for some applications.

How do you measure the ROI for mobility solutions? When we launch new chan-nels like mobility, we expect adoption to increase over time. We do not use an ROI approach. In any case, we need to be present across channels to ensure that users can access solutions on any channel they choose. We measure how much that channel is used compared to other channels. For example, a 10 per-cent adoption rate over three months would probably be considered good.

Investing in a mobility solution is an ongoing cost. Does this increase the TCO of a mo-bile project? Isn’t that a hidden cost? The cost of developing a mobility solution is not very different from the cost we incur developing any other solution. For us, the cost of developing a browser-based mobile solution was much lower than a device-specific solution because we already had the skill set and manpower. It was a factor of designing pages in a different form factor and having function-ality available over a mobile browser. But when we developed device-specific resident apps for the iOS and Androids, the costs were relatively higher and also involved working with a mobile implementation partner.

Can customers like you find the right partners for their mobility implementations?There are many mobile solution vendors in the market. One needs to choose a vendor based on their track record and experience in developing similar apps. That’s not very different from the way we select a vendor for any of our other IT needs. Ensuring security of data on the device and preventing unauthorized access are the critical aspects to take care for mobile solution implementations.

— Aritra Sarkhel

MOBILITY IS HERE TO STAY

an enterprise has its own workforce that can develop applications.”

There are more restrained voices. Sunil Lalvani, director, Enterprise Sales, RIM India says, “The market is still evolving as we speak. Today, there is an entire ecosystem of telecom service providers, device and platform OEMs, application developers, and val-ue-added resellers—and all of them are focusing on enterprise mobility solu-tions, each with its own skill sets. The

key is in leveraging the core strengths of these players to deliver a seamless user experience for the enterprise.”

HIDDEN COSTS?Amidst the fact that most technology vendors assert that they have special-ized mobility VAR partners, some oth-ers suspect that the main roadblock to the widespread adoption of enter-prise mobility solutions is neither the lack of partners nor the lack of CIO

inclination, but the fact that there are costs that need explaining to a discerning management.

In other words, there’s a reason, channel partners aren’t diving head-long into the mobility market: It isn’t the rich feeding ground everyone’s making it to be.

That’s a feeling one can’t help but get from Mehta at Magnamious So-lutions. “We have the know-how to sell—and service—mobile solutions, but how are we going to convince the customer about the huge bill of material for bulk licensing and hard-ware inventory, thanks to vendors such as Microsoft?”

He adds that vendors such as such as Citrix are aware of these issues, and he believes that they ought to take it up with Microsoft and maybe discuss royalties with them in order to take the mobility discussion with large enter-prises to the next level.

Another challenge for an SI or a ven-dor is the hesitancy among enterprises to start investing in mobility. But what about all those CIOs who said they were interested in mobility? Here’s what CIOs quickly find out about mo-bility: It’s an ongoing investment—not a one-time deal. Once CIOs get wind of that, their drive for mobility begins to cool, because it becomes harder to fig-ure out ROI, and on-going investments increase TCO.

“It is a debatable point. In case of BYOD, the company doesn’t have to pay for Microsoft desktop licenses, year after year. While the amount we have to pay for an MDM solution is sig-nificantly less. So, cost wise, we save a lot. And since, we are using a software-as-a-service model, if we don’t like a particular solution from a vendor, we can use it from a different vendor. So, there is no lock-in,” says Jakhu at BPTP.

It is common knowledge that mobil-ity is not a one-time investment—it’s an ongoing continuous process, wherein CIOs have to constantly de-velop applications keeping in mind the changing dynamics of the market and the needs of their customers, whether they are internal or external. Accord-ing to Gupta at Gartner the window of development is about three years. “It is not really a hidden cost,” he adds, “but these things need to be factored in

n COVER STORY

28 INDIAN CHANNELWORLD OCTOBER 2012

Page 31: Channelworld Magazine October 2012 Issue

$1BThe size of the enterprise mobility market in India, excluding devices, by H1 2015.Source: Zinnov

while building a mobility strategy. One needs to look at certain key customers or segments with such a strategy and not target all customers of different verticals at one go.”

Further, enterprises and their IT leaders are advised to analyze how mo-bile technology can generate business value for their organizations and view investment and project decisions from the perspective of how users will inter-act with mobile devices. Also, they are told that they should build out a TCO model and a governance framework around the BYOD model and the as-sociated privacy, regulations and legal issues. All of which create stumbling blocks for a mobility project from a CIO perspective.

Jayesh Shah, director of Mumbai-based Orient Technologies, is con-fident that it’s only a matter of time before mobility projects will increase, given the ability of mobiles to bump up productivity. “The cost is a reality if you want to implement and manage these solutions. But at the end of the day, it’s about business demand. With

the help of mobile devices, you can do your office work, anytime and from anywhere. So, there is robust need for such applications and for the sake of apps, customers are willing to give ac-cess to their users.”

“By embracing the BYOD phenom-enon and re-designing their infrastruc-ture to leverage it, CEOs can confidently open their networks to employees and interested third-parties without the con-cern of exposing themselves to risk. This enables the enterprise to remain open to gains in both productivity and operation-al efficiency and savings in opex,” says Dhawan of Juniper Networks.

Siddharth Garg, founder and CTO of New Delhi’s Quytech, an application

development company, believes that working with players like Apple—who have a closed ecosystem—could help lower some hidden costs. “When you work in closed ecosystems like Apple, developers find it easier to develop applications, and then support and maintain them,” he says. “When you are talking about Open Source devices, like Android, a company may pitch a device, on which an application may not work, which in turn increases maintenance costs.”

That sentiment is something that big players like Microsoft know and are using to their benefit. “Partners of Microsoft have the option of building applications across platforms. This is what developers want, and we are well aware and are acting upon it,” says Sri-kanth Karnakota, director Server and Cloud Business, Microsoft. He asserts that Windows Server 2012 could well be the panacea for enterprises that want to push the envelope on cloud and mobility.

Yedunandan at Cisco says, “There are two features for mobility solu-tions—one is the infrastructure part—to enable solutions like wireless con-nectivity or BYOD. Infrastructure is a one-time investment. And more than TCO, it’s about ROI. If enterprises de-ploy more and more mobility, it will in-crease productivity. It’s about accessing business information from a device.”

For some others, it is not only about ROI. (See Mobility is Here to Stay) “Our pitch to the customers is to look at the total value of ownership rather than TCO,” says Goradia at Citrix.

SECURITY MYTHApart from the challenge of ongoing investments, there’s another challenge facing enterprises who want to go mo-bile: Security. Say what you might, but it remains a large issue for all stake-holders from channel partners to cus-tomers. With any device, anywhere, having the ability to access corporate data, it is natural that managements are going to worry.

“CIOs are being pulled into two directions,” says Kaushal Veluri, direc-tor, channels and alliances, India Sub-continent, Citrix. “One the one hand employees, customers and partners say they need to have the ability to work

When it comes to the integration part, there is a lack of skill sets present among partners.” SANJAY PATODIA, CEO, Galaxy Automation

MOBILITY SPECIAL((((( (((((

OCTOBER 2012 INDIAN CHANNELWORLD 29

Page 32: Channelworld Magazine October 2012 Issue

MOBILITY is becoming a mainstream investment and companies have begun to

address the complexity associated with it. How-ever, there are some trends to watch out for:

Enterprise Mobility-as-a-Service (EMaaS)EMaaS moves many services—including de-vice management, security, app deployment and policy enforcement—from internal IT to third-party, cloud-based providers. EMaaS is expected to grow dramatically over the next three-to-four years and fill about 25 percent of the overall market for enterprise-directed app and services. As a result, vendor-service provider revenues are going to increase.

Device and Platform ConsolidationWhile BlackBerry still dominates the enter-prise world it is being quickly replaced with

Apple’s platform and Androids. Microsoft will continue to play catch up. Despite the various flavors of Android and its huge frag-mentation, it is believed that a greater level of control will step in soon.

Traditional laptops and desktops will be replaced by mobiles, according to the pun-dits. However, the cost of touch-screen de-vices will fall while its functionality migrates to desktop and laptop platforms. Mobile apps are expected to grow significantly around the world in the next two years as companies ex-pand into the new growth economies, which are already predominantly mobile.

Emergence of Standards and a Hybrid Application StrategyWith the emergence of HTML5 standards in the horizon, hybrid application development

will employ native capabilities with architec-tural capabilities for HTML5. To the user, a hybrid application is almost indistinguishable from a native one. Enterprises will go ahead and chalk out their mobility strategy, road-map and policies based on this.

MDM and MAM Will MatureAs MDM (mobile device management) and MAM (mobile application management) solutions mature, enterprise will cease to look at BYOD with a jaundiced eye. Legal and regulatory issues apart, enterprises are likely to permit ‘limited’ (type of devices and applications) mobile access to their employ-ees as they build out their mobile reference architectures and associated infrastructure. As a result, we will see mixed mode.

— Shantheri Mallaya

WHAT IS IN STORE?

“Despite the need for clarity around security, we see great potential in the mobility buzz.”VENKAT RAJU, FOUNDER-DIRECTOR AND CEO OF BANGALORE’S BOB TECH SOLUTIONS

off data from any device across any network. On the other hand, enterpris-es are struggling with security.”

But what about all the technol-ogy vendors out there hawking their secure-mobile offerings, promising a hassle-free mobile tomorrow? Madhira of Omninet Systems dismisses the security talk pushed by technology vendors. “There is no such thing as to-tal security. When one has to sell, one tends to say all this.”

Madhira, an ethical hacker himself, says he believes that there are no actu-al solutions for devices that have been lost, and that the customers have to come to terms with these limitations.

As to whether BYOD will gain ac-ceptance as MDM and mobile applica-tion management (MAM) solutions mature, Jakhu at BPTP, asserts, “Yes, enterprises should do something I call ‘managed BYOD’, where a limit should be set on what type of mobile phones you can buy and use inside your prem-ises. Once this is done, a BYOD strat-egy can come into play.”

ISVS ARE VITALBypassing the Windows game and going Open Source and building apps throws open the doors for indepen-dent software vendors. A widely-pub-licized Zinnov whitepaper on enter-prise mobility clearly states that it’s developers and independent software

vendors (such as Microsoft, and SAP) as much as hardware vendors (RIM, Apple, HTC, among others) who can further the cause. It says ISVs form at least 34 percent of the primary con-tacts for enterprise discussions on mobility. That’s no small number.

Nilesh Goradia, head-Pre-Sales, India Subcontinent, Citrix, agrees on the role of independent software ven-dors. “ISVs can develop applications which can work offline, something people like us probably cannot do. Considering the network issues in In-

dia, some ISV’s have developed what we call application snippets which can sit on mobile devices and allows users to update information offline, so that when they re-connect to the network, data can be synchronized with the datacenter. There is a value these ISV’s bring; we can collaborate and jointly provide a right solution to customers.”

“As far as collaboration with ISVs are concerned, it’s more from an apps perspective. In this area, the market has not matured much but we are open to case-by-case basis for appli-cation development initiatives,” says Yedunandan of Cisco India.

Sudesh Prabhu, senior director, Presales Business Solutions and Data-base & Technology, SAP India, says, “A lot depends on the approach that CIOs have taken. There are many de-velopers within India. It’s more about awareness and approach. And if that is corrected, there are enough skills out there to get hold of and utilize.”

At RIM India, Lalvani says that, “We already have an eco-system of over 35,000 developers in India who offer applications based on various industry segments, and even horizontal applications for the sales force, field force automa-tion, and ERP integration. Collabo-ration with these partners has re-sulted in significant success stories

n COVER STORY

30 INDIAN CHANNELWORLD OCTOBER 2012

Page 33: Channelworld Magazine October 2012 Issue

for us in India in various verticals.” Tarigopula at HP Enterprise Ser-

vices concurs, “We strongly believe that collaboration between players is essential. VAS as an offering on already existing assets of ISVs is the way to go.”

Karnakota at Microsoft, says, “In India itself, we engage with an ISV network of over 5,000 and it will only continue to grow. ISVs form the crux to our cloud and mobility initiatives.”

Will collaboration always be the way for some ISVs? Ankur Mittal, founder and CEO, Quytech, isn’t sure. Quytech says they don’t collaborate with legacy vendors like Microsoft unless they have to use Microsoft to set up something, like .NET software, for development. “We are open to such collaboration if the needs arises, it’s not something we are completely against,” says Mittal. “It more or less depends on the needs of the client. We have our own development team.”

THE SILVER LINING While it is a fact that there are chal-lenges, market pundits, vendors, and CIOs have unanimously given mo-bility the green signal. The Zinnov study estimates that the enterprise mobility market in India—exclud-ing devices—will be around $1 bil-lion by H1 of 2015. Gupta at Gartner, says, “Mobility is the number one priority of CIOs worldwide. But in the APAC region, it is still in the early stages compared to what en-terprises are doing in the States and North America. For enterprises, which have a large workforce in the field, mobility comes as a boon in the form of faster response times to customer requests.”

Hardware and application players will be playing a major role in taking the market forward.

VMware and Citrix have conduct-ed their own studies. Citrix’s survey of 1,900 decision makers across the globe, including India, shows that 82 percent of organizations say they will

implement a mobile work-style strat-egy by 2014. While VMware’s recent New Way of Work Study reveals that while a large number of employees (82 percent) in India are provided with a portable device from their em-ployer, many (77 percent) still bring their own device to work to help them complete their tasks.

Will this pave the way for big-ger things? Yes, says Venkat Raju, founder-director and CEO of Banga-lore’s BOB Tech Solutions. “Despite the need for clarity around security, we see great potential in the mobility buzz.” The group, comprising four IT companies, has seen a wow factor in implementing CRM tools for custom-ers and is now aggressively pushing e-procurement as a part of its mobil-ity strategy. Mehta of Magnamious also says, “Though we might be hit for a couple of quarters, and the cus-tomer acquisition rate might be slow, the next year should bring positive tidings for us and the industry as a whole.” n

“The cost (of mobility) is a reality if you want to implement and manage these solutions. But with the help of mobile devices, you can do your office work, anytime and from anywhere.” JAYESH SHAH, DIRECTOR, ORIENT TECHNOLOGIES

MOBILITY SPECIAL((((( (((((

OCTOBER 2012 INDIAN CHANNELWORLD 31

Page 34: Channelworld Magazine October 2012 Issue

Meridian Infotech, a solution provider from the small town of Vadodara, was given first-go at a large deal to help Essar Group go mobile. But could it hack it? By Radhika Nallayam

BIGTURF

Building a strong network: (L-R) N. Jayantha Prabhu, Group CTO, Essar Group (L), Devang Jasani, CEO, Meridian Infotech, Keyur Desai, AVP, IT infrastructure and Projects Group, Essar Group.

Ph

oto

gra

ph

by

SH

AIL

ES

H

MOBILITY AND security hard-ly go hand-in-hand. But not at the Essar Group. In fact, for this Indian, multina-

tional conglomerate, security was the stepping stone to enterprise mobility and a vibrant BYOD environment.

What got the ball rolling was the group’s need for secure Wi-Fi infra-structure for its senior management. From there the project snowballed into an all-inclusive mobility solution, which, today, allows its employees, its mobile workforce—and even its guests—to connect seamless to Essar using any device of their choice. The wireless solution, implemented in dif-ferent phases, covers all of Essar’s of-fices across the country and a few loca-tions outside India. At all of its remote locations, even where mobile networks tend to be unreliable, employees are now able to connect seamlessly to Es-sar, securely and easily.

BOY

32 INDIAN CHANNELWORLD OCTOBER 2012

n CASE STUDY

Page 35: Channelworld Magazine October 2012 Issue

troller and other required equipments from Cisco to set up the demo. It was a risk worth taking because Essar has always been a tech-savvy customer and has never said no to the right so-lution.”

But little did Jasani realize that he had just crossed the first hurdle.

JUMPING HOOPSAfter that first meeting, matters moved quickly. Jasani’s team was asked to set up the demo in 48 hours. But buy-ing the equipment was only part of the challenge—Meridian also had a skills shortage.

“Essar’s senior management told us they wanted a wireless experience for all the three devices they were using. That included a BlackBerry platform, which required specialized expertise in terms of integration. We could not find the right resource from our team or even from the Cisco team,” says Jasani.

Running out of options, Jasani turned to Essar’s internal team. And fortunately, one of them had the necessary expertise.

Key Parties: Meridian Infotech, Essar Group

Implementation time: 2009-2011

Project value: Rs 2 crore

Key technologies: Single wireless solution that connects different branches through a WAN cloud and integrate it with multiple user devices

Main vendor: Cisco

People involved: Devang Jasani, CEO, Meridian Infotech; N. Jayantha Prabhu, Group CTO, Essar Group

Key challenges: Setting-up a live demo and tackling unexpected competition

Post implementation RoI: Secure Wi-Fi access, increased productivity, better user experience, seamless mobility

SnapshotBut the real twist was that, contrary

to what many might think, all this was made possible not by a big, tier-1 solu-tion provider, but by a small network-ing player from Vadodara, Meridian Infotech. For Meridian Infotech the project was a roller coaster ride.

CALCULATED RISK The $27 billion (Rs 1,43,100 crore) Es-sar Group, with interests in steel, oil and gas, power, communications, ship-ping, and construction, among others, has about 75,000 employees spread across the globe and has a reputation of being a tech-savvy enterprise.

But a lack of Wi-Fi access for its VIP visitors and senior management blunt-ed that reputation. Although Essar had already implemented WLAN across some of its offices, security concerns were always a spoiler standing in the way of a robust wireless network.

“We carried out an IT security as-sessment study, which was a wake-up call for us. The report pointed out a few pain points in our network, which drove us to hunt for a more robust and secure wireless infrastructure,” says N. Jayantha Prabhu, group CTO, Essar Group.

One of the challenges the report highlighted was a lack of standardized, role-based access control. In addition, the IT team also knew that staffers who traveled frequently across offices struggled to get connectivity and that it was a problem provisioning proper guest access.

They decided to begin chipping away at the problem and started with ensuring that visiting VIPs had Inter-net connectivity. Essar called on a so-lution provider it had a long-standing relationship with, Meridian Infotech, and gave them the chance to do a live demo. It quickly became clear, says Devang Jasani, CEO, Meridian Info-tech, that Essar’s team wanted some-thing more than a Wi-Fi infrastructure that could connect laptops. They want-ed a network that could integrate vari-ous user devices, including BlackBerry smartphones, iPhones and tablets.

“That’s when we realized that we needed to take a risk and invest to give the client a live demo of a true mobility experience,” says Jasani. “We invested a huge amount in a wireless LAN con-

With his help, the demo took off suc-cessfully and Jasani got the green light for a wireless infrastructure project for four floors of Essar’s iconic 21-storey building in Mahalaxmi in Mumbai.

That’s when Essar took Meridian by surprise.

Jasani knew the corporate office project was only phase one of a poten-tially mammoth implementation. He knew Essar had plans to extend the benefits of the wireless project to all its employees across the country. What he didn’t know was that Essar was also speaking to another competitor for the larger project.

“While the Cisco solution was tested, we also wanted to check out other op-tions in the market, just to ensure that we are going ahead with the right solu-tion,” says Keyur Desai, AVP, IT infra-structure and projects group, at Essar.

Unperturbed, Jasani waited for Cis-co’s solution to prove itself. And it did.

“The competitor also gave us a demo,” says Desai. “However, multiple factors went in favor of the Cisco so-lution. It had no compatibility issues as we already use Cisco devices at all our major locations. Plus, Cisco’s solution was technically more feasible and suitable.”

Today, mobility has become a reality at Essar. More importantly, security concerns, which triggered the whole implementation in the first place, is no more a nightmare for Essar, which got Cisco to carry out a security audit post the implementation.

User experience across all devices is now matchless, says Prabhu. Irre-spective of what device a user brings, connectivity is seamless. “We would like the whole process to be smooth for everyone. And today, guests visit-ing our offices, even those in remote locations like a Mahan, Paradeep, or Dabuna, can securely access the Internet. The recent extension of this Wi-Fi infrastructure across the Es-sar Group’s global locations has been a vital boost on the user experience front,” he says.

For Meridian, the risk it took has paid off in more ways than one. By using the Essar project as a reference Meridian bagged five similar projects in the last year alone. And it probably won’t stop there. n

OCTOBER 2012 INDIAN CHANNELWORLD 33

MOBILITY SPECIAL((((( (((((

Page 36: Channelworld Magazine October 2012 Issue

BYOD—AND THE increasing use of mobile devices among enterprises—is a bandwagon that every technology vendor

and channel partner worth their salt are keen to ride over the next few years.

Solution providers need to engage coherently with security vendors to execute a successful, profitable and sustainable ‘BYOD’ journey across their enterprise customers. By Yogesh Gupta

DLP+MDM However, one thing stands in their

way: CIOs. BYOD (bring your own de-vice) is a long-term strategy for CIOs, who for the most part, are treading cautiously because of multiple issues including security, compliance, ROI,

and TCO. In response, security ven-dors (security is an important part of the BYOD story) are empowering and hand-holding the partner community, to bring more clarity to CIOs and win partner enterprise mobility deals.

“Compliance is not much of an issue with BYOD compared to securing de-vice and data access, assigning rights to people, and managing the entire piece at an enterprise end,” says Am-itabh Jacob, channel director, India and SAARC, Symantec. “That’s why DLP plus MDM has become critical.”

“If companies want to manage and se-cure mobile devices effectively in today’s complex IT environment, they need to treat them like any other endpoint, and manage them from a single console,” says Sajan Paul, director, systems engi-neering, Juniper Networks India.

THE SECURITY LINKJoel Camissar, practice head, data protection, McAfee APAC, says that, “people recognize that DLP plus MDM creates an ideal protection. MDM gives them visibility and control over devices. Ultimately, if you can protect data and allow access to it based on the needs of the user, you will have stronger protection.”

The ideal mobile security and management strategy follows devices through their lifecycle—from provi-sioning and management, to security, and eventually, device retirement—and is designed to prevent data from leaving the organization regardless of where it resides. That’s why DLP becomes a component of an overall mobile strategy, says Jacob.

“Our BYOD pitch is more end-to-end, and not limited to a specific anti-virus or MDM solution or inventory man-agement software. Our solutions have features like finger printing the device and designing heat maps according to the usage of the device by employees. Security depends on the level of risk at-tributed to the data,” says Paul. “BYOD usually begins with VPN access which extends into MDM, DLP and other pieces of mobility,” he adds.

“MDM is important from an integra-tion point of view as well as an overall device management perspective,” says Ramandeep Singh, head of system en-gineering, pre-sales consulting team

34 INDIAN CHANNELWORLD OCTOBER 2012

ILL

US

TR

AT

ION

BY

UN

NIK

RIS

HN

AN

A.V

Page 37: Channelworld Magazine October 2012 Issue

FEATURE n

(India & SAARC), Check Point Soft-ware Technologies. “Traditional DLP is not the answer. In fact document management is the most practical solu-tion for BYOD,” he says.

But, Fortinet is pursuing a different approach. “BYOD is part network and part application access, and we tackle it from a wireless access perspective by addressing security from the pe-rimeter to access point,” says Vishak Raman, senior regional director-India & SAARC, Fortinet. Fortinet UTM has a strong DLP function at the pe-rimeter level to control data leaks and Forti Gate client at the desktop level. At least, at the access point level, data needs to be secure for BYOD, he adds.

OVERCOMING ROADBLOCKS Technologically, the biggest roadblock for DLP plus MDM is the fact that the mobile world has many operating systems (iOS vs Android vs Win8) which are fragmented (Android 2.2-4.1 implemented across devices) and are closed (agents aren’t an option like they are on PCs) according Camissar at McAfee.

“The biggest challenge is the pos-sibility of an executive’s mobile device being infected with malware outside the corporate network and them bring-ing that device onto the corporate net-work” says Raman.

“MDM is not always important under BYOD as the corporate is not worried about the private information of employees. The concern is around the threat to corporate IP which means that MDM becomes critical,” says Paul at Juniper. Junos pulse—a single client by Juniper—works across five major mobile OSes. Junos helps secure the connection, protect the device, and control MDM, says Paul.

Culturally and psychologically, DLP in a mobile environment is diffi-cult to implement and maintain from

an administrator’s perspective. At the same time, protecting data is much less of a concern for the mobile user, says Camissar.

CONNECTING WITH PARTNERS McAfee is taking a long-term view

where technology is only a part of the solution. For them the creation of best practices and business processes is im-portant. “From a channel perspective, there is a lot of opportunity to sell the methodology around technology, including best practices and business process, or even sell ongoing manage-ment and consulting services using the same tools,” says Camissar.

“Partners have the advantage of working with products that address such specific customer requirements, like DLP for tablets. The Symantec DLP and Mobile Management solu-tions allow DLP customers to leverage their existing investments by utilizing

MobileIron offers a security and management platform for mobile apps and devices for the enterprises. Ojas Rege, vice

president, strategy, MobileIron, speaks about the company’s success mantra.

BYOD is still in a hype-cycle in India. How does that compare with other regions globally? BYOD is evolving in India, and I think every Indian company will have a mobile IT bud-get in the next 12 months or so. We are aggressively building a team of channel partners (mobility special-ists and SIs) in India.

I am a slightly concerned about the hype around BYOD because it tends to hype the complexity too. But between 60 to 70 percent of our customers have defined their BYOD strategy, which is a good sign. You observe variations in BYOD mostly because the method is not set in stone. The companies that have been successful at implementing BYOD look at end-user benefits and not necessarily a cost-benefit strategy. The challenge is how can organiza-tions ensure security of corporate data without compromising the un-derlying user experience.

Is DLP vital for a successful mobility strategy? The fundamental aspect is to analyze the content. BYOD is associated with privacy policies, selective action, and other related aspects. The single biggest DLP con-cern is e-mail attachments accessed on mobile devices which is effective-ly addressed by our ‘document secu-rity’ solution. The security lifecycle with BYOD includes provisioning (group by ownership, configure workspace, set security policy, set company policy) and operations.

Most vendors including security ven-dors have forayed into the mobility space lately. Does it threaten your mar-ket dominance? When we launched Version 1 in 2009, BYOD was not prevalent .However, we had a feeling that consumerization would pick up, and hence to make the most of the opportunity, we needed right plan-ning and perfect timing. In the last 18 months, all the big players have gotten aggressive in the mobility space, be it McAfee or Symantec. However, most enterprise software vendors do not have a strong app story which is a big advantage for MobileIron, as we build architecture with no legacy attached. 2012 is the first year where a number of compa-nies have put mobile apps as a bud-getary line item.

—By Yogesh Gupta

BYOD Will Go Mainstream in India by 2013-14

While implementing a combination of MDM and security in the

short-term, you also need to be thinking about the long-term, which includes best practices and new business processes.JOEL CAMISSAR, practice head, data protection, McAfee APAC

OCTOBER 2012 INDIAN CHANNELWORLD 35

MOBILITY SPECIAL((((( (((((

Page 38: Channelworld Magazine October 2012 Issue

n FEATURE | MOBILITY

BY placing management controls on mo-bile devices such as tablets and smart-

phones used in business, enterprises have showed preference for acquiring mobile device management (MDM) software where server and management console com-ponents are kept on premises. But that’s changing, as companies are now buying cloud-based MDM, according to Gartner.

Today, more than 85 percent of MDM product buys for mobile devices are software where components are retained in-house and on-premise, such as management consoles, said Gartner analyst Phillip Redman on the impact of the cloud on mobility at the Gartner IT Infrastructure & Operations Management Summit. But there is now a shift taking place where MDM buyers are showing a preference for cloud-based MDM of-ferings, with AirWatch, Fiberlink, Mo-bileIron, Zenprise and Notify Technology among top choices there.

Some companies offer both on-premise and cloud options, but one advantage of cloud-based services is the speed in getting users deployed with MDM, Redman noted,

even though it may still require installing a software agent on the device. “It’s getting to the point where it takes less than 24 hours to get your users up and going,” he said.

According to Gartner’s 2012 MDM Magic Quadrant, MDM leaders are Mo-bileIron, AirWatch, Fiberlink, Zenprise and Good Technology. The challengers are SAP and Symantec. The visionaries are BoxTone and IBM, while the cast of niche players, in-cludes McAfee, Sophos, Trend Micro, Tang-oe, OpenPeak, Silverback, LANDesk, Smith Micro Software and MyMobileSecurity.

Redman also pointed that MDM is in flux, fragmented and evolving and that Microsoft, Google and BMC are among vendors looking at what they might do in this area. He said the market is expected to remain very fragmented through 2015.

MDM vendors have generally trailed in supporting the Google Android platform in comparison to other mobile operating sys-tems. “Android support is still immature,” said Redman, predicting it will be another year before Androids are “well-supported by most MDM vendors.”

- By Ellen Messmer, Network World (US)

CLOUD-BASED MDM IS GETTING HOT : GARTNER

the same policies and management in-frastructure,” says Jacob.

There is no silver bullet for BYOD. Enterprise partners need to spin an inte-grated story around MDM, DLP, and se-curity says Raman at Fortinet. Systems integrators can stitch together solutions and enjoy decent margins rather than rely on product sales alone, he adds.

Check Point has bundled few units of their USB drive GO (earlier Abra) with their UTM. “This baby step towards BYOD ensures partners cross-sell and facilitate BYOD in the future,” says Singh. With the launch of document management in the next couple of months, we envisage a different strat-egy of gross margin and reducing sales cycles for partners, and an overall de-mystification of BYOD,” he says.

THE CONSULTANT APPROACHDLP is one of the solution specializa-tions that Symantec offers channel partners through which they can attain Silver, Gold or Platinum levels within the Symantec Partner Program. Part-

ners play a critical role in encouraging customers to take the right approach in securing and managing their infor-mation and infrastructure.

A partner should proposition a VPN customer and help them migrate to BYOD, and then we can add mobile security and an MDM suite, says Paul. Networking and security partners of Ju-niper work across datacenters, security, campus and BYOD, and hence become an extension to the overall portfolio.

“The biggest avenues are in highly-regulated industries, or in businesses holding customer sensitive data, where

employers are likely to have greater au-thority in asking employees to overlook their privacy concerns if employees want to use a personal device to access company systems. On the other hand, non-regulated industries or businesses holding less sensitive data may want to apply security programs to help man-age risk where MDM might come into picture,” says Camissar at McAfee.

“The numbers for standalone device/solution sales like a single firewall is expected to slow down as organizations demand security and connectivity as a single piece around BYOD. Partners can go up the value-chain and act as consul-tants rather than suppliers,” says Paul.

So, is CYOD (choose your own de-vice) a better option for channel part-ners? “Protection of data is critical. It’s easy to make a quick decision to try and address it on mobile devices, but you could end up regretting it later. While implementing a smart combi-nation MDM and security (McAfee’s EMM bundled with Secure Container and Virus Scan Mobile) in the short-term, you also need to be thinking about the long-term which should in-clude best practices and new business processes,” says Camissar at McAfee.

“Employees should be allowed to operate their devices whether it’s a laptop, tablet, or smartphone in the of-fice with secure access to business ap-plications, similar to their desktop ex-perience. That is the essence of BYOD or CYOD,” says Singh at Check Point.

“Be it BYOD or CYOD, organiza-tions need to define IT policies after identifying what is critical informa-tion to them and how it is to be used. A specialized partner can play a critical role in advising customers and helping them choose a holistic approach that suits their business requirements,” says Jacob. n

Organizations need to define IT policies after identifying what is

critical information to them and how it is to be used. A specialized partner can play a critical role in advising customers and helping them choose a holistic approach. AMITABH JACOB, channel director, India & SAARC, Symantec

36 INDIAN CHANNELWORLD OCTOBER 2012

Page 39: Channelworld Magazine October 2012 Issue
Page 40: Channelworld Magazine October 2012 Issue

n OPINION

Pushing for Change

SUPPOSE YOU had to choose between your “sit-down” computer and your smartphone. I think I know what most of us would keep. Smartphones have become indispensable. They have also become status symbols—the cachet of certain brands and

models of mobile products is matched only by designer clothing, cars and a few other types of goods.

Naturally, a product that we’ve decided we can’t do without is going to be profitable for its maker. Unsurprisingly, the tech com-pany with the largest market cap, Apple, derives its largest revenue stream from two mobile devices: the iPhone and the iPad.

Nonetheless, mobile is a dysfunctional industry.

For starters, look at the complexity. The mobile market features a triad made up of device makers, mobile platform providers and wireless carriers. Then look at how each of these operates.

Competition in a free market should drive down prices, but that’s not happening in the U.S. mobile market. At full retail, the device makers charge an arm and a leg for products that are underpowered, have little memory and come with anemic batteries. Proprietary platforms, such as Apple’s iOS, continually add new features and function-ality that eliminate interoperability with competing products and platforms. That’s an utterly self-serving model. The top wire-less carriers exert too much control over device makers and platform providers and bind end users to two-year contracts with steep monthly charges.

The pace in this market is frantic to the point of distraction. Network providers have far too much influence on hardware design and, in the case of Android, too much leeway to customize software. An-droid’s widespread adoption was greatly aided by the fact that Google made it open

source, but the fragmented array of op-tions could be the platform’s undoing. The user experience isn’t the same from device to device and, perhaps more importantly, from app to app. Like the device makers, Google needs to stop iterating Android so frequently and become a leader, not merely a software provider.

Meanwhile, Apple has gone back to building a closed ecosystem in an at-tempt to lock people into its hardware and software, with iOS as the poster child for this push. This is a mistake; one of the key reasons OS X has done so well is that Apple threw open the doors and built bridges to other systems. Apple shouldn’t be going backward.

Some of the dysfunction may be ad-dressed as the mobile market exits its Wild West phase. Smartphone market penetration is now over 48 percent, accord-ing to ComScore – 55 percent, according to Nielsen. Nielsen says two out of three cellphone buyers now select smartphones. Before long, the adoption growth rate will slow to a modest pace.

In the meantime, I’d like to see new reg-ulations imposed on carriers. Balance is needed, since the mobile industry’s effect on consumers is too great to ignore and the industry is too important to strangle. But something has to be done about the undue control the carriers have over the mobile market—and over the costs borne by customers. n

Smartphones have changed the world around us and how we do things. Even in its success, there are areas which are dysfunctional. Do the device-makers need a new perspective?

Scot Finnie is Computerworld’s editor-in-chief. You can contact him at [email protected] and follow him on Twitter (@ScotFinnie).

SCOT FINNIE

38 INDIAN CHANNELWORLD OCTOBER 2012

MOBILITY SPECIAL((((( (((((

Page 41: Channelworld Magazine October 2012 Issue

ANTHONY PERKINS wants employees at BNY Mellon to bring their

personal smartphones to work and use those instead of company-issued BlackBerries to

Containerization technologies are helping create segregated workspaces. By Robert L. Mitchell

access business email, applications and data.

But there’s a catch: Not all employees are comfort-able with the prospect of having their personal phones locked down and controlled as tightly as the

EVERYTHING ABOUT MOBILITY

FocalPoint

BlackBerries that Perkins would like to phase out. That’s where the notion of containerization comes in.

A bring your own device (BYOD) strategy is good business, says Perkins, managing director and CIO at the bank. It reduces the time and expense involved with maintaining and managing company-owned BlackBerries. “We’d like to be in the business of man-aging software, not hard-ware. In the RIM world you manage hardware,” he says, referring to the Black-Berry manufacturer.

On the downside, today’s popular mobile devices were developed for the consumer market, and third-party management tools don’t have the same management hooks that RIM can offer, since it designed and controls the BlackBerry client architec-

Enterprise WiFi provider iPass is allowing companies and their IT departments to get a tighter handle on their BYOD mobile connection costs.

The company has launched its Open Mobile Express service, which allows mobile workers to use the iPass global WiFi network on their own devices, but instead of the company or IT department being billed for use, the end user or their individual department gets the bill.

The end user downloads the iPass client software on their de-vice and starts using it to connect to the iPass network after their IT department or company has negotiated the individual connec-tion rates with iPass first.

With BYOD, says iPass, users often run up exhorbitant mobile data bills by automatically connecting to the networks operated by their mobile phone provider.

With Open Mobile Express, companies and IT departments can offer their mobile employees an enterprise class WiFi service, with the accompanying security, with no up front costs. It is billed to the end user or their department as and when they use it, as an alternative to more expensive mobile operator networks.

At the same time IT departments can maintain control and support of a hybrid environment of both corporate-owned and employee-owned smartphones and tablets.

Christophe Culine, senior vice-president and general manager for iPass enterprise, said, “Open Mobile Express allows IT to provide other departments the best negotiated connection rates for fast, affordable, global WiFi access.”

By Antony Savvas

CONTROLLING COSTS

ture and has been especial-ly responsive to the needs of corporate customers.

MANAGING MOBILE FROM THE CLOUDMobile device management typically involves install-ing agent software on each user’s device and setting up a server-based manage-ment console. Don’t want to do it yourself? Service providers that help IT man-age mobile devices and software are plentiful.

For example, integrator Vox Mobile offers a “man-aged mobility” service that includes comprehensive monitoring and reporting, Fiberlink offers MaaS360 for corporate email and docu-ments, and mobile carrier AT&T introduced its cloud-based Toggle mobile man-agement service last year.

With Toggle, AT&T in-stalls a “work container”

To EachIts Own

OCTOBER 2012 INDIAN CHANNELWORLD 39

Page 42: Channelworld Magazine October 2012 Issue

how the users’ personal apps run.

For businesses that need strict security policy and compliance controls, such as the highly regulated health-care and financial services industries, containerization can be especially helpful in making the BYOD experi-ence more palatable for us-ers, IT leaders say.

All of these technologies (Refer box: Three Ways To Containerize) offer more granular control over cor-porate applications and data on users’ devices than whatever security comes standard with smartphones currently. And users’ devic-es no longer need to be on a list of smartphones that has been certified and tested by IT, because corporate apps and data reside inside a se-cure, encrypted shell.

However, the need to switch back and forth be-tween the business and personal environments may be perceived as inconvenient and affect overall user sat-isfaction, says Phil Redman, an analyst at Gartner.

Neither Apple nor Google offer containeriza-tion technology, and nei-ther would comment for this story, but their respec-tive spokesmen did point out some resources that might be helpful.

ENCRYPTED FOLDERSThe most mature contain-erization approach is the encrypted, folder-based con-tainer, Redman explains. Air-Watch has an offering in this space, and Good Technology is an early leader in terms of enterprise adoption of con-tainerization, particularly among regulated businesses.

For basic mobile access, BNY Mellon uses Good for Enterprise to create an encrypted space on smart-

Hospitals Health System in Shaker Heights, Ohio, turned to containerization because he sees the use of traditional MDM tools to control the entire device as a liability issue. The hos-pital needs to have apps or data delivered securely to clinicians without interfer-ing with the users’ ability to access their personal apps and data. “We can’t afford to delete things of a personal nature or impede their ability to use their personal asset,” he says.

Alex Yohn, assistant director of technology at West Virginia University, is also wary. “I don’t want my guys doing settings on the personal side that could come back to haunt us,” such as accidentally delet-ing data or making configu-ration changes that affect

management (MDM) tools tend to be very conserva-tive when it comes to man-aging corporate resources on users’ phones, with policies often applying to the entire device, including both personal and profes-sional apps and data. Users may not be willing to give up control of their smart-phones in exchange for re-ceiving access to corporate apps and data.

To get around that user resistance, Perkins is turn-ing to containerization—an emerging class of manage-ment tools that carve out a separate, encrypted zone or policy bubble on the user’s smartphone within which some corporate apps and data can reside. In this way, policy controls apply only to what’s in the container, rath-er than to the entire device.

Mostly, containerization tools are complementary to MDM software, with in-creasing numbers of MDM vendors incorporating con-tainerization techniques.

That said, as great as containment is for limit-ing corporate liability, it doesn’t help any personal data that may be lost due to a wipe if the phone is lost or stolen. Some IT depart-ments are recognizing that users may need help back-ing up their personal data and apps, and some, like Ja-cobs Engineering, are help-ing their end-users get set up with backup systems.

Ryan Terry, division CIO and CSO at University

on each smartphone, which the user logs into with a password. Administrators can then manage container policies by way of a cloud-based portal and app store called Toggle Hub. In the third quarter AT&T plans to add the ability to run anti-virus scans on all man-aged devices, as well as to lock or wipe the container.

“More and more of this will move into the cloud. But today it’s still a small percentage,” says Phil Red-man, an analyst at Gartner.

“Where this is leading is dual data plans on the same device,” says Mobeen Khan, executive director of advanced mobility solu-tions at AT&T. “You will have a phone number for the container and one for your personal device.”

Anthony Perkins, man-aging director and CIO at BNY Mellon, is excited about that prospect. “We’re talking with Verizon and AT&T on phones with a SIM that has two phone numbers,” products that are currently in develop-ment, he says. Perkins says that carriers are telling him those products are just a few years out—AT&T declined to comment on availability—but whether it’s two years or ten, he says, “That’s probably the direction we’ll go.”

But Perkins says those advantages are outweighed by users who are generally more productive due to the multitude of productivity apps available in the An-droid and iOS worlds. And most importantly, having a BYOD policy is “a great way to recruit and retain young talent.”

Because corporate apps and data tend to be mixed in with the user’s personal content, mobile device

n FOCAL POINT

Existing vendors offer, in essence, three different containerization approaches:• Creating an encrypted space, or folder, into which applications and data may be poured• Creating a protective “app wrapper” that creates a secure bubble around each corporate application and its associated data• Using mobile hypervisors, which create an entire virtual mobile phone on the user’s device that’s strictly for business use

Three Ways To Containerize

Containerization is an emerging class of management tools that carve

out a separate, encrypted zone or policy bubble on the user’s smartphone

within which some corporate apps and data can reside.

40 INDIAN CHANNELWORLD OCTOBER 2012

Page 43: Channelworld Magazine October 2012 Issue

from the operating system, and blocks access to some personal apps, such as Ya-hoo Mail and Gmail, when the device is accessing cor-porate resources.

When used in personal mode, individuals have control over which apps they can use.

What’s more, BNY Mel-lon may wipe the device—including all of the user’s personal apps and data—if it is lost or stolen, although MaaS360 and most other major MDM tools do al-low selective wipes. Citing security concerns, Perkins declined to say how many times the company has had to wipe phones that have been lost or stolen.

In comparison, if the Good-based units are lost or stolen, only the corpo-rate container is wiped.

It’s not surprising, then, that some employees are concerned about turning

phones within which users can run Good’s email and calendar client and use a secured browser. “It’s a se-cure container with an app that can send and receive corporate email that’s en-crypted,” says Perkins. All communications are routed through Good’s network operations center, which authenticates mobile users.

WHERE APPLE AND GOOGLE STANDSpokesmen for Apple and Google would not comment for attribution but both pointed Computerworld (US) to documents and offered clarifications by email. Here’s a summary.

GOOGLEGoogle Apps for business, government and educa-tion administrators can use the Google Apps Con-trol Panel to manage end users’ Android, iOS and Windows Mobile devices at the system level. The panel enables the device to sync with Google Apps, en-crypts data and configures password settings.

Another tool, called Google Apps Device Policy, enforces security policies such as device encryption and strong passwords and can also locate, lock and wipe a device. It can also block use of the camera and enforce email retention policies. However, partial wipes of just corporate data are not supported.

As to Google’s position on the use of containerization/app wrapping technologies that require access to binaries to create a policy wrapper around apps that are enterprise-specific, Google does not offer such a tool itself and declined to comment further.

APPLEApple says it supports third party MDM tools. It allows MDM servers to manage in-house apps and third-party apps from the App Store and supports the removal of any or all apps and data man-aged by the MDM server.

In practice, however, MDM servers are limited. While most tools allow for selective deleting or blocking of specific enterprise apps, there’s no automated way to identify and erase all of the associated data. “No IT manager can sit around and go through thousands of files that may be on each user’s phone,” says Phillip Redman, an analyst at Gartner.

As to Apple’s position on the use of containerization/app wrapping technologies that require access to app binaries to create a policy wrapper around apps that are enterprise-specific, Apple does not offer such a

tool itself and declined to comment.

For its part, Good’s basic email and calendaring ca-pability has been available for several years. Late last year it added the capability for other apps to run within its protected space using the Good Dynamics Plat-form, but each app must be modified to run in Good’s proprietary environment.

Perkins is using Good only for email and calen-dar—the “killer apps” for most employees, he says—and for accessing internal, browser-based apps using Good’s browser.

For full-on access to the corporate network, Share-Point and other services, BNY Mellon relies on Fi-berlink’s MaaS360, a cloud-based MDM system it has configured to take com-plete control of the user’s device. MaaS360 monitors what gets written to and

Here are the five best practices for developing mobile policies to avoid pitfalls that often translate to increased IT expenses.l Invest in technology that has long-term benefit. With the rapid evolution of technology, it’s difficult to differentiate what’s going to thrive and what’s merely a fad. Keep tabs on the market and don’t let the pressures of competitors or even employees overly influence your decisions. Whichever way you go, be sure to align technology investments with overall business strategy, including future growth and direction.l Avoid vendor lock in. Previously, hardware, software and consulting plus integration and support was available from one vendor. Enter the post-PC era, and IT is responsible for researching, contracting and dealing with multiple vendors. Ensure that there’s an opt-out clause in all contracts and achieve what’s best for your company. If you’re not comfortable, don’t sign, period.l Achieve scalability across all processes and solutions. The bottom line is that enterprise mobility strategies need to be flexible. Mobility is growing and becoming more complex, and even when all employees are wirelessly connected to your network your job isn’t done. Ensure your company is practicing scalability internally and also externally when working with vendors and third parties.l Develop usage policies. The beauty of mobility is that the business network can be made available to employees anytime, anywhere—offsite meetings, working from home, overseas. But that last one, overseas, is often a source of devastating overage charges. Whatever it may be, be sure to clearly define, communicate and enforce policies.l Optimize data plans. Dealing with wireless providers can be tricky, particularly if you’re enrolling and managing business users. Typically, plans are not set up to benefit businesses. Take control over plans by carefully monitoring bills and charges, and don’t be afraid to negotiate.

-By Ralph Shaw. He is the CEO of Asavie Technologies, a provider of on-demand solutions.

THE REAL COST OF BYOD

OCTOBER 2012 INDIAN CHANNELWORLD 41

MOBILITY SPECIAL((((( (((((

Page 44: Channelworld Magazine October 2012 Issue

holding back growth. But the adoption of app wrapping for enterprise and third-party apps will increase, he says, as the technology is even-tually integrated into the larger and more established MDM platforms.

The downside to app wrapping is that each ap-plication must be modified, which means administra-tors need access to the app’s binary code. That means some apps that come pre-installed on An-droid or iOS phones may not be supported. Also, implementations may work more smoothly with An-droid devices than with iOS

n FOCAL POINT

their personal smartphones over to “Big Brother.”

APP WRAPPINGThis is a newer, more granular approach in which each app is enclosed in its own encrypted policy wrapper, or container. This allows administrators to tailor policies to each app. Small vendors with propri-etary approaches dominate the market, including Mo-cana, Bitzer Mobile, Open-Peak and Nukona (recently acquired by Symantec).

For its part, RIM is work-ing on adding this capabil-ity to its BlackBerry Mobile Fusion MDM software, possibly as soon as May 2013. (Mobile Fusion runs on Android and iPhone devices as well as on the BlackBerry.) Peter Deve-nyi, senior vice president of enterprise software, says RIM’s offering will be “a containerized solution where one can wrap an ap-plication without the need to modify source code so you can run it as a corpo-rate application and man-age it as a corporate asset.”

“Using these tools you can put together a pretty complete, fully wrapped productivity suite that’s en-crypted and controllable,” says Jeff Fugitt, vice presi-dent of marketing at mobile integrator Vox Mobile.

Forrester analyst Chris-tian Kane describes app wrapping as an “applica-tion-level VPN” that lets administrators set policies to determine what the app can interact with on the us-er’s device or on the Web, and what access the app has to back-end resources.

“Application wrapping is not mature,” says Gartner’s Redman, and the existence of competing architectures in this nascent market is

The downside to app wrapping is that each application must be modified, which means administrators need access to the app’s binary code. That means some apps that come pre-installed on Android or iOS

phones may not be supported.

because of problems get-ting binary code for apps sold via Apple’s App store. For this reason, wrapping tools tend not to work with iPhone apps.

Users can get access to the binary for free iOS apps, but for paid App Store wares, IT needs an agree-ment to buy direct from the provider and bypass Apple’s store.

“Apple overlooks the is-sue of app wrapping today and changing apps [bought] from their store, but by their rules you’re not supposed to do that. They could clamp down and not allow that, al-though so far they haven’t,” says Redman. Apple de-clined to comment.

MOBILE HYPERVISORSThe third approach to con-tainment is to create a vir-

tual machine that includes its own instance of the mobile operating system—a virtual phone within a phone. This requires that the vendor work with smart-phone makers and carriers to embed and support a hy-pervisor on the phone. The technology isn’t generally available as yet, but devices that support a hypervisor may eventually allow users to separate personal and business voice and data.

VMware’s offering, VMware Horizon, is still in development. It will support Android and iOS, and functions as a type 2 hypervisor, which means

the virtual machine runs as a guest on top of the native installation of the device’s operating system.

Having a guest OS run on top of a host OS tends to consume more resources than a type 1 “bare metal” hypervisor that’s installed directly on the mobile device hardware. It’s also considered less secure, since the underlying host OS could be compromised, creating a path of attack into the virtual machine.

Another vendor, Open Kernel Labs, offers a type 1 hypervisor, which it calls “defense-grade virtualiza-tion.” Today the technology is used mostly by mobile chipset and smartphone manufacturers that serve the military. The company has yet to break into the commer-cial market, says Redman.

Developing a type 1 hyper-visor that interacts directly with the hardware is imprac-tical, argues Ben Goodman, lead evangelist for VMware Horizon. “We moved to a type 2 hypervisor because the speed at which mobile devices are being revised makes it nearly impossible to keep up.”

As to security, VMware is working on an encryp-tion approach similar to the Trusted Computing Group’s Trusted Platform Module standard as well as jail-break detection.

Performance won’t be a problem, Goodman promises. “VMware Horizon is optimized to run extremely well, and performance is exceptional.”

Israeli startup Cellrox Ltd. offers its own twist on vir-tualization for Android de-vices. The technology, called ThinVisor and developed at Columbia University, is neither a type 1 nor type 2 hy-pervisor but “a different level of virtualization that resides in the OS and allows multiple instances of the OS using the same kernel,” says CEO Omer Eiferman. It offers the product to cellular service providers and smartphone manufacturers, as well as to large enterprise customers.

PROBLEMS AND PROMISENot all containerization products support iOS, which powers the iPhone and iPad, the smartphones most commonly found in enterprises. While Apple has 22 percent market share worldwide compared to 50 percent for Android, in the enterprise those numbers are reversed: The iPhone commands a 60 per-cent market share versus just 10 percent for Android, according to Gartner.

42 INDIAN CHANNELWORLD OCTOBER 2012

Page 45: Channelworld Magazine October 2012 Issue

JANUARY 1, 2009 CHANNELWORLD 43

Going forward, it should be possible to apply one set of policies to the entire

device, another to a protected container where app stores deposit applications, and a third to specific corporate apps, depending on the user’s role or group.

For the products that do support iOS, Apple’s leg-endary secrecy about OS enhancements means con-tainerization vendors receive no advance notice and must scramble every time Apple releases an update. The bot-tom line: Users may have trouble accessing corporate resources if they upgrade their personal iPhone too quickly or frequently.

“We can’t afford to delete things of a personal nature or impede [end-users’] ability to use their personal asset,” says Ryan Terry, division CIO and CSO at University Hospitals Health System.

Directory integration is another area where tools are still evolving. “We’d like to see more integration with Active Directory and with PeopleSoft or what-ever the source of record is to control user profiles,” Terry says. “Ideally, tighter integration that would dis-able access automatically or restrict access to pub-lished applications based on a user’s role.”

Containerization is also limited in terms of trouble-shooting and general sup-port issues if the enterprise doesn’t have visibility into the performance of the total device, argues Steve Chong, manager of mes-saging and collaboration at Union Bank, which uses Good for Enterprise. Is the problem related to signal strength? Has the user run out of storage space? Is there a way for IT to re-motely access the phone to diagnose issues?

“We need all of that without having to have multiple agents installed on the phone,” he says, because each agent adds complexity and uses up resources.

“Having agents on the phone means that it needs to

be constantly on all the time for data gathering, but that means that it will consume phone resources,” Chong says. Also, it’s “software that now needs to be managed and updated on phones.”

Today many businesses, if they have a BYOD program at all, either aren’t using MDM or are using a very basic tool such as Microsoft’s Exchange ActiveSync, which allows mobile access to the user’s Exchange email and calendar. Containerization is limited in terms of trouble-shooting and general sup-port issues if the enterprise doesn’t have visibility into the performance of the total

device, argues Steve Chong, manager of messaging and collaboration at Union Bank.

At West Virginia Univer-sity, the cost of tools out-weighs the risks—at least for now. Yohn says the school uses only ActiveSync to sup-port its 4,500 faculty and staff. He’d like to do more, but says licensing costs for the containerization tools he researched would have exceeded $100,000 (Rs 53 lakh) annually.

At CareerBuilder, a jobs website and staffing firm, individuals who want to use their own phones can connect by way of Active-Sync, but downloaded data is not encrypted unless the user chooses to do so at the device level. Further, IT doesn’t offer any support for users connecting with their own smartphones.

Users can also install, on their own, apps to access SaaS applications such as Concur and Salesforce.com. “We defaulted to that,” says senior vice president of information technology Roger Fugett. But with nearly half of Career-Builder’s 2,600 employees now bringing their own devices. Containerization and general MDM tools are on his radar.

THE COMING CONSOLIDATIONContainerization is rapidly becoming a necessity for supporting BYOD, and the technology is evolving rap-idly, says Stephen Singh, director for infrastructure

practice at professional ser-vices firm PwC. “It works relatively efficiently and meets the regulatory compli-ance needs for many of the customers we speak with.”

Going forward, it should be possible for example, to apply one set of policies to the entire device, another to a protected container where app stores deposit applica-tions, and a third to specific corporate apps, with varia-tions depending on the user’s role or group.

Containerization is already starting to be ab-sorbed into the major MDM platforms. Symantec plans to merge into its Nukona con-tainerization and Odyssey MDM acquisitions into its Altiris offering for manag-ing servers, desktops and laptops; and Mobile Iron now offers its own APIs for appli-

cation integration. Eventu-ally, Redman says, MDM will broaden into a “sys-tems management platform for the enterprise” that includes security, content management, application management and applica-tion development, and it will extend to laptops and desktops as well as tablets and smartphones.

That’s high on the wish list at Union Bank, which relies on two different con-soles to manage BlackBerry and other mobile devices.

BNY Mellon has already started down that road. “We chose MaaS360 because we can run it across our full mobility network, whether a laptop, phone or tablet,” Perkins says. “I can provision access to all of those devices at once, knowing that each has a different graphical paradigm. That’s the way we think people will be moving.”

Singh sees an even broader convergence of management tools that pro-vides ubiquitous access for any end-user device over any medium, including desktops, laptops, desktop and application virtualiza-tion, remote access and unified communications as well as mobile devices. “We’re not that far off from a universal console. We see convergence occurring in three to five years,” he says.

That may seem like a ways off, but it’s important to plan for that vision now so that containerization, MDM and other tools acquired today don’t end up overlapping or becoming redundant over time. “Look at the big pic-ture. Solving the problem for mobile device management isn’t just about selecting a vendor,” Singh says. “It’s about applying a solution across multiple platforms and instances.” n

OCTOBER 2012 INDIAN CHANNELWORLD 43

MOBILITY SPECIAL((((( (((((

Page 46: Channelworld Magazine October 2012 Issue

n OPINION

Futuring is Priority

THE ONE thing we definitively know about the future is that we will spend the rest of our lives there. And yet people don’t think enough about the future. It’s as simple as that. Most people allocate minute fractions of their time and brainpower to the

future. This includes otherwise rational executives who havesomehow decided that their days are best spent addressing whack-a-mole opera-tional exigencies, participating in non-value-producing political infighting and documenting regulatory compliance. This is all wrong. We need to make more time for thinking about the future. In IT, futur-ing should be Job No. 1.

The technology industry is all about time. How long tasks take, how long things last, how long it takes to learn a new skill, and how long before it’s time to walk away from long-held skill sets. Time-to-mastery and time-to-obsolescence have become critical dials on the IT success-o-meter. That makes learning curves critically important. Most readers recognize that there are two curves in IT: the curve we’re on, and the curve that comes next. In the early days of IT, a CIO’s value was in mak-ing sure the enterprise was “doing things right”—optimally allocating assets to run-ning the business (that is, being at the top of the current learning curve).

In an environment hyper-accelerated by disruptive technology change, the key part of a CIO’s value becomes enabling the cre-ation of businesses that capitalize on the power shifts that accompany technology change. Careers will be made on timing and executing curve jumps successfully.

The first step is to redefine your rela-tionship with the future. Futuring is not what you do when you’re finished with the imagined real work of operations. Futuring needs to come first. This means that the quarter before you start the annual budget-ing process, you should allocate resources

to projects and personnel that will serve as a bridge between the present and the future.

In doing that, it’s helpful to keep in mind the Three Horizons portfolio model popularized by Mehrdad Baghai and his colleagues at McKinsey in The Alchemy of Growth. Horizon 1 represents a company’s current products and servic-es. Horizon 2 projects relate to the next generation of high-growth opportunities in the pipeline. Horizon 3 concepts are next-generation prototypes.

Picking up on that analogy in Escape Velocity: Free Your Company’s Future from the Pull of the Past, Geoffrey Moore de-scribes Horizon 2 as the “ferryboat from the future into the present. Its job is to take a promising next-generation technol-ogy and turn it into a material business.” These are opportunities that will become new core businesses, potentially replac-ing current cash generators. He who owns Horizon 2 owns the future. And who better than the CIO to say, “I will take re-sponsibility for it”?

Escape Velocity shows what can hap-pen when such opportunities are ignored, detailing how the tyranny of today (all those quotidian events that keep you from thinking about the future) derailed some of the most profitable franchises in modern business: AT&T, Digital Equipment, Kodak, Silicon Graphics, Sun, Wang and Xerox.

Cultural historian Rosalind H. Williams at MIT argues that we are living in “an age dominated, if not determined, by technologi-cal change.” The person who masters tech-nology change will be the hero of the age. n

IT leaders—your own customers—spend too little time imagining the future. That’s a big problem.

Thornton A. May is author of The New Know: Innovation Powered by Analytics and executive director of the IT Leadership Academy at Florida State College in Jacksonville. You can contact him at [email protected] or follow him on Twitter (@ deanitla).

THORNTON A. MAY

44 INDIAN CHANNELWORLD OCTOBER 2012

Page 47: Channelworld Magazine October 2012 Issue

RNI NO.KARENG/2007/20996 Registered No. KA/SK/UDP/1287/2010-2012 Posted at Manipal HO on 13/14th. Licensed to Post without prepayment – License No. WPP -103Printed And Published By Louis D’Mello On Behalf Of IDG Media Private Limited, Geetha Building, 49, 3rd Cross, Mission Road, Bangalore 560 027, India.


Recommended