+ All Categories
Home > Documents > The Integrator

The Integrator

Date post: 30-Mar-2016
Category:
Upload: jns-media-international-mfze
View: 227 times
Download: 3 times
Share this document with a friend
Description:
The Integrator - Powered by VAR
Popular Tags:
36
Transcript
Page 1: The Integrator
Page 2: The Integrator

Intel® Xeon® processor

Do it with an EqualLogic iSCSI SAN from Dell.

Exploding data. Some might say it’s the sign of a healthy business. If so, your businessis doing great. But the bottom line is, it’s a constantly changing variable that you haveto manage wisely for the future of your business.

EqualLogic iSCSI SAN data storage solutions from Dell offer• The lowest TCO of common storage array architectures,at 1/3 to 1/2 the total cost of competitors over five years1at 1/3 to 1/2 the total cost of competitors over five years1• An all-inclusive, affordable pricing model• An intuitive management interface• Quick installation—in minutes, not hours• Scalability on demand• Interoperability—within and across product generations• Advanced software integration with VMware, Hyper V, SQLand Exchange for fast Snapshot recoveryand Exchange for fast Snapshot recovery

It’s time to change the way you think about purchasing and managing storage.High-performance EqualLogic iSCSI SANs from Dell come with the software andapplications expected from an enterprise-level SAN—at no additional charge.There is no additional software to install or service costs to incur to initiate thedata management and protection features.

APTEC DISTRIBUTION FZ LLCCALL Aptec at Tel: (+9714) 3697111 Extn: 154/155/147/286/496Fax: (+9714) 369 7110Visit: www.apteconline.comEmail: [email protected]

Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

Page 3: The Integrator

February 2012 | The Integrator 3

Cont

ents

For several years, value-add distribution was little more than a cliché for some of the companies that claimed to be VADs as well but with each passing day, it acquires more substance as a concept or as a Business model. Today when the IT demands of customers have evolved further towards compo-nents that help build more sophisticated network infrastructure and IT solutions that boost Business productivity, the role of the VAD has grown by a significant proportion.

As expectations from VADs increase from all quarters and more significantly vendors who choose to partner with them, it also means entry barriers would also significantly move up higher for new companies to enter this domain. Unlike the earlier years for instance, it might be more challenging while not entirely impossible for small start-ups to cater to brands that are now getting the attention of larger sized distributors.

In the past two or three years, several broadline distributors have attempted shaping up enterprise or value teams and handful have succeeded. Some have quietly limited further extensions of their mod-est value distribution teams while some remain a little short of confidence. There are a larger number of VADs as never before and the scenario is building up for consolidation. The benchmarks of excellence could rise higher in the industry. Perhaps one of the criteria, which would be a decid-ing factor, could be the quality of the pre-sales con-sultants who help the channel sell better. In other words, the entry barriers in a domain would only get tougher and the established distributors are in a bet-ter position to consolidate on their gains.

Time forconsolidation

R. NarayanManaging Editor

Editorial

Publisher: Vivek Sharma Managing Editor: R. Narayan Art Director: Faiz Ahmed Sales Director: Alishan ZaidiSr. Sales Manager: R. Subramanyan Business Development Manager: Mallika RegoSales Coordinator: Smitha Jithesh

Disclaimer: While the publishers have made every attempt possible to get accurate information on published content in this handbook they cannot be held liable for any errors herein.

Powered by VAR MagazineP.O. Box: 121075, Montana Building 404, Zabeel Road, Near GPO, Karama, Dubai-UAETel: 04-3705585 Fax: 04-3706639

Cover Feature Towardsacceleratedgrowth

The UTM space is looking up and the new generation appliances offering better efficiency and granular application level reporting and control are helping win over customer acceptance in enterprise verticals as this feature finds out

Point2point SteadfasttofundamentalsK.S. Parag, MD at FVC speaks to The Integrator in the following inter-view about the company’s business vision and objectives

Techknow / Avnet DeliveringtheproofofvalueHani Barakat, senior director Oracle business MENA, Avnet Technol-ogy Solutions speaks to the Integrator about how ‘the resource’, its new Technology facility will help Avnet’s business partners in the Middle East and North Africa (MENA) region address the business challenges of their end-user customers.

Round Table / Cloud Computing AjourneytothecloudThe Integrator organized a Round Table that brought into discussion a cross spectrum of perspectives from vendors, distribution and systems integrators on the current scenario of cloud based solution deployments and the challenges.

Insight/ Allied Telesis “PoEismorethanjustremotepowering”Sabbahuddin Khan, Regional Manager at Allied Telesis Middle East, outlines the benefits of PoE for SMEs and argues that PoE is about much more than pushing power through LAN cables.

Insight / Interactive Intelligence Middle East MappingIPcommunicationsuccessEvren Aker, Pre-Sales Manager, Interactive Intelligence Middle East lays out the migration roadmap for enterprises in the Middle East thinking of making a transition from a traditional PBX system to an IP Communications system

Regulars

News

Eyetech

11

16

18

20

28

632

30

Page 4: The Integrator

NETWORK SECURITY

SECURE REMOTE ACCESS

WEB AND E-MAILSECURITY

POLICY AND MANAGEMENT

BACKUP ANDRECOVERY

DYNAMIC SECURITY FOR THE GLOBAL NETWORK© 2011 SonicWALL, Inc. SonicWALL and the SonicWALL logo are registered trademarks of SonicWALL, Inc.

[ Tough quesTion #18]

Who Makes The highesT PerforManceLoW LaTency nexT-gen fireWaLL?

SonicWALL® enables IT to get back in control and more easily and efficiently stay ahead of today’s constantly evolving threats and application-related issues. An advanced security platform consolidates core Next-Gen Firewall application intelligence, control and visualization, gateway protection, and inspection for SSL encrypted sessions for enterprises along with WAN acceleration for distributed offices. SonicWALL’s low latency platform scans and secures every packet of every protocol, efficiently securing the network, controlling Web 2.0 apps, and optimizing bandwidth.

Secure network optimization that minimizes complexity and latency is now within reach. Learn about our SuperMassive™ E10000 Series and the rest of our network security line-up at sonicwall.com/optimize

sonicWaLL

enTerPrise.secures The

Page 5: The Integrator

February 2012 | The Integrator 5

AvnetTechnologySolutionsacceleratesResellersbusinessforHPStorageSolutions

Currently Avnet is running a special promotional scheme on the P4500 Storage system where every single order will be rewarded with an Apple iPod Nano and every order of 4 units with an additional iPad2.To benefit from the P4500 Promotion and for more details contact Avnet at [email protected]

HP P2000 HP is the entry-level storage solution. It features the latest HP functionalities and host-connect technology. Due to its excellent price/performance ratio, P2000 is the ideal fit for smaller organizations with smaller budgets.

HP P-Series Storage Solution delivers flexible storage infrastructure solutions, which are designed to meet a range of storage networking needs, from small and mid-sized businesses to the largest corporate enterprises.

The HP P4000 is multitasking: the feature-rich SAN solutions serves demands from entry level to mid-market organizations. It offers enterprise functionality with simplified central management for multi locations. P4000 supports features like superior application availability and disaster recovery and also is optimized to work in virtualized environments.

HP P6000 is designed for mid-market and large enterprises with demand for high availability and performance. The efficient array system is easy to use and features built-in virtualization to consolidate storage and simplify IT.

HPP-SeriesStorage:Flexible&reliablesolutionforeverydemand

With its team of HP Solutions experts, Avnet Technology Solutions has the right setup to help resellers in the region to find the perfect configuration for their customers. Avnet offers services, resources and technical expertise needed to accelerate business and ensure customer satisfaction.

Christopher Green, Sales Manager Middle East, Avnet Technology Solutions, said, “To analyze a customer’s actual demand and to find the right solution it requires certain skill-sets. Therefore, it is our constant aim to support our partners by offering trainings and technical updates on HP

Solutions. Additionally, we run channel programs, such as incentive promotions, on a regular basis.”

Howtofindtheperfectsolution?

The P-Series Family

BenefitsforAvnetPartners

Primarily positioned for entry level customers Predictable data growth Scalable maximum to 96 Disks

Can be managed with limited IT expertise Ideal for small business environment

Primarily positioned for entry & mid-size customers Unpredictable data growth Scalable maximum to 384 Disks Can be managed with limited IT expertise Ideal for virtual server environment Suitable for Data Recovery environment which provides instant business continuity for virtual servers

Primarily positioned for mid-size & enterprise customers Unpredictable data growth Scalable maximum to 450 Disks Strong level of IT expertise required Ideal for Business critical environment Suitable for a Data Recovery environment which provides instant business continuity for business critical servers (BCS)

P2000 P4000 P6000When to Sell what

Christopher Green Sales Manager HP Gulf & Levant,

Avnet Technology Solutions

Page 6: The Integrator

The Integrator | February 20126

NewsBytes

Iomega, an EMC company partnered with AXIS Video Hosting System to showcase a hosted video surveillance portfolio at Intersec.

Cizar Abughazaleh, regional director for the Middle East, Africa and Turkey at Iomega said, “At Intersec, we demonstrated how Axis, the market leader in network video, powered by Iomega’s leading cloud storage and security solutions, enables SMBs in the Middle East to leverage the power and cost effectiveness of cloud services, giving them a more secure, highly available and cost-effective solution for their video surveillance needs,” continued Abughazaleh.

The AVHS-enabled Iomega network storage devices, along with Axis network cameras and encoders, allow resellers and integrators to deliver video surveillance capabilities to SMB customers. With Iomega and Axis’ hosted video service, SMBs in the region will only pay for the storage they need, allowing them to grow their infrastructure without requiring additional capital investment.

HP has announced changes to the HP PartnerONE and HP ExpertONE programs that enable networking channel partners to increase market competitiveness and revenue opportunities. HP has streamlined the specializations of its former Preferred Partner networking channel program in the Europe, Middle East and Africa (EMEA) region. All channel partners are now in the PartnerONE program.

HP has three new certifications for networking: Registered Networking Specialization: These Partners focus primarily on selling solutions to the SMB market and offer customers a choice of secure, affordable and scalable network solutionsProfessional Networking Specialization: HP Professional Networking Partners sell, deliver, manage and support secure, wired and wireless networking infrastructure solutionsAdvanced Networking Specialization: These Partners sell, deliver, manage and support complex, end-to-end secure networking and data centre solutions and have the expertise and skills in designing, deploying solutions and services spanning the networking lifecycle. “HP offers a fantastic range of opportunities for its partners, across the entire IT converged infrastructure portfolio. Access to HP education and training programs, the Network Design Centre, and many other partner incentives, makes doing business with HP partners easier and more profitable,” said Ayman Dwidar Enterprise Storage, Servers and Networking Channel Manager , HP Middle East.

IBM is set to acquire Green Hat, a leader in software quality and testing solutions for the cloud and other environments. Green Hat helps customers improve the quality of software applications by enabling developers to leverage cloud computing technologies to conduct testing on a software application prior to its delivery.

According to recent industry reports, software testing represents more than 50 percent of overall development costs, and testing teams often spend upwards of 30 percent of their time managing the complexity of the test environment. Green Hat creates a virtual environment that simulates a wide range of IT infrastructure elements, without the constraints of hardware or software services. Upon the acquisition close, Green Hat will join IBM’s Rational Software business. When combined with the IBM Rational Solution for Collaborative Lifecycle Management, developers and testers can achieve unprecedented levels of efficiency, effectiveness, and collaboration while delivering quality software to their business.

Iomega and Axis partner to showcase video surveillance

Changes to HP Partner program to increase opportunities for channel

IBM to Acquire Green Hat

Page 7: The Integrator

February 2012 | The Integrator 7

ESET Middle East has teamed up with Bulwark Technologies LLC, a Value-added Distributor of IT security solutions in the Middle East to address the opportunity in the SMB and corporate segment.

Bulwark will market, sell and support ESET’s ESET NOD32 Antivirus and ESET Smart Security solutions through its reseller network across the countries of UAE, Oman, Qatar, Bahrain and Yemen. ESET NOD32 Antivirus 5 utilizes multiple layers of detection and unique cloud technology to block all potential threats. Aji Joseph, General Manager, ESET Middle East commented “We are excited about this partnership with Bulwark for it allows us to penetrate further the markets in the region and reach out to a new breadth of customers. Bulwark already has an established customer base in the corporate and SME segment, which we would like to leverage through this synergy.”,

EMC Corporation participated as Gold sponsor in the Electronic Healthcare Records Forum at Arab Health 2012, held from 23-24 January 2012 in Dubai. This leading and time-critical event provides a unique platform for EHR professionals in the region to learn and network alongside key stakeholders to develop and advance EHR in the Middle East region. Yves Mahieu, EMEA Director Healthcare, EMC, a prime witness of the fundamental eHealth evolutions that are reshaping today the European healthcare space, delivered a keynote presentation on the first day of the event on EMC Collaborative Solutions. Based on EMC Documentum, VMware and EMC Storage, EMC Collaboration Solutions is an integrated IT solution that helps healthcare providers to built this 360° patient view. During his presentation, Yves explained how the top hospitals in Europe are using the EMC Collaborative Healthcare Solution today, to enhance data-sharing, manage better medical data volumes and built 360° patient view.

Westcon Group, a value-added distributor of category-leading unified communications, network infrastructure, data center, and security solutions with a global network of specialty resellers, today announced its security business practice has been named “EMEA Distributor of the Year” by Juniper Networks.

Westcon was honored at the First Annual Juniper Global Partner Conference in Las Vegas, Nevada. The award is the second time Westcon has received this honor from Juniper in three years.

More than 30 partners from the Americas, Asia-Pacific and EMEA were recognized during the event, bringing together more than 1,000 partners from around the world.

Steve Lockie, Managing Director, WestconME Group, commented “With a unique focus on security, networking and data center technology, Juniper is most certainly a visionary in this space. That’s why we’re extremely proud our teams across Europe, Africa and the Middle East have been singled out for their collective efforts. The announcement is a direct reflection of our commitment to resellers, resulting from a tight collaboration with Juniper at every level of their business.”

ESET signs up Distributor Agreement with Bulwark

EMC Introduces EMC Collaborative Solutions

Westcon Group Named EMEA Distributor of the Year by Juniper Networks

Page 8: The Integrator

The Integrator | February 20128

Spectrami, a VAD has signed a distribution agreement with Varonis Systems, a leading vendor for unstructured data governance solutions.

Varonis Systems provide solutions that manage and protect the unstructured data that is exploding and out of control within every organization. The number of documents, spreadsheets, presentations, media files and other business data sitting on file servers, NAS devices, and semi-structured repositories like SharePoint and Exchange is massive and growing fast. Data protection is necessary to safeguard an organization's customers, employees, business partners, and investors.

“We are glad to partner with Varonis and bring the unique unstructured data governance solutions to the region,” said, Anand Choudha, Managing Director, Spectrami. “Spectrami will offer Varonis solutions, training, marketing and sales tools to its channel partners, in order to accelerate growth in this fast growing data governance market segment in our region”.

Spectrami teams up with Varonis Systems

At its first Dell Storage Forum event in Europe, Dell announced advancements in its Fluid Data architecture. The Fluid Data architecture, designed to enable customers to manage more information more effectively, is strengthened with new offerings that include Dell’s first deduplication backup appliance that integrates intellectual property from the Ocarina acquisition; a major software release for Compellent storage arrays; a new storage optimization solution for Microsoft SharePoint; and broader support for Dell

Force10, PowerConnect and Brocade storage networking solutions.

“Today’s IT organisations in the Middle East are moving faster than ever down a road that is constantly changing. That’s why their data needs to be as dynamic as their business,” said Dave Brooke, GM- Middle East Commercial at Dell. “With Dell’s new primary, archive and backup storage solutions available in the Middle East, the Dell Fluid Data architecture delivers the storage intelligence customers need to deal with a sea of constant IT change without driving up costs, wasting time or continually replacing infrastructure.”

FVC, a leading Value Added Distributor in the MENA region, has signed a partnership agreement with Zoho Corporation, a private company which offers a comprehensive suite of award-winning, on-line business, productivity & collaboration applications. Zoho Corporation serves the technology needs of more than 50,000 customers worldwide.

FVC will represent ZOHO in the region as a Value added distributor for their online Cloud Applications, mainly Zoho CRM, Zoho HRIS, Zoho Projects, Zoho invoicing and Zoho Web Conferencing. This will be addition to FVC Cloud vision of bringing Emerging Cloud services to the region and equip our reseller community to offer cloud services. K.S. Parag, Managing Director at FVC, said, “Zoho is a very valuable addition as an online cloud applications distributor. One of FVC’s visions has always been to bring Emerging Cloud services to the region and equip our channel community with a comprehensive range of cloud services they can offer their enterprise customers. Zoho brings the highest levels of expertise, experience and flexibility to the region in cloud applications as they have more than 32 online applications.” As the first point of contact in the region, FVC will deploy dedicated sales and technical resources in MENA region.

Dell strengthens Fluid Data Architecture

FVC Signs Zoho to bring Emerging Cloud Applications in MENA

NewsBytes

Page 9: The Integrator
Page 10: The Integrator

The Integrator | February 201210

News | Feature

Seven Seas has tied up as partner for MindTree for providing Remote Managed services to its customers in the region. Seven Seas would provide two different scenario based services under this partnership.

The first of the services would be to provide Level 3 or Onsite support for the customers, who will be provided with Level 1 and

Level 2 support remotely from the MindTree Managed Services center in India. All onsite tasks required to fulfill the defined SLAs would be provided by the field support of Seven Seas. The services include Managed Network Monitoring, Managed Network Operations, Managed Production Operations, Managed Server and Storage Monitoring, Managed Messaging Systems Services, Managed Global Help Desk, Managed Database Monitoring and Support, Managed Security Monitoring and Audit and Managed Application Support.

The second service is under consideration and could include providing white labeled service, wherein Seven Seas would provide the SLAs taking into consideration a customer’s concerns on data integrity as well as the WAN costs to MindTree India. This service is likely to be provided in about a year’s time.

Narendra Talreja, Director, Managed Services at Seven Seas says, “The

current delivery of the managed services is provided via our service desk tool (1evel1), remote access tools (level2), onsite support (level3), well defined service levels or operational levels and periodic reporting. Customers have agreed SLAs on identified products or services deployed in their premise.“

There is an increasing opportunity for Remote management services in the region. Businesses today have to deal with a strategic intention to create transformational value and differentiation for their customers from the limited assets under

their control; both human capital and finance; while also having to manage and optimize the business critical operations that are enabled by IT and telecom infrastructure. IT operations are extremely critical to run-the-business, but at the same time they are repetitive, non-core and generate recurring costs to the business. Businesses prefer to focus on market leadership strategies and increase revenue by developing and selling value-added products and planning for future growth. Such enterprises need to strategically consider contracting operations like business processes, network operations and maintenance, server and storage infrastructure monitoring and support, global help desk, day-to-day IT operations, production application support and enterprise backup to managed services provider(s). However, there could be challenges that would confront the speed of acceptance.

Narendra says, “Changing Business Models like Collocation, Hosting services, Service & Application provider, IT Resource augmentation by various System Integrators and conglomerate companies will soon become a trend. International providers will seek local partnerships and models to provide the same with Telcos getting more competitive in pricing and technologies. The deterrents would be the concern on localization of the data and services being provided, the provider company will need to demonstrate ROI and TCO benefits to their business and the consumer. “

Within the UAE, Seven Seas provides managed services which include Facilities management services, Remote management, Disaster Recovery hosting services, Functional outsourcing, Resource augmentation, Platform Migration, IT infrastructure relocation and Maintenance contracts.

Seven Seas partners with MindTree

from Left to Right:Shivkumar Subramaniam, GM Middle East, MindTree; Narendra Talreja – Director Managed Services, Seven Seas; Rakesh Agrawal – GM Enterprise Services, Seven Seas; Mehboob Hamza, Chairman, Seven Seas ; Ram C Mohan - Sr. Vice President and Head IMTS, MindTree; Nayagam Pillai, CEO, Seven Seas; Satyanarayan Sridharan, Business Development Manager and Kunhammed Baramy, Presales IMTS, MindTree

Page 11: The Integrator

February 2012 | The Integrator 11

The UTM has been a convenient, easy to deploy and cost effective device featuring several co-located security services and that has historically been the secret of its success in the mid-market segment. It replaces the need for different standalone appliances providing several Network security functions including firewall, VPN, endpoint, web content filtering, spam blocking, virus protection, intrusion prevention and more. It continues to be a successful product and has an ever growing footprint

among the Small business (SMB) and remote/branch/small/home office (ROBO/SOHO) customers. However, in the past UTM vendors found limited acceptance in the enterprise market as enabling multiple security functions on a single appliance could impact network performance. That seems to be changing faster now with new generation UTMs offering better performance finding greater acceptance in the enterprise segment.

Bashar Bashaireh, Regional Director at Fortinet Middle East says,

“Historically, UTM solutions have represented an easy to implement and manage security umbrella for SMBs. Another main advantage is their low cost in comparison to purchasing many different security solutions. These two advantages are primarily responsible for driving rapid adoption of UTMs by SMB customers. But UTM solutions, as they have matured, have also gained traction in larger organizations.”

A growing number of enterprise customers are now buying into the UTM option and are turning to the

new generation UTM solutions that satisfy their security requirements better. The new generation devices come with additional functionalities

The UTM space is looking up and the new generation appliances, offering better efficiency and granular application level reporting and control are helping win over customer acceptance in enterprise verticals as this feature finds out.

Towards accelerated growthTowards accelerated growth

Bashar BashairehRegional Director

Fortinet, Middle East

Cover Feature

"Historically, UTM solutions have represented an easy to implement and manage security

umbrella for SMBs. Another main advantage is their low cost in comparison to purchasing

many different security solutions"

Page 12: The Integrator

The Integrator | February 201212

for better performance in comparison and therefore fare more favorably vis-à-vis the point appliances unlike earlier when some of their functionalities were more modest.

Bill Prout, Technical Engineer, Network Security Group, Sophos says, “It’s true that UTM has not traditionally been considered suitable for the Enterprise, but that is changing due to a number of factors such as advances in the technology, budgets constraints, and increased industry confidence in multi-function devices. Earlier generation of UTMs had limited feature sets compared to point products, and the hardware of the time was not able to effectively handle the traffic and processing associated with running different

security applications at the same time. Those factors limited their usefulness to larger organizations, and so UTMs were initially adopted by organizations that did not have great throughput needs or that used very simple architectures.”

The growing success in the enterprise segment has been helped by the fact that the UTM vendors have focused on designing products that offer better throughput efficiencies. Surendar Bishnoi, General Manager at Cyberoam Middle East concurs that the UTM is gaining traction in enterprise deployments and are meeting the higher expectations of enterprise customers.

He says, "Of late, enterprises are increasingly seeing value in adopting UTMs for their large networks. The present generation UTMs can deal with newly-evolving, future threats while providing high throughput performances for the most demanding enterprise networks. Therefore enterprises today see UTM as not only meeting their needs but as a product which empowers the IT administrators with greater flexibility and enhanced capability to provide real time security while ensuring their connectivity and productivity.”

According to Haroon Iqbal, Sales Manager - Middle East and Africa, WatchGuard Technologies, the hesitation that enterprises had in adopting the first generation UTM devices would have been because of lack of proven capabilities.

He says, “This could have been true in the past due to two main problems: performances and quality of UTM services sometimes ‘home made’. We are seeing more

and more enterprises interested in our UTM solutions that consolidate the security infrastructure and it’s cost effective at the same time.”

While the limited functionalities of a traditional UTM devices and the fact that enterprises did not want to be fallible to a single point of failure slowed their acceptance in the enterprises, that is changing now.

Bill says, “Today UTMs use newer hardware and software that can process and pass much more traffic than earlier models and as such they compare favorably to point solutions. They also offer a wide array of advanced features which in the past were only found on point solutions."

According to Fortinet, while customers may not deploy all functionalities on a UTM, over time, they look at enabling more functionalities that already come with the UTM. This means an up-selling opportunity to the installed base of customers.

Bashar says, “The reality is that many of our customers adopt our UTM solutions to first leverage two or three security functions available within our appliances (firewall, VPN and IPS for instance). They therefore deploy our products within their security infrastructure where they already have other point solutions. It is quite common to see that over time, they choose to activate additional security features available on their appliances to replace existing appliances they had deployed. ”

D-Link, more known for its networking products portfolio that target the soho and, SMB customers is also focusing more on

Haroon IqbalSales Manager

MEA, WatchGuard Technologies

Cover Feature

Page 13: The Integrator

February 2012 | The Integrator 13

visualization on enterprise class appliance offerings have raised the interest levels of many large

enterprise customers in the region. With the SuperMassive E-10000 series, SonicWALL is uniquely positioned to offer real Next-Generation

Firewalls, with best of class DPI and IPS performances.”

According to SonicWALL all of its firewalls solutions can be deployed either as a UTM solution (SMB) or as a Next-Generation Firewall (enterprise) where only key security services would be utilized: GAV,

the UTM segment. The networking vendor’s go to market strategy involves using its established networking channel to sell to existing customers. D-Link's UTM devices portfolio cater from SOHO to Enterprise segment customers.

Sakkeer Hussain, Sales and Marketing Manager at D-Link says, “Firewalls are important in our product portfolio, since we have many customers who look for complete networking solutions, out of one hand. Being able to purchase all networking equipment from one vendor adds tremendous convenience to the purchasing process and has hence been very beneficial for purchasing managers.”

He adds, “Today’s continuously shifting security environment presents a challenge for small/home office networks with limited IT capabilities. Fortunately, the D-Link NetDefend Unified Threat Management (UT M) firewalls provide a powerful security solution to protect business networks from a wide variety of threats. ”

PerformanceboostwithNGFWWhile earlier enterprise users may have shied away from the UTM, the next generation Firewall (NGFW) is winning over the confidence of more enterprise customers. Next-generation firewalls (NGFWs) feature the ability to inspect and control threats through application awareness. With deep packet inspection, NGFWs inspect traffic at layer 7 – the application layer and therefore

much greater ability to detect and block attacks that directly target data. Although there is debate that true NGFW devices are built from scratch on new architectures that avoid performance bottlenecks (with a single pass engine used for all services), several of the leading UTM vendors have built next generation functionality into their products. They have now introduced the control of applications, application visibility and the ability to create rules based on users and applications.

As of present, only a modest 5 percent of the firewalls deployed are “next generation” devices. Gartner expects that percentage to climb drastically by the year 2016 and could be as much as 60% of the overall sales.

Shahnawaz Sheikh, SonicWALL’s Regional Director for Middle East, Africa and Turkey says, “ It is rightly indicated that enterprises today are seriously considering Next Generation Firewalls over point solutions for multiple reasons such

as costs, consolidation, overall TCO, etc. From SonicWALL's stand point, we are already there in the space of Enterprise firewalls and this was reinforced in 2007 with the launch of the E-Class NSAs. Last year, the introduction of Next Generation Firewalls that offers Application control, intelligence and real time

Sakeer HussainSales & Marketing Manager

D-Link

“Although there is debate that true NGFW devices are built from scratch on new architectures that

avoid performance bottlenecks (with a single pass engine used for all services), several of the

leading UTM vendors have built next generation functionality into their products.”

Page 14: The Integrator

The Integrator | February 201214

IPS, Antimalware, Application Intelligence & Control with real time visualization, DPI SSL + RFDPI. For the enterprise it has a separate strategy because it offers additional point appliances that are part of its go to market strategy.

Cyberoam claims that all its next generation UTMs offer stateful and deep packet inspection for network, application and user identity-based security and is well-integrated with VPN, IPS, Anti-Virus & Anti-Spyware, Anti-Spam, Web Filtering, Bandwidth Management, Multiple Link Management. It has further added an extra layer of security around human identity in its appliances. Its patent pending, Layer 8 Human Identity-based firewall appliance enables work-

profile based policies and a single interface for policy creation across all the UTM features, providing ease of management and high security with flexibility.

Surender says, “Cyberoam’s patent pending identity-based firewall extends security right up till the user that embeds user identity in the firewall rule-matching criteria, enabling enterprises to configure policies by the user based on work profile in addition to identifying the individual user activity with user name. In doing so, it offers complete visibility into user activity, allowing enterprises to see ‘Who is Doing What’ in the network.”

He further adds that the multicore processor architecture in its UTM devices helps address potential performance bottlenecks that can deter throughput efficiencies. This removes the need for hardware upgrades which he says plagues traditional UTM devices.

“ Cyberoam’s multicore-aware software architecture is not enmeshed with the appliance hardware, making it easily reprogrammable to deliver new patches and policies online to address fresh attacks. Also, Cyberoam’s extensible firmware can update with future security needs of an enterprise. Cyberoam’s high speed and throughput values meet large enterprise performance requirements for technology trends like cloud computing, Web 2.0, mobility etc.”

There is a considerable difference between traditional firewall appliances and next generation firewall appliances in terms of approaches/technologies.

Shahnawaz adds, “First-generation firewalls (traditional) were designed around one objective: to block direct threats coming from outside the firewall in a perimeter-based attack. But these stateful firewalls (firewalls that perform stateful packet inspection (SPI) or stateful inspection) alone are no longer enough. Mobile employees using multiple devices to connect to critical business data from home broadband or public wireless hotspots, and mountains of media and rich digital content are an ever-growing part of business software applications. Data inspection at the application-content level is necessary to protect against sophisticated hacking schemes. In the pursuit of application-level protection, “deep packet inspection” (DPI) has become the preferred approach.”

According to the Sophos spokesperson, all its Astaro Security Gateway appliances offer NGFW technology as part of the UTM suite of security applications. They feature the ability to monitor and control applications irrespective of what ports are used for transport.

Bill says, “All Astaro Security Gateway appliances offer NGFW technology as part of the UTM suite of security applications. This technology is just one of the tools used to protect against the latest Internet based threats, but its main benefits relate to its ability to provide very granular reporting and policy enforcement. NGFW technology provides the ability to peer into the communication stream to identify and control traffic no matter what port it may be using. This increased visibility also provides very detailed usage reporting and options for bandwidth control.”

Shahnawaz SheikhRegional Director MEA & Turkey

SonicWALL

Cover Feature

Page 15: The Integrator

February 2012 | The Integrator 15

ChannelsuccessIn the context of the growing opportunity across a wider set of customers in enterprise verticals, the channel remains a vital link in the go to market execution. Astaro since its acquisition by Sophos is strengthening its engagement intiatives with the channel.

Bill (Sophos) says, “Now that we’re part of the Sophos family we’ll also be integrating our products with Sophos’ best of breed point solutions to provide complete security for an organization. The goal is to be a one stop shop where partners can go to when they need to protect their customers and data, no matter where those users sit or how they connect to the network. We are looking to leverage Sophos’s enterprise class team to reach more system integrators. Additionally, we are actively recruiting new SIs into our partner community, specifically SIs that can offer professional services and looping them into our marketing strategies.”

According to WatchGuard, it will seek to strengthen its reach into the SMb space (50-500 employees) and grow in the mid-sized enterprise market. The company has seen over 10% growth last year and targeting 20% plus growth this year with a continued focus on the channel.

Haroon Iqbal says, “We believe the skills are the main weapon

a System Integrator can use. We offer free certification technical trainings and free sales training to better understand our technology not only from installation point of view but also to understand the customer’s needs and propose the right solution from our product portfolio. Our program WSP (WatchGuard Secure Partner) helps our best customers to get the certification, get extra rebate and website visibility to highlight their installation and support capability of our technology.”

Manufacturers are evolving programs that facilitate systems integrators more to sell better.

Shahnawaz says, “Our success in the region is mainly attributed to our SI channel who invests in technical resources, certifications and passion to sell and support SonicWALL products, we reciprocate to support their business cause by investing in presales and qualified professional sales teams within SonicWALL managing the channel partner expectations. We do this with consistent

channel communications, impart certification and update trainings, providing required business tools that helps wealth of product and related information that can give them ease to conduct business with SonicWALL. Our motto is

to serve our SI channel partners the way they like to serve their customers.”

According to SonicWALL, it has seen consistent growth since 2005. While it claims that it had higher growth rates of 80-100% year on year, it says

it still retains a healthy growth rate of 40-50% in the present, indicating not only that the company itself is doing well but also underscoring the fact that this is an industry that is looking up and with most vendors claiming healthy growth.

Surender Kumar BishnoiGeneral Manager

Cyberoam Middle East

We are looking to leverage Sophos’s enterprise class team to reach more system integrators.

Additionally, we are actively recruiting new SIs into our partner community, specifically SIs that can offer professional services and looping them

into our marketing strategies.”

Page 16: The Integrator

The Integrator | February 201216

Point2point | FVC

Discuss the Technology domains that are the focus areas for FVC as a VAD? There are four areas of focus for FVC – unified communications, information security, application delivery and cloud computing. What we see in all these four domains that these tend to be extremely niche. These (technology areas) are addressing the ‘pain’ points and are helping enterprises to improve its efficiency and productivity.

In information security, we are seeing enterprises’ need for compliance and government regulation especially in the

financial sector where network managers would like to keep their infrastructure safe. FVC has been working proactively in this area to best address the growing requirements of both the enterprises and our partners that work in this sector.

You have multiple brands in Unified communication. Do they focus on separate verticals/segments or opportunities? The multiple brands we carry in Unified Communications complement each other so that we can offer a comprehensive Unified Communication portfolio. We still have a few gapss that we hope to

Steadfasttofundamentals

Right from the beginning, FVC has modelled its distribution business on the value model and has been for several years now one of the most prominent distributors when it comes to Technology distribution in its chosen domains. It’s associations with some of the top tier vendors as well as its commitment in being steadfast to its core competencies have been strategies that continue to pay off well. K.S. Parag, MD at FVC speaks to The Integrator in the following interview about the company’s business vision and objectives

K.S. ParagManaging Director, FVC

Page 17: The Integrator

February 2012 | The Integrator 17

fill within this platform. These would necessarily have to complement our existing skillsets. The education and healthcare could see the most benefit from some of the applications of unified communications.

Discuss the value proposition that FVC brings in? As a distributor that has been working in the cloud computing space for more than three years, we see clear advantages for our partners and their customers.

The customer needs to understand what he wants to achieve. Cloud is a very big buzz word and not all cloud solutions are suitable for him . We can help him understand what his needs are and how best we can add value for them whether public or private cloud. Based on this assessment, we can put together our solutions (completely vendor agnostic) and propose the right solution based on customer requirements and needs.

We have to make sure that we migrate existing infrastructures seamlessly to the cloud with least impact on the customers’ business. We also see that a large number of partners are system integrators who are not very clear on how to capitalise on these new technologies. This is where FVC can help the partner and his customer with our experience, sharing best practices based on existing implementation across the region. What have been some of the highlights for FVC during 2011? We’ve seen a year-on-year growth of up to 50% in terms of the business. In terms of expansion, the growth has come from all the areas, in unified communications, security,

cloud as well as application delivery. We have seen a larger growth in the application delivery segment.

We have seen a stronger presence across the GCC and are strengthening the teams in UAE and Saudi Arabia. We are also expanding into Africa especially East and West Africa.

In terms of consolidation, we are focusing on working with vendors whose technology and solutions add value in terms of broad skillsets – providing our partners and customers with a wider range of solutions that fit the growing needs of the enterprise network.

Are you looking at partner with new vendors in any specific areas?

Carrying on from the earlier response, we see a few gaps in information security and cloud computing – we hope to fill these with new vendor agreements.

Do you see ICT investments in different verticals of the region on the rise? While we are seeing cuts in spending in a lot of these vertical sectors, we are seeing more investments in ICT projects in the education and (while oil prices stay strong) in the oil and gas sector. Government spending will

continue to be flat.We see the advantage of some of our technology offerings in areas where we are able to demonstrate a better return on investment and lower TCO (total cost of ownership).

Is your channel entirely comprised of system integrators? We work with two types of System Integrators. We work with those who work on large enterprise networking projects and have the in-house talent and skills to manage these and the AV specialists that can manage unified communications and related technologies as part of large infrastructure projects.

Discuss some of the investments that FVC has done to serve channel better in terms of

training facilities, channel engagements, POC etc? We will be investing in more resources in terms of people on the ground to support our partners, expanding our existing Executive Briefing centres both in Dubai and Riyadh so that our partners can leverage these as demonstration centres for their customers as well as training centres for our partners. In Saudi Arabia, we will be expanding the Riyadh office and provide better on the ground support in Jeddah and Al Khobar.

The customer needs to understand what he wants to achieve. Cloud is a very big buzz word and not all cloud solutions are suitable for him . We can help him understand what his needs are

and how best we can add value for them whether public or private cloud.

Page 18: The Integrator

The Integrator | February 201218

Discuss in brief the fundamentals of Oracle Exadata Database Machine or Oracle Exalogic Elastic Cloud?Oracle Exadata Database Machine or Oracle Exalogic Elastic Cloud are Oracle “Engineered Systems”, where the system as a whole with all its building blocks share a single design authority and set of design

goals which will provide the most extreme value for customers. These systems are engineered into a single, high-performance integrated stack which eliminates traditional bottlenecks. Oracle Exadata Database Machine is the ideal and unique platform for extreme performance for all data warehousing, online transaction processing (OLTP), and mixed workloads. This makes it a unique and perfect platform for consolidation onto private clouds. Oracle Exadata Database Machine is a complete pre-optimized, pre-configured solution, engineered using Oracle HW and Oracle SW, that is massively scalable, secure and fully redundant. Its unique architecture and features lower cost of ownership, increase performance by 10x or more, and reduce the risk of downtime.

Oracle Exalogic Elastic Cloud is the ideal platform for applications of all types, from small-scale

departmental applications to the largest like ERP and mainframe applications. Exalogic is optimized for enterprise Java, Oracle Fusion Middleware, and Oracle‘s Fusion Applications. It is also perfect environment for thousands of third-party custom applications widely deployed today.

What are the objectives of the Demo centre. Avnet Demo centre, called THE [resource], is the leading cloud-ready technology demo center in the MENA region and it works as the point of reference for companies that would like to explore the potential of Oracle engineered systems; Oracle Exadata database Machine and Oracle Exalogic Elastic Cloud. It will enable companies to experience the use of Oracle technologies by creating proof of concept designs and performance benchmarks based on the Oracle Exadata Database Machine or Oracle Exalogic Elastic Cloud, a leading foundation for Cloud, to transform business requirements into a proven IT solution within an optimized, agile and risk mitigated environment.

How can your channel partners make use of the facility?THE [resource] will help Avnet business partners and their customers select the right

Avnet Technology Solutions inaugurated its proof-of-concept demonstration facility in Dubai, United Arab Emirates, for Oracle’s Engineered Systems, including the Exadata Database Machine and Oracle Exalogic Elastic Cloud. Hani Barakat, senior director Oracle business MENA, Avnet Technology Solutions speaks to the Integrator about how the facility will help Avnet’s business partners in the Middle East and North Africa (MENA) region address the business challenges of their end-user customers.

DeliveringtheproofofvalueDeliveringtheproofofvalue

Hani BarakatSenior Director Oracle Business MENA

Avnet Technology Solutions

Techknow | Avnet

Page 19: The Integrator

February 2012 | The Integrator 19

demo facility.

Discuss growth potential for such cloud based solutions? There is a big growth potential for Oracle engineered systems not only for cloud initiatives but also as consolidation platforms. Oracle Exadata Database Machine is the ideal and unique platform for extreme performance for all data workloads be it warehousing, online transaction processing (OLTP), or mixed workloads. It is a unique and perfect platform for consolidation as well as for building private clouds. Oracle Exalogic Elastic Cloud the ideal platform for applications consolidation as well as and the foundation for secure and mission-critical private clouds.

Data Explosion, maintenance, IT cost pressure, and performance are IT challenges that Oracle Engineered Systems can uniquely

address and resolve. End-users gain competitive advantage with rapid deployment of these systems and the ability roll out business services and applications in timely fashion. They also gain competitive advantage with reduced total cost of ownership, increased performance and improved security. These advantages have been realized and demonstrated across multiple sectors like Telco, Banking, Public, Oil&Gas, Education and others.

business solution based on Oracle engineered systems, test their applications, experience the difference with Oracle solutions, and get it right the first time when they go for implementation.

Services offered to Avnet business partners and their customers include executive briefings, needs assessment, solutions architecture workshops, technology demonstrations, ISV Competency, and training exercises. THE [resource] is one place where Avnet partners and their customers can enjoy all these value-added services with Avnet Technology Solution.

The facility will help Avnet’s business partners in the Middle East and North Africa (MENA) region diversify and grow their business, shorten sales cycles, increase their chances of having win-win success stories with their end-user customers by addressing their business needs with a great tool like THE [resource].

Simultaneously how many partners can avail the facility? All Oracle PartnerNetwork (OPN) partners are welcome to utilize THE [resource]. We have put in place a clear engagement process and a solid operations methodology to guarantee the highest level of utilization for the facility while hosting multiple engagements simultaneously. We are taking advantage of Oracle engineered systems’ design and structure, Oracle virtualization technologies that allow creating multiple virtual environments to demonstrate different applications and technologies, and the operational practices we have in place to coordinate simultaneous engagements without

compromising on the quality of service.

Discuss the size of the reource centre and the staffing?THE [resource] is a 1400 Square Feet facility located at Dubai Internet City which is one of the largest Information and Communication Technology (ICT) Business Parks in the Middle East and North Africa region. This facility is operated and supported by a team of Avnet professionals to provide the highest value to the partners and end-users. This team in comprised of technical consultants, solutions architects, products managers, and presales engineers. This facility is an Oracle Authorized Solution Center hence a member of the Oracle Solution Center community which gives Avnet access to additional resources and specialists.

For every proof-of-concept

engagement at THE [resource] we look at forming a virtual team. This team will ideally be comprised of resources from Avnet, Oracle, our business partner, and end-user to get the most out of the engagement. For other services and engagements we may need to build different teams with fewer resources. In summary we consider this facility to be a tool for Avnet, Oracle, our business partners, and end-users hence we consider all of them the extended team of the

Avnet Demo centre, called THE [resource], is the leading cloud-ready technology demo center

in the MENA region and it works as the point of reference for companies that would like to explore the potential of Oracle engineered systems; Oracle

Exadata database Machine and Oracle Exalogic Elastic Cloud

Page 20: The Integrator

The Integrator | February 201220

Round Table | Cloud Computing

MaheshVaidya, CEO, ISIT:As a systems integrator, we have already had solutions for cloud based storage, cloud based backup and cloud based archiving for the past three to three and half years. However, the adoption rate in the region has been on the lower side.

A survey we did helped to understand the concerns of customers and the benefits they anticipated from cloud deployments.

When it comes to doing storage back-up in the cloud, people in the region had largely been skeptical because of the reasons that the bandwidth was expensive and it wasn't reliable. The second concern was security.

On the other hand, most of them were also keen about the benefits of these solutions like the flexibility and the quicker deployment time compared to the 4-5 months procurement time in case of onsite solutions.

We decided to combine the best of the public and private cloud options. Most customers preferred a private cloud immediately with the option to a do cloud burst into the public cloud in future, moving some of their non-critical solutions to the public cloud.

Moderator: Gentlemen, cloud solutions are seeing a greater interest of late and perhaps a better momentum of adoption. We are here to discuss the current scenario of cloud based solution deployments and the challenges. We would like to hear your views on the topic. Over to you all. We were in talks with some Universities.

For instance, one of them was running SAP which they wanted to continue with local hosting. However there were other applications like Registration. Either they could over provision and buy a lot of kit which would be lying idle until the next burst of demand comes or they could utilize the services of a cloud provider. In instances of a higher demand, they could migrate

Ajourneytothecloud The Integrator organized a Round Table that brought into discussion

a cross spectrum of perspectives from vendors, distribution and systems integrators on the current scenario of cloud based solution deployments and the challenges. The participants included James Lyne, Director of Technology Strategy at Sophos; Florian Malecki, Senior Product Marketing Manager, EMEA, Sonicwall; Dominic Storey, Technical Director EMEA; Pramod Shetty, Product Sales Manager, Saas & Networking, FVC; Narendra Talreja, Director, Managed Services, Seven Seas and Mahesh Vaidya, CEO, ISIT. The discussion was moderated by R. Narayan, Managing Editor of The Integrator.

Mahesh VaidyaCEO, ISIT

Page 21: The Integrator

February 2012 | The Integrator 21

the application into the cloud to execute the processing in the cloud. They were also looking at a hybrid cloud option.

We put together a suite of solutions to help customers build a private and public cloud in a hybrid model. The software deployed enabled end-to-end provisioning of software for any type of VMs ( Virtual Machines), networking and storage. Users can access the service console and request provisioning of resources as required without any intervention required by the IT support staff.

The next concern was security. They were moving VMs around between different security zones Traditional security policies with UTMs, Firewalls weren’t working in with those changing environments. We created over machines security policies which we will be implementing in some large enterprise accounts here. When virtual machines move along different multiple security domains, the security policies also move around with the machines.

Additionally, we addressed the concern of the customer as to whether the cloud service provider could see his data when virtual machines are moved into the cloud and back. We made sure that even if you move the virtual machine, as long as you own the key, only you can see the data.

We have recently finished the design phase for the consolidation of multiple data centers for a large enterprise into three wherein two data centres were just about 100 metres away from each other and one was about 100 KMs away. The design for the consolidation uses these approaches mentioned.

NarendraTalreja, Director, Managed Services, Seven Seas:As an SI, we have seen that the cloud is still understood as a vague concept. Within the region there are cases of traditional data centers being tagged as cloud centers. There is talk of the distinction between the public cloud, private cloud etc. Of the public cloud, you will notice a lack of interfaces, applications, middleware etc.

For a customer looking at cloud solutions as options, he needs to address the solutions requirement firstly. This should look and take into account the size of the market segment he is in, the volume of customer data transacted daily, real time application needs, based on which he can choose to put the data in the public cloud. Once the choice is to use a public cloud, the next instance is to identify third party cloud service providers who is providing that kind of service for that particular industry and for that volume of data transaction.

In a second possible customer scenario, when the data transacted is not that big then the customer

chooses the private cloud option.

And of course, what we hear of customer concerns include worries about regulatory frame works, the best practices, legalities, security, scalability, availability etc. Of the public cloud deployments, nature of concerns include as to what legal contracts need to be signed, what are the penalties to be applied if there are any failures and downtime on the cloud availability etc.

As I see, confidence is still weak in the market and the adoption rate is not very encouraging. Before the recession started, vendors were talking a lot about cloud computing already which was encouraging for the Systems integrators and service providers who got into this business model. At Seven Seas we created our own data center, trying to provide messaging services in a cloud environment. We were able to sell the solutions to more than hundred users. When the recession came, everything fell quiet. In the three years of recession the Technology never stopped evolving but the missing component has been the availability of applications.

JamesLyne,Director of Technology Strategy, Sophos:I completely agree that cloud is still understood or discussed as a vague term that encompasses different technologies and different commercial models and that the generalization makes it very hard

Page 22: The Integrator

The Integrator | February 201222

We weren’t really calling it cloud which is the new term to call it but, we had technology in our end points that enabled them to connect back to Sophos and look up additional data from a real time cloud. We have got over 150 million end-points constantly fueling this information in the backend, giving us intelligence and that loop has been critical to enable us to drive our technology to deal with the latest malicious code and make sensible decisions. It’s an example of software being a service using the cloud. I would suggest it is easier to take these products to market if we remove the term Cloud.

Further, there is still a propensity to buy software and hardware among a majority of customers in the traditional way. What we have seen is a massive increase in

the adoption of cloud solutions outside security. Adoption of cloud is rocketing ahead in areas like CRM, where, the cloud solution is close to being the default preference for customers. The shift is starting to occur and more customers want delivery of products by this mechanism.

Our solutions get delivered via virtual machine appliances which can be adopted in virtual data centers or the cloud. We have restructured our commercial model to incorporate more elements of a cloud based pricing structure. We have enabled our channel partners to deliver our technology.

FlorianMalecki,Senior Product Marketing Manager,EMEA, Sonicwall:The cloud is not new and we have heard about it quite a lot for years now. Within our organization, we have seen the benefits of moving stuff to cloud, whether public, hybrid or private. Security is a major topic when we talk about the cloud. For Cloud providers what matter is that he still needs to secure the service to all users whatever be the number at a certain instance. This means that the cloud providers should be ready to handle any number of users, rather than looking at securing maybe 100 users or 1 million users as a target. As a vendor we have been delivering cloud based security products for quite sometime and have been adding additional security services too. Especially

in the SMB space, we have had requests to have cloud based data backup and restore solutions so that data can be restored very quickly if it gets lost. However, adoption rate of cloud is still not so broad.

DominicStorey,Technical Director EMEA, SourceFire:In the old days software services were seen as part of pure computing. Nowadays there is the mystery wrapped around the cloud services.

Many customers want to keep their data internal and the issue of security comes up. Another

for talking of specificities. This is the reason why there is such poor confidence in moving forward on this.

As I understand, there are three areas of cloud deployment scenarios from the vendor point of view.

For a vendor, the first is using the cloud as part of delivering his technology, providing value in the bargain. The second one is protecting the cloud. Since there are lots of cloud services out there, are we as a security vendor able to keep our customer unharmed and safe? Lots of our customers are adopting salesforce.com for instance and several other popular applications. We’ve got to ensure to provide a safe environment for all that data. Finally, as a 100 % channel organization, we want to make sure we are delivering our products for the cloud through our partners.

From product and delivery perspective, we have actually been delivering this from a long time.

Round Table | Cloud Computing

(L to R): James LyneDirector of Technology Strategy, Sophos

Narendra TalrejaDirector, Managed Services, Seven Seas

"For a vendor, the first is using the cloud as part of delivering his technology, providing value in the bargain. The second one is protecting the cloud.

Finally, as a 100 % channel organization, we want to make sure we are delivering our products for

the cloud through our partners."

Page 23: The Integrator

February 2012 | The Integrator 23

question is who is responsible for the SLA?

A cloud solution designed to run alongside the current desktop versions is ideal. Here one can utilize scalability of internet processing and internet storage to actually deliver value service. Once you get into a mass cloud based system, the value can go up with the multiples of number of people attached to it.

How we extract better usage of the facilities that people have at their data center never really depended on the hardware facilities. Thus it was easy for us to completely virtualize the core Source Fire centers. Services like intrusion detection and prevention, end-point detection, user identity detection can be virtualized and dropped into people’s data center, deployed by a MSS (Managed Security Service) provider and can be charged.

When we deal with cloud based products, there is a high sensitivity to ensure where the products are from, especially for clients in critical sectors. Cloud Security is finally the most important service. This is true for big organizations including government departments who want to move their data to the cloud. From a collaborative point of view we need to think how we can federate clouds together. PramodShetty,Product Sales Manager, Saas & Networking, FVC:As a VAD, what we do basically is to bring in emerging technologies. We have seen some opportunities into begin with in cloud computing. Solutions like emails, email security, backup, unified communications etc., can be taken to the market through cloud to the channels and to the end users. The Cloud is a business opportunity to us

and to our partners it means great revenues coming year after year. We have showed our customers the value and savings that they can make when using a cloud before they sign an agreement.

The number of users is just increasing. We came up with a portfolio where partners enjoyed reselling it. 70% of our first 100 customers of email security have Google apps today. We build the confidence that it works. Great companies with 1000-2000 users, which moved to Google apps, say that their information is safe at Google data center than at their own centre as they have the confidence we can take care of their data better. Being a value added distributor, the best advantage is that we are always in touch with the customer and so the feedback which we are getting for years now is that they are quite open to the cloud options. The ease of deployment, management and confidence has increased the customer readiness.

We have been able to build a 40 – 45 strong partner community in the MENA region. When the customer is able to see the cost savings, we win most of the time. We thrived even during the recession time and adapted well to the cloud solutions opportunity. We see pure opportunity in it and an abundance of technologies that work.

In spite of many legal issues and skepticism about the usage of cloud, we have government departments, major enterprises and medium size enterprises using different solutions from our portfolio. In a nutshell, we are having more solutions on cloud and the business I oversee survives only because of the revenues generated from customers of our cloud solutions.

We have internal experts who can help to answer questions on privatization of cloud, provide chain management consultancy, who can talk to customers to convince them on the advantages of moving to cloud solutions. Our approach is different and based more on knowledge sharing and confidence building with enterprise customers.

The adoption rate has increased. We have customers from financial segment, airline industry (RAK airways), couple of ministries etc on Google apps. The selling is all based on convincing the CIOs. We need to follow a top to bottom approach to sell cloud. The top senior guy can move it faster also because an IT manager probably sees a lot of discomfort and insecurities (of losing his job for instance). Channel partners need to educate them.

Moderator:What are the major challenges as you do see it in the rapid deployment of these Technologies? How are they being addressed from your company’s perspective or from the industry’s point of view and what more needs to be done?

Florian MaleckiSenior Product Marketing Manager, EMEA

Sonicwall

Page 24: The Integrator

The Integrator | February 201224

Mahesh (ISIT):People are ready to move some applications into cloud and not all. The selling approach needs to be top to bottom. Adoption is another issue. Security is another major concern. Bandwidth reliability, lack of bandwidth, cost of bandwidth is also of concern especially when you are moving machine critical applications into the cloud.

We are coming up with solutions to make the customer feel comfortable, like making sure that the encryption keys or the key management is executed in-house rather than by cloud providers. We also make sure customers can migrate data from one cloud provider to another without significant interruptions. People are more comfortable with these options and this can help increase the adoption rate steadily.

Narendera (Seven Seas):In a generic way, there is no

custodian of the cloud because it is not a Technology per-se nor is it a standard and we have had challenges convincing the customer. What is important is how it is positioned with the customer. Secondly, if the services are available on the cloud and if it is a public cloud (eg. Google Apps), then the security of the data handled by the application is questioned. These are the challenges we are facing from customers who are hesitanti.

One of the challenges is that since the ME and Gulf is more of expatriate driven markets, there is a fear that if everything is deployed in the cloud, the jobs of IT admin or support staff could get killed.

There are also the concerns of the higher volume of data and size of data on the cloud and the ownership risks from that perspective. Then there are no legal laws to monitor the cloud performance and reliability. Do we have cyber laws or any compliance rules that would monitor the alterations and penalize accordingly? These are the questions on which the customers expect an answer from us. If we don’t have an answer then it is going to take the customer a while to adopt the cloud. In spite of all the above challenges, needless to say that yes, we are all endorsing the cloud phenomenon.

James (Sophos): There are five major challenges to outline to readers that they should carefully consider

of the cloud.

Hype and confusion lingering around cloud will clear overtime as more people adopt these services.

There will be more case studies and references as the technology matures. Secondly, it is the immaturity of the cloud providers that is blocking the adoption of cloud services. There are lots of cases that you can point to cloud provider and say they haven’t been using encryption, haven’t had good security policies etc. Cloud providers have different levels of maturity, and different levels of confidence.

Thirdly, Cloud is not always cheaper. Many people think that moving to the cloud is saving money less expense. Not always. Salesforce might be more expensive than a regular CRM suite but still people buy it because it is better. The assumption that cloud equals cheap is not necessarily the right way to sum up. The cloud gets adopted when it provides better technology and better solutions rather than necessarily saving money. There are scenarios where the price maybe the decisive factor but they are a smaller number of cloud services rather than the majority. Fourthly, ubiquitous connectivity is still missing. The cloud still struggles with the fact that we don’t yet have constant connectivity all the time. Things are improving and 4G networks are rolling out. For some user scenarios, the cloud still doesn’t fit but there are lots where it does.

Finally, the most important one for

Round Table | Cloud Computing

Pramod ShettyProduct Sales Manager,

Saas & Networking, FVC

The assumption that cloud equals cheap is not necessarily the right way to sum up. The cloud gets adopted when it provides better technology and better solutions rather than

necessarily saving money.

Page 25: The Integrator

February 2012 | The Integrator 25

the VAR channel – how do they make money? There are a lot of VARs that make their money not just on margins by selling products from vendors but by adding value to the product. I absolutely believe that there are equal if not more opportunities in the cloud for VARs with the cloud but it is still not very clear.

Florian (Sonicwall): The costs benefits are not necessarily the best with all cloud options and cost should not be the paramount factor of deciding for a cloud solution. One of the challenges for SMBs especially is to be sure what is good for their business. The cloud providers would have a crucial role to play especially in the SMB segment. The cloud gives the SMB the flexibility to pay as you grow which is a distinct advantage.

Availability of good bandwidth could be a major issue. Cost of bandwidth would be an issue as well. In addition, reactivity, scalability and flexibility are all important factors that need to be taken into consideration.

As an appliance vendor, we do deliver cloud services underpinned with the hardware. As the customer demand for virtual applications, virtual hardware and virtual appliances are increasing, we too are moving towards delivering more such solutions. However, the debate is still on about whether virtualization of the firewall is a good idea because that’s the prime gateway to your network from the outside world.

Dominic (SourceFire): Some areas need to be better defined. With whom does the responsibility of the SLA lie? Who takes the ownership of security? The service needs to be secured and that’s where the buck stops. If we were to roll out a cloud solution to a large customer

like a Bank for instance, then they want to be sure that the people managing the cloud solution haven’t been compromised. Wouldn’t the customer want to be sure that the data centre of the cloud provider be secured? Those checks haven’t been validated as of today and needs to be regulated at the earliest.

There could be segments that could never use cloud services; maybe the utility sector clients who cannot afford a failure because some of their cloud applications failed to deliver.

Another issue is liability in terms of the longevity of service. Lot of organizations have to think about how they can make sure they can have a multi-cloud vendor alternative as and when required.

Another issue concerning cloud is software diversity. Without diversity you don’t get innovation. One concern about cloud is that while you can have massive adoption, there could be several alternative applications and then coping with this multi-culture of applications could be an issue as well.

Political factors are also food for thought including politics of geography, politics of human rights etc. Five years from today, you may be buying cloud services from China, India, America or Russia. What if at some point geopolitics goes wrong, would you be in a position to have uninterrupted services especially if your service provider is from a different geography that is in the line of political differences with the country your Business is based in?

The final point I would want to highlight is the reliance of the Internet itself. People say that the Internet is designed to cope with failure well. How true is that really?

Pramod (FVC):One of the earlier challenges was that there not enough opportunities for the channel to make revenues on the cloud opportunities. However that has been changing in the past couple of years, at least with some of the major vendors.

As a distributor, we are seeing the opportunities. 6-7 cloud vendors have changed the way the business is done. They have seen the need to create revenue streams for partners. These vendors don’t want to do deployment services, any pre-sales service etc. on their own and are giving the opportunity to partners. This is value to our resellers. More vendors should be following suit.

Moderator: Thank you Gentlemen for your views. From the discussion, there appear to be a cautious

Dominic StoreyTechnical Director EMEA,

SourceFire

Page 26: The Integrator

The Integrator | February 201226

outlook towards the cloud computing phenomenon as it picks pace. I would request each of you to summaries some of your thoughts.

James (Sophos): My one tip for people adopting cloud services is to adopt it is through a contract. It is about expectation management. If you have a vendor commit to appropriate deliverables, you are still going to need a reasonable level of assurance so that cloud provider is least going to be no worse than you in your environment. But if you are going to a cloud provider and buying a service without making sure about the language of security then you are going to have nasty surprises sometime soon.

Narendra: We discussed several factors but one I would like to point out one of the scenarios that an SI has to face. As an SI, if I was making a sale of 3000 servers in a year, today that number might be down to 800. If I was selling 10 servers to a customer, that number might be down to 2 because I am moving the customer towards virtualization and server consolidation. While the overall revenues go down, the margins might go up a bit because of the value add services that are delivered. There needs to be a balance which is comfortable for the VAR in terms of revenue opportunities.

There are challenges built into the system in the vendor community, the VAR community and even customers to make the journey to the cloud and needs to be accounted for.

Pramod (FVC): At the moment the cloud is ready for partners to innovate and add value to their customers in terms of change management, business process reengineering and customization. Today, there are certifications from major vendors for the engineers, which help charge revenues from customers for the services. It is a choice that the partner has to make. He has to decide to join the bandwagon and be part of the pioneers or be left behind in this.

Iit would be easier to go back to the same set of CIOs who have been ‘cloud ready’ and bought the first apps and try and up-sell to them again. In a typical customer scenario, if there is a core application around which other customized apps have been deployed which are crucial to the Business, maybe the work for the VAR would entail trying to see how the whole apps ecosystem can be reengineered into the cloud environment. Such value-add opportunities can give them the gross profits they are looking for.

Florian: Messaging security applications have been among the earliest cloud services. This is one of the easiest to offer as a cloud service. I am not sure if the same holds true for some other solution areas. This is something that needs to be realized. As I said, virtualization of the firewall maybe

not be ideal for delivery via the cloud.

Mahesh: We have taken a hybrid approach that suits our customers. They may need some applications on

the cloud and not all. They need ease of management from day one. We have come up with a set of tools which includes a service console for automate provisioning within their environment and they can use the same console to manage the cloud if they have applications in the cloud.

Dominic: There are some applications that are easier for moving into the cloud and some which are more challenging. Further, there could be also one risk that customers need to be aware of. They are no longer in the same level of control of their applications that are on the cloud as they are when these are in their own datacenter. If one of the cloud service providers rolls out a new app version and there are shared services on the customer site between that app and other apps, there could be a potential issue of integration unless the customer has control over the instance when the upgrade rollout is happening. As for the opportunity, there is a lot for the integrators, for consultants etc to do the integration.

Moderator:Thank you all for an engaging discussion and some truly insightful comments on a topic which is visibly a game changer for the industry.

Round Table | Cloud Computing

APTEC DISTRIBUTION FZ LLCCALL Aptec at Tel: (+9714) 3697111 Extn: 154/155/147/286/496Fax: (+9714) 369 7110Visit: www.apteconline.comEmail: [email protected]

Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

Intel® Xeon® processorAt the moment the cloud is ready for partners

to innovate and add value to their customers in terms of change management, business process

reengineering and customization. Today, there are certifications from major vendors for the engineers, which help charge revenues from customers for the

services.

Page 27: The Integrator

APTEC DISTRIBUTION FZ LLCCALL Aptec at Tel: (+9714) 3697111 Extn: 154/155/147/286/496Fax: (+9714) 369 7110Visit: www.apteconline.comEmail: [email protected]

Intel, the Intel logo, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation in the U.S. and/or other countries.

Intel® Xeon® processor

Page 28: The Integrator

The Integrator | February 201228

leave IT equipment running all night, consuming power.

How many people leave phone chargers or laptop power adaptors plugged in all the time, even when the device is not using the power source? The answer is a lot!

How many offices have means of switching off networking or networked equipments like wireless Access Points (AP), IP phones or surveillance cameras? Probably one out of a million.

PoE powered devices can be powered on or off remotely, giving far greater control still keeping a high security level that devices like surveillance cameras need. Powering off devices ensures you

Insight | Allied Telesis

“PoE is more than just remote powering”“PoE is more than just remote powering”

Sabbahuddin Khan, Regional Manager at Allied Telesis Middle East, outlines the benefits of PoE for SMEs and argues that PoE is about much more than pushing power through LAN cables.

Believe it or not the IT network has been around for going on 40 years, ably connecting PCs, printers and servers to support businesses in every sector. Over the past decade the network has evolved to deliver so much more, and the introduction of keyless entry systems, video conferencing equipment, IP security cameras and VoIP, to mention but a few, means that the once neglected network is now busier than ever with savvy SMEs maximizing all available bandwidth. To date, most SMEs have powered these often high-

demand devices through traditional means, failing to realize that they can maximize their existing network to run this equipment for them. Power over Ethernet (PoE) makes it possible for SMEs to harness the network to deliver power to these network-based devices.

In fact, PoE can do much more than just feed power down a cable and can bring a number of advantages to small and medium sized companies including cost and power savings, business continuity, improved control and better system backup.

Sabbahuddin KhanRegional Manager

Allied Telesis, Middle East CostsavingsOne of the main benefits of PoE is cost savings; it reduces the time and cost of installing separate power cabling, AC (alternating current) outlets, and wall sockets; it doesn’t require a qualified, and often expensive, electrician to install; and it eliminates the need for a dedicated UPS for individual devices connected to the Ethernet - something most SMEs would consider as an option.

GreencredentialsThe reality is that while business users have good intentions to “go green” and reduce power consumption – whether to truly improve energy efficiency, or motivated by rising energy costs – the fact is, many businesses will

Page 29: The Integrator

February 2012 | The Integrator 29

lose power, leaving the person in charge of IT and systems with a major headache. If the power endpoints are powered through a PoE switch which is plugged into a UPS, this allows for centralized uninterruptible power and ensures power is maintained, protecting the entire system in the case of such an event. UPS is far simpler to achieve using PoE. By feeding UPS protected power to PoE switches IP telephone systems can continue to operate through a power cut having to deploy only a central UPS. Powercontrol When PoE powered equipment hangs, the IT administrator has greater control and can power cycle off/on without so much as leaving their chair. This is easier to administer, minimizes the downtime and means that wherever you are, you can reconnect your equipment to the network.

Even for smaller devices PoE has significant draws over alternatives and Allied Telesis’ AT-6102G PoE splitter enables the remote powering, hence the control, of low voltage equipment. A business user with a number of smaller electronics devices – for example, emergency lights with low wattage – can centrally control UPS powered equipment. This is a non-conventional way to maximize the potential of PoE, which has obvious benefits especially in terms of centralized and even remote control.

NetworkcontrolPoE also enables better control over the network. A small business owner can make power-rationing decisions centrally for all PoE devices by configuring through the switches. In the case of a fully integrated system where PoE is used to

power access points, door entry and intercom systems, SMEs can develop a management system intelligent enough to power down PoE devices while the premises is empty, providing an energy and cost efficient system for a small, cost sensitive business.

With UPS, PoE allows faster and more flexible deployment and enables small businesses to better monitor power consumption.

NoentryPoE even has the ability to control access to your buildings. With PoE+, SMEs can supply power to a door controller for opening and closing of up to three doors.

PoE powered access control systems leverage a business’s existing IT infrastructure, eliminating the need for a local power source. In addition, installation costs are lower and set-up is far quicker.

With standards improving all the time, devices will continue to drain less power while networks will become more and more powerful . We’re not that far off from being able to actually manage and power the entire IT system from servers to user devices as a single entity. That’s great news for small businesses where often people regularly leave their power supplies plugged in draining power even when their laptop battery is fully charged.

PoE is not “the next big thing” – the fact is, it’s available now for businesses of all sizes to take advantage of. PoE will continue to gain momentum as more compatible devices are developed and new applications are found to take advantage of the benefits of PoE but the clever few are already embracing the potential of PoE to improve efficiency and energy management, and ultimately improve their bottom line profits.

only pay for power that you’re actually using.

As well as providing power to VoIP phones for emergency use, a business owner could also power down phones using software controls, not only saving a business energy but also money. A dedicated emergency phone could be allocated, with all other phones powered down when not in use.

EaseofusePoE powered devices require less cabling than AC and therefore are easier to install and replace and more convenient to use. What’s more, using fewer cables gives a “cleaner” look. With a PoE adaptor there is no need for an AC outlet at the location of the endpoint, which offers further cost savings as it eliminates the need for an electrician to install an AC outlet–a decent cost saving for an SME.

PoE also provides easier access to hard-to-reach locations where there is a lack of space for power deployment, such as external walls or interior ceilings. In locations such as this, a business won’t have AC power, but may have devices that require power. PoE eliminates the need for high voltage cabling.

For the larger SME with offices in different parts of Europe for example, PoE is very useful for avoiding the complication with local variances in AC standards, outlets, plugs and reliability. PoE is a standardized approach across a network.

MaintainingUninterruptiblePowerSupply(UPS)With PoE SMEs can do so much more with their UPS than simply ensuring continued power to their server. Take for example an IP phone system. In the event of a power cut, all IP phones plugged into a wall outlet will

Page 30: The Integrator

The Integrator | February 201230

Insight | Interactive Intelligence Middle East

Planning any IT technology upgrade is never easy and if it happens to involve your company's enterprise communications systemIit takes careful upfront planning and an understanding of what's currently available since the last time you did an upgrade.

IP communications systems, based on a soft switch design, are rapidly replacing aging digital PBXs. All-in-One solutions support traditional telephony services and unified communications tools on a single centralized server; full featured contact center services may also be available. Today's customer has the option of fully replacing their existing system or installing a co-located IP soft switch for a gradual

system migration while leveraging the new technology and associated benefits. So how does one make an informed decision when preparing an enterprise communications system upgrade roadmap?

Today'sEnterpriseCommunicationsSystemMost enterprise customers have been migrating their communications systems from traditional digital PBXs to those based on Internet Protocol (IP) communications standards. These IP communications systems support traditional telephony requirements and in addition offer customers a collection of more advanced communications services. While there are several design options available, the one of choice for most of today's customers is referred to as a soft switch based on traditional client/server architecture topology. The advantage of this design is that the adoption of industry standards

permits compatibility between the system and third party applications and that most, if not all, of the hardware equipment is non-proprietary.

In spite of these advantages, many customers chose to upgrade their digital PBX to either an IP-enabled or Hybrid system design. This is done so as to retain a sizable percent of their earlier communications systems investment. The viable option to extend the life of existing systems is to install a co-located soft switch. The customer can then execute a gradual migration of users between the two systems. It may not be an ideal situation, operating two systems, but the cost savings and performance advantages to be gained are likely to outweigh the negatives.

TheBasicsofUnifiedCommunicationsEvren Aker, Pre-Sales Manager,

MappingIPcommunicationsuccessEvren Aker, Pre-Sales Manager, Interactive Intelligence Middle East lays out the migration roadmap for enterprises in the Middle East thinking of making a transition from a traditional PBX system to an IP Communications system

Evren AkerPre-Sales Manager

Interactive Intelligence, Middle East

Page 31: The Integrator

February 2012 | The Integrator 31

hardware equipment which allows flexibility in design choice; option of using PC-based soft phones.

Enhanced system survivability and resiliency (reducing system disasters) based on: a limited number of points of failure compared to traditional PBXs; availability of cost efficient, fully redundant and geo-distributed communications control server options; pooled media services and gateway resources; alternate transmission signaling paths among servers, gateways and endpoints.

Consolidation of multiple networked PBXs by migrating to a centralized data center system design offers numerous benefits including: fewer systems with significant hardware/software savings; easier and more manageable growth and network expansion; centralized, more efficient system administration and management; lower cost integrated voice/data network transmission services; greater user mobility across the network.

TheSystemsUpgradeChecklistIt is recommended that a comprehensive corporate communications strategy be in place well before a customer is ready to replace their aging voice-centric communications systems. This approach must address goals and objectives of the enterprise's overall business strategy and identify how a new system can contribute to such things as: revenue enhancement; cost reduction; competitive positioning; market expansion; improved customer service; and Green initiatives.

Current generation All-in-One communications systems support hundreds of features and functions and it necessary to understand and identify the distinct communications needs of many different system subscriber communities, to avoid a “one size fits all” approach.

Replacinganexistingcommunications system can be traumatic for the majority of customers, because many system subscribers are averse to change. Identifying the current communications issues that can be addressed, corrected or improved by a new communications system will help gain stakeholder support and facilitate the migration process.

An incremental implementation approach across the enterprise network is recommended for purposes of manageability and to avoid too much change at once. Customers with large networks should consider having a mix of new and old communications system platforms for a few years, gradually migrating on a site-by-site basis according to a well defined time line.

Sufficient training services and help desk support must be provided to cover feature operations and system interfaces (desktop telephone instruments, soft phones, mobile clients). Personal one-on-one training may be mandated at the executive level and small group training for system specialist, such as attendants, system administrators, and contact center personnel is also often necessary. Systems upgrades are inevitable and a well thought out strategy can greatly ease the transition process.

Interactive Intelligence Middle East says that one of the many advantages of an IP communications system is the availability of a range of features, functions, and processes collectively referred to as Unified Communications (UC). While many customers believe IP telephony and UC to be one and the same thing, in actuality, UC offerings facilitate and enhance the traditional telephony experience, not replace it. Implementation of IP communication systems provides the necessary framework for UC solutions. Many UC features and applications are enabled by Session Initiation Protocol (SIP), a prominent industry standard for IP communications systems, particularly when customers need to interface to third party solutions.

JustifyinganIPCommunicationsSystemA new IP communications system should be viewed as a business asset, not as an expense item (which many do). And as a business asset it should help reduce existing communications expenses as well as affect how the enterprise operates and competes in the competitive market. Basic justification factors fall into two categories: hard cost savings and enhanced user/business productivity (both real and perceived). The following are a few of the many justification factors for implementing a current generation All-in-One soft switch IP communications system.

Reduced hardware costs owing to: fewer common equipment hardware elements and as a result lower maintenance costs; use of non-proprietary third party

Page 32: The Integrator

The Integrator | February 201232

The AXIS Q60-C PTZ Dome Network Cameras feature integrated active cooling for exceptional and reliable video surveillance in desert environments. The high-speed pan/tilt/zoom cameras, with powerful zoom and resolutions up to HDTV 1080p, operate in heat up to 75 °C (167 °F). With the ability to withstand sandstorms, the easy-to-install and highly compact IP cameras meet the military standard, MIL-STD-810G. The cameras are ideal for use at construction, mining and oil/gas sites, along pipeline installations and for city surveillance.

AXIS Q60-C cameras can operate in 75 °C (167 °F) down to -20 °C (-4 °F), and their advanced climate control system can handle rapid temperature changes to eliminate condensation. The IP66- and NEMA 4X-rated cameras are dust- and waterproof and require no additional housing. The cameras address a range of environmental conditions specified under MIL-STD-810G, including temperature shock, solar radiation and sand.

An AXIS Q60-C camera is connected to a supplied media converter switch that provides two SFP optical fiber optic slots and two RJ-45 connectors, which

New Dell DR4000 Storage Platform with Deduplication and Compression

give installers the flexibility to connect the camera cost-effectively to the network in a daisy chain over long distances

using fiber optic or standard network cables. The media converter switch also enables the camera to connect to external alarm devices via two configurable input/output

ports, and to 12 V power.

The camera models consist of AXIS Q6032-C (with Extended D1 resolution and 35x optical

zoom), AXIS Q6034-C (with HDTV 720p and 18x optical zoom) and AXIS Q6035-C (with HDTV 1080p and 20x optical zoom). The cameras support day and night functionality, wide dynamic range, H.264 and Motion JPEG, automatic guard tour, alarm management and intelligent video capabilities such as auto-tracking, Active Gatekeeper and other video analytic applications from Axis’ partners. They are ONVIF conformant and are supported by AXIS Camera Station video management software and the industry’s largest base of application software through Axis’ Application Development Partner program. AXIS Q60-C cameras will be available for order in March 2012.

Overview&features:Customers continue to augment or replace traditional backup and recovery environments with disk-based solutions for their speed, access and reliability. The DR4000 combines the performance and reliability of disk-based backup with innovative deduplication and compression capabilities from Dell’s Ocarina Networks acquisition. These capabilities eliminate multiple copies of the same data and enable customers to keep more data online longer and readily available in the event of a disaster or data loss event.

By keeping data online for weeks or even months before moving it to archive storage, customers can more easily locate and restore important data, creating new efficiencies and reducing the total cost of ownership for their storage infrastructure.

AXIS Q60-C PTZ Dome Network CameraOverviewandfeatures:

eyetech

Page 33: The Integrator

February 2012 | The Integrator 33

Avaya IP Office 8.0 is the new version of the company’s unified communications (UC) solution for small and mid-size enterprises (SME). The new version introduces a range of advancements for improving collaboration, including a comprehensive set of mobile capabilities that drive better team performance and keep mobile workers connected to

The DR4000 is ideal for small- and medium-sized organisations as well as remote offices of large enterprises in need of a disk-based backup solution that can:

• Eliminate redundant copies of data by decreasing disk capacity requirements up to 15 times• Reduce dependence on tape backup • Reduce bandwidth requirements for data transfer by up to 15 times • Reduce backup storage costs to as low as $0.25/GB list pricing• Reduce the footprint of backup delivering power and cooling savings in the datacentre.

The DR4000, available in 40TB, 81TB or 135TB effective storage capacities in a single appliance, features inline deduplication and compression, deduplicated replication, advanced data protection, and non-disruptive deployment, certified with leading backup software applications.

In addition to excellent data reduction capabilities, the DR4000 reduces storage costs over time through an all-inclusive software licensing model that allows customers to leverage all of the DR4000 current and future product capabilities without incurring additional licensing costs.

Avaya IP office 8.0

their colleagues and customers wherever they go.

The new mobility application for Avaya IP Office 8.0—called one-X Mobile Preferred for IP Office— enables users to access a comprehensive set of unified communications capabilities on Android-compatible devices today,

and on iPhone devices in early 2012.

Avaya’s new one-X Mobile Preferred for

IP Office application builds on the previously-available Essential Mobility solution for IP Office. Essential Mobility extends voice capabilities such as one number access and call control, and is currently supported on Symbian, Windows Mobile and iPhone devices (support for Android and Blackberry devices will be available in first quarter of 2012). Avaya IP Office 8.0 also offers new “serverless” collaboration capabilities delivered through an integrated unified communications module, called the Avaya C110 Unified Communications module. This can eliminate the need for an external server in IP Office implementations, helping to simplify deployment for partners, reduce installation times and decrease equipment costs.

• Full multi-party conference management via mobile device offers the ability to invite, view, mute and drop participants during a conference call.

• Integrated presence enables users to display availability status to co-workers via mobile device , and show specific times of availability.

• Instant Messaging with voice conference capabilities lets workers easily find work colleagues via an integrated corporate directory and begin a text chat. Users can also Instant Message with multiple contacts and do voice conference with all.

• ‘Geopresence’ displays one’s location anywhere in the world, and is ideal for teams in hospitals, hotels or companies.

• Visual Voicemail lets users see all of their business voicemails on their mobile device with date/time information. Users can hear voicemail messages as they are being left in real-time and access a call in progress to converse.

Overviewandfeatures:

Key features of Avaya one-X Mobile Preferred for IP Office include:

Page 34: The Integrator

The Integrator | February 201234

Results from Oracle’s second Next Generation Data Centre Index show that data centres in the Middle East are geared for business growth.

Somekeyresultsfromthesurveyreveal:• Those with “very little” in place has halved from 37 to 17% with other areas all improved• Those with <10% of their IT estate virtualized is significantly down from 52% to 16%.• There has been significant improvement in sustainability planning – also knowledge has improved of data centre energy usage: in Cycle 1 61% either didn’t see or didn’t know their energy usage. In Cycle 2 this is down to 42%.

Significantprogressonconsolidation: • those doing “nothing” about it are down from 37% to 16%, • organizations saying they have seen “no impact” are down from 42 to 16%; those using less space has gone up from 17% to 29%.

Organisations now have better visibilityof future workload requirements: • use of straight line prediction methods is up from 15% to 30%; • ad hoc reaction to demands from the business is down from 33% to 11%

Visibility of workload performance is much improved:• reaction to user complaint down from 40% to 22%, • use of real-world performance testing has increased from 9% to 28%• Respondents stating that there is “little” alignment have dropped from 29% to 16%. Significant improvement in systems availability: • Respondents reporting “rare” or “few” outages have gone up from 37 to 53%.

Failure of IT systems is better handled: • Failures handled with “no impact” are up from 9% to 15%• Failures handled with “no mission-critical impact” are up from 12 > 23%• Instances where “any failure would impact the business” are down from 13 to 3%

Spurred by the rising use of online storage and infrastructure systems to support services like Apple Inc.’s iCloud, cloud servers will enjoy robust prospects in 2012 and then move on to become the fastest-growing segment of the server industry within three years.

Shipments of cloud servers are projected to reach 875,000 units in 2012, up a notable 35 percent from 647,000 in 2011 and nearly double the 460,000 in 2010, according to an IHS iSuppli Compute Platforms topical report from information and analysis provider IHS.High growth rates ranging from 23 to 30 percent are anticipated for each of the next three years until 2015, by which time cloud server shipments will have hit approximately 1.8 million units, as shown in the figure below. The five-year compound annual growth rate for cloud servers beginning in 2010 stands at 31 percent—five times greater than the forecast for the total server market.

Cloud servers also will make up an increasing portion of total server shipments—growing from just a little more than 5 percent of the market in 2010 to more than 15 percent in 2015. Given the massive potential of cloud computing in the years to come, a number of industry players have joined the fray either as hardware or software providers.While traditional server customers such as the enterprise, the banking industry and the government bought server products from either OEMs or value-added resellers (VARs), the server sales channel is evolving into a hybrid model in light of the rising popularity of direct sales by ODMs to their nontraditional end customers. I

Cloud Server Market Set to Double from 2010 to 2012

Middle East businesses are more prepared for data growth

Stats & trends

Worldwide Cloud Server shipment Forecast (Thousands of Units)2,000

1,500

1,000

500

02010 2011 2012 2013 2014 2015

Source: IHS iSuppli Research, January 2012

Page 35: The Integrator

Wave Tech Computers LLCP.O. Box: 3421, Sharjah, Toll Free [email protected], www.wavetechgroup.com

www.aten.com

Page 36: The Integrator

Power Up Your BusinessPower Up Your BusinessYour BusinessYPower Up Your BusinessYour BusinessYPPPPPooooowwwwwer Uper Uper Uper Uper Up YYYYYour Businessour Businessour Businessour Businessour BusinessYour BusinessYour BusinessYour BusinessYYour BusinessYYour BusinessYour BusinessYour Businessour Businessour BusinessYour BusinessYour BusinessYYYour BusinessYour BusinessYour BusinessYYYour BusinessY

More people are looking to D-Link for their business-class infrastructure. In today's competitive business climate, the value in saving money cannot be underestimated. At the same time, your investment in a secure, robust, and reliable network infrastructure cannot be compromised.

D-Link is your new strategy for today's business class environment. With its nearly two decades of experience as an award-winning designer, developer, and manufacturer of networking products, D-Link has emerged as the price/performance leader in the business class networking market.

SMB to Enterprise SwitchingCost-effective Switching Solutions with increased network performance and scalability.

Network StorageNAS and iSCSI SAN Storage Solutions that help you to regain control of data and reduce exposure to data loss.

Wireless and Uni�ed Managed System Unified Wireless N Solutions for a secure, faster and future proofed wireless network.

IP Surveillance Solutions providing increased accessibility, real-time alerts, unlimited storage, secure image distribution, and superior cost benefits.

Network Security Solutions guard your data from malicious attacks and help you control the way you do business.

Value Added ServicesNetwork Solution ConsultationWireless Site SurveysLimited Lifetime Warranty Priority Support

IP Surveillance Cameras & Storage

Network Firewall & Security

www.dlinkmea.com

facebook.com/dlinkmea [email protected]

+971 4 880 9022

er Up

same time, your investment in a secure, robust, and reliable

Yer Up Y

same time, your investment in a secure, robust, and reliable

er Up

same time, your investment in a secure, robust, and reliable

Your BusinessYour BusinessYour BusinessYYour BusinessYour BusinessYour BusinessYour BusinessYour BusinessY


Recommended