+ All Categories
Home > Documents > The Value Plus Quarterly- Jan 2013

The Value Plus Quarterly- Jan 2013

Date post: 02-Nov-2014
Category:
Upload: rahulnanda23
View: 48 times
Download: 3 times
Share this document with a friend
Description:
A quarterly publication from Redington Gulf Value Division
24
value plus the QUARTERLY Palo Alto Networks HP EMC Cisco Checkpoint Tripp Lite 03 06 09 12 15 18 January 2013 presents A SPECIAL PUBLICATION FROM REDINGTON GULF VALUE DIVISION Redington Value is geared up to meet surging market needs with new alliances and unmatched channel outreach POWERING AHEAD
Transcript
Page 1: The Value Plus Quarterly- Jan 2013

valueplustheq u a r t e r l y

Palo Alto Networks

HP

EMC

Cisco

Checkpoint

Tripp Lite

03

06

09

12

15

18

January 2013presents

A speciAl publicAtion from redington gulf VAlue diVision

Redington Value is geared up to meet surging market needs with new alliances and unmatched channel outreach

Powering ahead

Page 2: The Value Plus Quarterly- Jan 2013

For more information or to place an order on EMC, please write to [email protected]

Page 3: The Value Plus Quarterly- Jan 2013

ODODBYODBYODYYBB OOOOBYBYODODBYOBYOYOYOOBB

02 Blog

03 Interview: Palo Alto Networks

06 Focus: HP

09 Feature: EMC

12 Highlight: Cisco

15 Opinion: Checkpoint

18 In depth: Tripp Lite

CoNTENTs09 06

11

Dear Partner,

i welcome you to the year 2013! As we enter the new year, the business outlook in emerging markets seem

positive. Although there are concerns of low consumer demand and pockets of expected political risk. From an IT industry perspective, emerging/ innovative products and technology

from the director:

could offer incremental growth for businesses. New forms of competition may be experienced by traditional players within the IT channel with the emergence of newer technologies/ avenues which would result in positive outcomes for the industry in the long-term. At Redington Gulf, we will continue to innovate as a supply chain services company by

introducing newer services to meet the changing needs of the market. Wish you a steady 2013! Yours sincerely,

Raj ShankarManaging Director, Redington Gulf

Accelerate the Virtualisation JourneyBYOD and addressing the penetration of Wi-Fi devices

Delivering IT agility

september 2012 The ValuePlus Quarterly 1

for more information, please write to [email protected]

Page 4: The Value Plus Quarterly- Jan 2013

Dear Partner, The year 2012 has come to a close. The year gone by was no doubt one of the most challenging periods that our industry has seen in a long time. As we enter 2013, we continue to be cautious yet very optimistic of what the new year holds for us. We, at value division, would like to thank you for your continued patronage during this trying period and also

believe we have come a long way in our ability to serve your needs to your utmost satisfaction. The year 2012 also saw us getting recognised for our efforts from four very distinguished vendors – Avaya, Dell Sonicwall, Red Hat and Trend Micro – as the “Best Distributor” across the MEA region. This recognition is a testimony to the fact that partners believe in Redington Value and we are in a position

to serve your needs better in this market place. As we enter 2013, we have listed the following as our most important priorities :

Training and Enablement – We will continue to invest more aggressively in training and enabling our partners on newer technologies and alternative sources of revenue generation. We hope that you are part of our partner community in the “Partner connect” programme (www.redingtonvalue.com) and you are attending our weekly webinars conducted by our presales teams.

Marketing Services – During the course of 2013, we will launch more marketing services, which will help our partners to market themselves better. We are more than welcoming to suggestions and feedback. Please write in to [email protected]

Launch of “Data centre Practice” from Redington value – Very soon, we intend to launch our VSPEX offering in the African markets in conjunction with EMC, Cisco and VMware. Along with this initiative, we

will be launching our “Data centre Practice” in the region, where we will be in a position to consult, help build and deliver data centres – end to end.

Opensource community – We will also be more visible in the market with a whole host of “opensource” offerings in the MEA region. Along with Red Hat, Enterprise DB, Acronis and more newer offerings, we will enable a lot of “opensource” opportunities to the partner community to enable them to differentiate themselves in the market place

Cloud offerings – We will also bring forward knowhow, relationships, consulting, service and to compliment your presence in the “cloud” space. Watch this sapce! I wish all our partners a great 2013 and much brighter prospects of working together and winning together.

Regards, Ramkumar B.Vice-presidentRedington Gulf, Value Division

ramkumar’s BLog

2 The ValuePlus Quarterly september 2012

for more information, please write to [email protected]

A vision to succeed

Page 5: The Value Plus Quarterly- Jan 2013

PALo ALTo NETworks | interview

Next-gen firewall is emerging as the centre of enterprise security. Palo Alto Networks, which defined this category on their own terms, is bringing new innovations to market. Karl Driesen, VP EMEA, Palo Alto Networks, talks about the strategy for growth in the region and opportunities for its channel partners.

Blazing a new trail

Karl Driesen, VP eMea, Palo alTo neTworKs

what kind of opportunities do you see in the Middle east market?This is a very strategic market for us and we are investing heavily here to grow our business. The recent high-profile security breaches in the region have spurred demand for next-generation security technologies and what we offer is a revolutionary technology that is being appreciated by both customers and partners. The market opportunity is on a multiple billions Dollars level per year, which we serve through a 100% channel model. Most firewalls deployed by end users today are based on 15 years plus technology. We believe the current stateful inspection firewalls will become obsolete over the next couple of years and next-generation firewall is the way to go to meet this generation’s network and threat environment.

How do you define nGFws?Palo Alto Networks has pioneered the next generation of network security with its platform that allows enterprises resp. customers to secure their network and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The main principles of the Next-Generation Firewall (NGFW) were developed in 2005 and the first product was launched in 2007.

At the core of our platform is its NGFW, which delivers

visibility and control over application, users, and content within the firewall using a highly optimised hardware and software architecture. This platform offers enterprises the ability to identify, control, and safely enable applications while inspecting all content for all threats in real time. The Palo Alto Networks NGFW platform can address a broad range of network security requirements, ranging from the data centre to the network perimeter to the far edges of the enterprise, which includes branch offices and mobile devices.

There is a common perception that Palo alto products are more expensive. is it because you do everything from ground up on high performance hardware, compared to your competitors who have retro-fitted?To the chagrin of many IT professionals, the industry’s traditional response to new applications and threats has been to add more appliances – each “helping” the firewall with a piece of the network security function. This unsustainable approach has long proven complex and costly, and now appears to be broken – since these firewall helpers either can’t see all of the traffic, rely on the same port- and protocol-based traffic classification that has failed the legacy firewall, or proxy a very limited number of applications (a dozen instead of hundreds or thousands). Given that

January 2013 The ValuePlus Quarterly 3

for more information, please write to [email protected]

Page 6: The Value Plus Quarterly- Jan 2013

interview | PALo ALTo NETworks

enterprises had little choice, most have adopted an array of firewall helpers – resulting in a network security infrastructure that is expensive, difficult to manage, and increasingly ineffective at controlling application or the threats that applications might carry – characteristics proving unacceptable to enterprises today.

what is the difference between nGFw and UTM? are they conceptually the same?As mentioned above, Palo Alto Networks next-generation firewalls enable policy-based visibility and control over applications, users and content using three unique identification technologies: App-ID, User-ID and Content-ID. Due to the fact that the Palo Alto Networks firewall can perform traditional firewall functions, and is also capable of blocking threats and controlling web usage, logical comparisons to Unified Threat Management (UTM) offerings are made. Our firewall is not a UTM. Palo Alto Networks’ next-generation firewalls FIX the problem that is plaguing network security – the inability to identify and control the applications running on enterprise networks. By giving control back to IT in the firewall, many network security band-aids can be removed. The only value proposition a UTM provides is to collapse the traditional (broken) network security infrastructure into a single box as a cost savings mechanism. All in all, UTM solutions are merely attempting to reduce the cost of deployment without addressing the business and security risks presented by the loss of visibility and control over applications, users and

content that IT managers are faced with today.

what is wildFire?It’s a cloud-based malware-detection and analysis service that can detect targeted attacks within 30 minutes. It’s a subscription-based service that allows our customers to monitor zero-day malware attacks and block them.

Modern attackers have increasingly turned to targeted and new unknown variants of malware in order sneak past traditional security solutions. To meet this challenge, Palo Alto Networks has developed WildFire, which provides the ability to identify malicious behaviors in executable files by running them in a virtual environment and observing their behaviors. This enables Palo Alto Networks to identify malware quickly and accurately, even if the particular sample of malware has never been seen in the wild before.

Once a file is determined to be malicious, WildFire automatically generates signatures for both the infecting malware and the resulting command and control traffic. Signatures are delivered with regular security updates to provide automated in-line protection from these highly advanced threats. Your IT team is provided with a wealth of forensics to see exactly who was targeted, the application used in the delivery and any URLs that played a part in the attack.

How do you plan to address virtualisation security?Two months back, we have introduced the first virtualised version our next-gen firewall

which is a server-based software intended to run on VMware platform. Called VM-series, this new software will allow security managers to set up firewall application-layer controls in virtual machines and overcome the limitation that physical firewall appliances face in virtual environments. Though we are entering the virtualised firewall market, it doesn’t mean we will not stop selling physical application-layer firewalls.

In fact, we have recently updated our physical appliance portfolio by new introducing

two NGFWs – the PA 3020 and PA 3050, which respectively deliver 2Gbps and4Gbps of throughput. All of our new products are based on an updated OS, PAN OS 5.0.

How do you plan to tackle competitors and what differentiates your company?By Innovation. Palo Alto Networks was the first manufacturer bringing NGFW technology to market back in 2007. Two years later, Gartner validated that what we did was setting the pace. Since 2011 we are being considered a technology leader by Gartner per their Magic Quadrant of Enterprise Firewalls. Palo Alto Networks is one of the few

companies in this market being dedicated to Network Security and is committed to continue to innovate in a market in which the problems customers have to deal with are very daynamic.

Given the fact that nGFw is a relatively new technology, how do you plan to create awareness among users and also train your channel to sell this technology?We are in contact with our addressable market on a daily basis. The largest organisations we are in contact with directly, mid size and small companies

via our value added resellers. In parallel we have dedicated channel teams and distributors educating our channels on an ongoing basis in line with our NextWave Partner program.

what is your message to the channel community?Palo Alto Networks is one of the most exciting companies in the tech industry today. We have reinvented firewalls and we have bet everything on it. Our motto is very simple - nothing that travels on your network should be invisible to a next-gen firewall. The era of traditional firewalls is very likely to be over and the NGFW market is a long term revenue opportunity with significant profit for the channel community.

“Modern attackers have increasingly turned to targeted and new unknown variants of malware in order sneak past traditional security solutions.”

4 The ValuePlus Quarterly January 2013

for more information, please write to [email protected]

Page 7: The Value Plus Quarterly- Jan 2013

HP ProLiant Gen8 e-Series servers. So smart, you’re finally free to grow your business.

HP ProLiant Gen8 e-Series servers virtually eliminate tedious, manual tasks that consume time and energy better spent innovating for your business. Built on HP ProActive Insight architecture, these servers are a market breakthrough in performance, reliability, and intelligence—ideal for SMBs. So now you can spend your time being extraordinary.

The power of HP Converged Infrastructure is here.

Servers that remove the ordinary so your business can be extraordinary

HP ProLiant DL360e Gen8 serversPowered by the Intel® Xeon® processor E5-2400 series

HP ProLiant DL380e Gen8 servers • Powered by the Intel® Xeon® processor E5-2400 series

HP ProLiant ML350e Gen8 servers • Powered by the Intel® Xeon® processor E5-2400 series

For more information, please write to [email protected]

Page 8: The Value Plus Quarterly- Jan 2013

ODODBYODBYODYYBB OOOOBYBYODODBYOBYOYOYOOBBfocus | HP

Can your wired/wireless network handle the bandwidth and security challenges of BYOD Trends?

From wi-Fi smart phones, iPhones, iPads, tablets, to hand held devices, the demand for Wi-Fi access is growing in enterprise settings. Enterprises are adding improved Wi-Fi capabilities, and some are making wireless LANs the primary or default access technology at the edge of the network. To address these trends, HP Wi-Fi solutions part

BYoD and addressing the penetration of wi-Fi devices

of HP’s FlexCampus solution provide you with improved service level agreements (SLAs) with “wire-like” service delivery that doubles the number of users per access point and provides you up to 50 percent improvement in performance.

Maintaining high-quality wireless sessions for the increasing number of mobile devices that are joining the

network places a tremendous burden on the network. Without the correct infrastructure in place, a wireless LAN network risks an inconsistent user experience that increases operational complexity and creates gaps in access enforcement and security while constraining budgets and adding headcount to support the network.

a secure Unified architecture that simplifies your iT administrationHP FlexNetwork architecture is the industry’s only unified architecture for the data centre, campus, and the branch. It consists of four interrelated modular building blocks FlexFabric, FlexCampus, FlexBranch, and FlexManagement that are based on open standards

6 The ValuePlus Quarterly January 2013

for more information, please write to [email protected]

Page 9: The Value Plus Quarterly- Jan 2013

ODODBYODBYODYYBB OOOOBYBYODODBYOBYOYOYOOBBHP | focus

based on a variety of parameters, including identity, device type, device posture, and even time of day. Access rights can also be enforced based on a particular application or service.

Users can also be granted access to network resources based on their devices’ IP or MAC addresses e.g. printers, IP phones. IDM fully supports the IEEE 802.1X standard for network-access control and also offers a simple guest self-registration portal that leverages HP’s device fingerprinting technology to

and leverage a set of switch virtualisation technologies that allow enterprises to dramatically simplify the design and operations of their data centre, campus, and branch office networks.

FlexCampus, a building block of the FlexNetwork architecture,converges wired and wireless networks to deliver rich-mediaoptimised, secure, identity-based access to business-critical applications and services. The solution delivers a superior user experience, simplifies network engineering and management, and ensures performance and agility at the network edge to meet today’s business-critical IT initiatives.

Enterprises gain a secure and flexible campus LAN infrastructure that delivers voice, video, and other demanding services—whether hosted in corporate data centre or the cloud—to wired or wireless users anywhere on the corporate campus.

The unified network access layer delivers a comprehensive unified LAN/WLAN access solution, with unified management, troubleshooting and network analyses (sFlow), and consistent security, policy enforcement and guest access. It offers a clear advantage over any standalone wired or WLAN-only solution with:• Wired-like wireless

performance, delivering seamless 802.11n mobile worker connectivity and a consistent rich media experience ensured by QoS and identity-based network access using IEEE 802.1X.

• sFlow sampling of wireless traffic and a single pane-of-glass management tool that enables unified network visibility and monitoring of traffic metrics, including wired and wireless network top talkers, top applications, and network connections.

• Intelligent Network Management “Power-Saving” policies for PoE capable switches that can schedule the distribution of voltage to PoE powered devices such as wireless access points for optimum energy savings.

• Unified and consistent RADIUS services, security, policy enforcement and a single pane-of-glass management platform that reduces TCO and simplifies the implementation and maintenance of the unified access layer.

single pane-of-glass management with Unified access and Policy ControlMany wireless LAN vendors sell separate equipment, software and tools for wired and wireless environments, placing extra management, costs, and training burdens on enterprises. HP, by contrast, offers integrated wired and wireless networking solutions with HP Intelligent Management Center (IMC) providing “single pane of glass” wired/wireless device management.

HP IMC, a unified single-point network management solution provides visibility across the entire enterprise, from wired and wireless networks to physical and virtual environments. It aggregates information from

network devices and services to give visibility into the enterprise from the data centre to the network’s edge. At the network edge it provides seamless wired and wireless infrastructure management, user access policies, and traffic analysis across a mixed environment.

IMC’s modular service oriented architecture design allows for the effective integration of traditionally separate management tools, network services, and policy management. This simplifies provisioning

“HP IMC, a unified single-point network management solution provides visibility across the entire enterprise, from wired and wireless networks to physical and virtual environments.”

and maintenance and reduces the need to train personnel on multiple network management platforms, increasing operational efficiency. IMC’s restful APIs further enables federation with other orchestration tools to deliver single-button provisioning.

Enterprises can leverage, HP Identity Driven Manager (IDM), a module to HP unified management solution, to dynamically provision and enforce network security and performance policies based on user, device, location, time, and end-point posture.

Users can be assigned automatically into the appropriate virtual LAN (VLAN)

automatically identify users’ mobile devices. This allows enterprises to support BYOD more quickly while reducing administrative burdens.

Flexibility to choose how you want information to flowThe increase in wireless users and the number of Wi-Fi clients that are being deployed over a wireless LAN, in addition to higher bandwidth applications, have the ability to degrade the overall user experience. HP’s optimised WLAN architecture which is part of the FlexNetwork Architecture, provides customers the choice of either centrally controlling network traffic or distributing network traffic with

January 2013 The ValuePlus Quarterly 7

for more information, please write to [email protected]

Page 10: The Value Plus Quarterly- Jan 2013

intelligent access points at the edge of the network.

This architecture enables customers to choose how they want to address application delivery, whether centralised or distributed, via the same access point. Having the flexibility to distribute network traffic is important especially when using low-latency applications such as voice traffic. The ability to choose the best distribution model is key to network efficiency, for example voice traffic can be processed at the edge of the network, which is faster than competitive architectures that require the traffic to flow back to a centralised controller before being redistributed.

HP set the benchmark for 802.11n performance last year with the launch of the industry’s first three-spatial stream 802.11n dual-radio access points. The HP MSM460 and HP MSM466 dual-radio 802.11n APs deliver near gigabit-speed connect rates to Wi-Fi client devices and offer superior range, density, and coverage. These traits add up to unmatched performance and reliability for today’s BYOD on-the-go workforce. The product family also provides a solid foundation for current and future bandwidth-intensive, delay-sensitive applications while preserving full compatibility with legacy 802.11 clients and existing HP wireless controllers.

HP differentiatorsWith HP FlexNetwork Architecture, enterprises can support BYOD users’ requirements in a way that is scalable, agile,

secure, flexible, and consistent, while reducing TCO.

Key differentiators of HP converged wired and wireless solution:• Single pane-of glass

management delivering end to end network visibility, consistent and unified management of the entire networking portfolio and thousands of third-party devices.

• High-performance dual-radio, three-spatial-stream indoor and outdoor access points and integrated controller blades for HP 5400, 8200, 7500, 10500 switching chassis, offer high availability, redundancy, andscalability.

• Concurrent operation in the 5 GHz band to improve noise immunity (fewer sources of interference) and increase channel availability for higher density/high bandwidth deployments.

• A non-blocking optimised WLAN architecture enables optimal application delivery,

focus | HP

no single point of failure and cost-effective scalability

• Integrated security with consistent security and policy enforcement across the wired and wireless infrastructure. HP Identity Driven Manager (IDM) provides endpoint integrity and wired/wireless network security and performance policies based on user, device, location, time, and endpoint posture, to enable bring your device (BYOD) policies

• Unified network monitoring and troubleshooting (sFlow) for the unified wired/wireless access layer

• Open standards-based implementation

• Wired and Wireless IDS/IPS delivering full-time perimeter scanning and threat mitigation with compliance reporting to meet heightened security requirements for PCI, HIPAA, SOX, and DOD 1800.2 compliance

summaryThe Influx of Wi-Fi client

devices being introduced into the network requires that the networking infrastructure can effectively support, manage and secure these devices on the enterprise network.

For high density enterprise customers HP’s family of three spatial stream MSM460 and 466 access points support more Wi-Fi devices, while providing increased range, performance, and network reliability. HP optimised architecture provides flexible traffic distribution enhancing network scalability and efficiency.

Enterprises can leverage HP suite of intelligent wireless networking solutions as part of a converged wired/wireless campus infrastructure and enjoy a lower operational costs and strong, consistent security. As a leader in mobility offerings, and the largest IT provider in the world, HP is helping customers mitigate the Wi-Fi challenges of today and tomorrow with HP converged FlexNetwork infrastructure.

7

In SummaryThe Influx of Wi-Fi client devices being introduced into the network requires that the networking infrastructure can effectively support, manage and secure these devices on the enterprise network. For high density enterprise customers HP’s family of three spatial stream MSM460 and 466 access points support more Wi-Fi devices, while providing increased range, performance, and network reliability. HP optimized architecture provides flexible traffic distribution enhancing network scalability and efficiency.

Enterprises can leverage HP suite of intelligent wireless networking solutions as part of a converged wired/wireless campus infrastructure and enjoy a lower operational costs and strong, consistent security. As a leader in mobility offerings, and the largest IT provider in the world, HP is helping customers mitigate the Wi-Fi challenges of today and tomorrow with HP converged FlexNetwork infrastructure.

8 The ValuePlus Quarterly January 2013

for more information, please write to [email protected]

Page 11: The Value Plus Quarterly- Jan 2013

EMC | feature

Cisco Unified Data Center and EMC VSPEX server virtualisation solutions for midsized companies

Accelerate the Virtualisation JourneyThe path to complete iT virtualisation with cloud computing capabilities has three three distinct phases, has three distinct phases, each with its own separate challenges. Phase 1 is characterized by the challenge of identifying a server virtualisation solution that will reduce costs and operating expenses. Phase 2 focuses on the virtualisation of mission-critical applications, and the main challenges in this phase are helping ensure application availability and improving compliance with service-level agreements (SLAs). In Phase 3 the challenge is to deliver business

agility through increased emphasis on end-to-end automation and delivery of IT as a service (ITaaS). Each of these phases can be an obstacle that prevents businesses from advancing toward a virtualisation solution.

The solution: Proven infrastructureAs customers contemplate the transformation of IT, they realize that they need a complete and modular virtualisation solution that is prevalidated. The EMC VSPEX platform provides such a solution. EMC VSPEX can accelerate your organisation’s

journey through the phases of virtualisation with solutions that are designed to scale as your business grows. Designed to provide a simple, efficient, and flexible infrastructure, EMC VSPEX solutions come in a variety of modular configurations to meet the needs of your business no matter whether you have just started or are already on your way toward virtualisation of your infrastructure. EMC VSPEX solutions offer architecture choices and enable faster deployment, greater efficiency, and lower risk.

High PerformanceThe Cisco Unified Data Center is a complete data centre solution that combines computing, networking, security, virtualisation, and management resources in a framework that delivers outstanding performance for physical and virtualised business applications. It is uniquely capable of providing the kind of simplicity, performance, and security that IT departments demand as they transition from physical to virtual and then to cloud environments.

January 2013 The ValuePlus Quarterly 9

for more information, please write to [email protected]

Page 12: The Value Plus Quarterly- Jan 2013

feature | EMC

scalableThe Cisco Unified Computing System (Cisco UCS)” integrating computing, networking, and storage resources to provide a unified data centre, is a complete data centre solution that combines computing, networking, security, virtualisation, and management solutions in a framework that delivers outstanding performance for physical and virtualised business applications. “Cisco UCS” has been shown to reduce infrastructure capital expenditures (CapEx) by 20 to 40 percent and operating expenses (OpEx) by up to 40 percent and can be deployed more quickly than traditional server platforms.

agile infrastructureCisco Unified Fabric, the

industry’s highest-density network fabric for data centre business applications, delivers end-to-end network fabric at half the cost of competitive systems and with twice the scalability of any competitive alternative.

Cisco Unified Management, a framework of award-winning solutions for IT service creation and self-service capabilities, enables IT to operate more efficiently and to more quickly offer new services to the business. Cisco solutions manage and simplify the deployment and operation of networking, computing, and applications and cloud services in the data centre, and they support open, third-party integration with Cisco’s ecosystem of storage, virtualisation, application, and management solution partners.

VsPeX offerings from Cisco and eMCCisco and EMC are offering VSPEX solutions built on the Cisco Unified Data Center infrastructure architecture. In combination with EMC storage solutions, these reference configurations enable flexible solutions that can easily be scaled, optimized for a variety of application workloads, configured for virtual desktop applications, and optimized for mixed application workloads and cloud environments.

EMC VSPEX with Cisco Unified Data Center is a validated configuration that delivers a virtualised data centre in a rack composed of leading computing, networking, storage, and infrastructure software components on a choice of hypervisors through joint partners Cisco and EMC.

© 2012 Cisco | EMC. All rights reserved. Page 2

Agile Infrastructure Cisco Unified Fabric, the industry’s highest-density network fabric for data center business applications, delivers end-to-end network fabric at half the cost of competitive systems and with twice the scalability of any competitive alternative.

Cisco Unified Management, a framework of award-winning solutions for IT service creation and self-service capabilities, enables IT to operate more efficiently and to more quickly offer new services to the business. Cisco solutions manage and simplify the deployment and operation of networking, computing, and applications and cloud services in the data center, and they support open, third-party integration with Cisco’s ecosystem of storage, virtualization, application, and management solution partners.

VSPEX Offerings from Cisco and EMC Cisco and EMC are offering VSPEX solutions built on the Cisco Unified Data Center infrastructure architecture. In combination with EMC storage solutions, these reference configurations enable flexible solutions that can easily be scaled, optimized for a variety of application workloads, configured for virtual desktop applications, and optimized for mixed application workloads and cloud environments.

EMC VSPEX with Cisco Unified Data Center is a validated configuration that delivers a virtualized data center in a rack composed of leading computing, networking, storage, and infrastructure software components on a choice of hypervisors through joint partners Cisco and EMC (Figure 1).

Figure 1: Sample VSPEX Solution

For More Information http://www.cisco.com/go/emc

essenTialsChallengeDeliver a complete and modular virtualisation solution that is prevalidated.

solutionThe EMC VSPEX platform accelerates your organisation’s journey through the phases of virtualisation with solutions that are designed to scale as your business grows.

High PerformanceImplement a combined computing, networking,security, virtualisation, and management solution in a framework that delivers outstandingperformance for physical and virtualised businessapplications.

scalableThe Cisco Unified Data Center is a complete datacentre solution that combines computing,networking, security, virtualisation, andmanagement solutions in a scalable frameworkthat delivers outstanding performance for physicaland virtualised business applications.

agileSignificantly reduces infrastructure capital expenditures (CapEx) and operating expenses (OpEx) with a solution that can be deployed nearly 90 percent more quickly than traditional server platforms.

10 The ValuePlus Quarterly January 2013

for more information, please write to [email protected]

Page 13: The Value Plus Quarterly- Jan 2013

as iT organisations shift to providing services through an elastic, self-service, pay-as-you-go cloud-computing model, they still must continue to support applications running in bare-metal and virtualised environments. The problems they face include: • Manual assembly: To

support every step from server refresh to cloud computing, administrators are still burdened with the

time-consuming, error-prone, manual assembly of server, storage, and networking components into infrastructure that supports applications.

• Complex and siloed infrastructure: The infrastructure that results from manual assembly of components is complex and inflexible and does not adapt dynamically to changing workload demands and

business requirements.• Fragmented management:

Traditional systems are configured using a collection of individual management tools on discrete management servers that together do not provide an automated, end-to- end way to configure both rack and blade servers all the way from firmware revisions to I/O connectivity.

• Rack-in-a-box architectures: Most blade systems in

use today incorporate all the supporting network infrastructure and management points that would normally service an entire rack. As the infrastructure is scaled, cost and complexity escalates.

• Multiple switching layers: Typical virtualised environments include hypervisor-based software switches, blade-server-resident switches, and access-

Information technology organisations are in the midst of a major transition. As they move from being cost centres to integrated, strategic parts of the business, IT administrators, managers, and executives are keenly aware of the challenges they face.

Delivering IT agility

CIsCo | highLight

January 2013 The ValuePlus Quarterly 11

for more information, please write to [email protected]

Page 14: The Value Plus Quarterly- Jan 2013

highLight | CIsCo

layer switches, often each one having unique features and management interfaces. Multiple switching layers make network traffic even more difficult to observe, manage, and debug in virtualised environments.

While the pace of most industries has been accelerated through the use of standardised components and automation, traditional environments require numerous administrators rushing to configure new servers to keep up with the scale that virtual environments demand.

Changing the way organisations Do Business The Cisco Unified Computing System (Cisco UCS) changes the way organisations do business through policy-based automation and standardization of IT processes. The industry’s first unified data centre platform, Cisco UCS combines industry-standard x86- architecture blade and rack servers, networking, and enterprise-class management into a single system. The system’s configuration is entirely programmable using unified, model-based management to simplify, and accelerate deployment of enterprise-class applications and services running in bare-metal, virtualised, and cloud-computing environments. A unified I/O infrastructure uses a high-bandwidth, low- latency unified fabric to support networking, storage I/O, and management traffic.

The Cisco Fabric Extender Technology (FEX Technology) directly connects the fabric to servers and virtual machines for increased performance, security, and manageability.

Unified Fabric Cisco UCS is designed with a unified fabric that condenses three network types—IP, storage, and management—into one. This “wire-once” philosophy means that the system is wired only once, when it is installed, with bandwidth allocations and I/O configurations managed dynamically through the system’s embedded management features. Since all servers are physically wired with the same 10 Gigabit Ethernet and Fibre Channel over Ethernet (FCoE) network, they all can host the same workloads simply by changing configurations through software. This “zero-touch” approach increases business agility because connectivity is uniform, and therefore hardware configurations no longer limit the applications that can be supported. The use of a single network technology reduces rack-level infrastructure costs by up to two-thirds by eliminating discrete Fibre Channel, interprocess communication, and management networks.

Transparency with Cisco Virtual interface Cards Inside each server, Cisco virtual interface cards (VICs) can make the unified fabric’s existence completely transparent by presenting both Ethernet

network interface cards (NICs) and Fibre Channel host bus adapters (HBAs) to the host operating system or hypervisor. This approach facilitates the use of existing drivers, management tools, and data centre best practices. The

IT Agility Delivered: Unified Fabric

Active-Active Model with Fabric FailoverInternally, the fabric interconnects support three independent networks through an active-active model that allows available bandwidth to be more fully utilized. Fabric failover supports continuous availability even in the event of a single fabric interconnect loss. Externally, the fabric interconnects appear as the system itself. This LAN-safe approach simplifies integration of the system into the data center fabric, in contrast to traditional systems which increase complexity by adding a hierarchy of switches to handle IP, storage, and management networking.

Unified I/O Means Investment ProtectionCisco integrates the unified fabric into Cisco UCS through a modular approach that offers increased investment protection. Customers have already been able to increase the system’s external Fibre Channel connection speed from 4 Gbps to 8 Gbps simply by upgrading a single fabric interconnect component. Today, customers can use the universal ports on Cisco UCS 6200 Series Fabric Extenders to connect any port to 10 Gigabit Ethernet or native Fibre Channel networks or to directly connect to FCoE storage devices—all while achieving up to 160 Gbps of bandwidth per server.

© 2011–2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public information. Page 9

Unified Fabric Yields Massive Infrastructure ReductionTraditional rack and blade server environments use separate infrastructure for IP, storage, and management networks, resulting in a massive number of cables, I/O interfaces, and upstream switch ports to support the servers. Total number of network cables in this example: 138.

Traditional Blade and Rack Servers

Cisco’s unified fabric carries IP, storage, and management traffic over a single infrastructure, reducing cost and complexity while establishing uniform I/O connectivity to each server. Total number of network cables in this example: 60.

Cisco UCS

fabric interconnects can pass storage traffic onto native Fibre Channel SANs and can connect directly to FCoE-capable storage systems.

The standards-based, high-bandwidth, low-latency unified fabric is supported by up to two

12 The ValuePlus Quarterly January 2013

for more information, please write to [email protected]

Page 15: The Value Plus Quarterly- Jan 2013

Cisco fabric interconnects, that provide cut-through switching and lossless handling of FCoE traffic for faithful support of Fibre Channel protocols. The fabric has sufficiently low latency to fully support interprocess communication mechanisms that are essential for applications, including high-performance computing, high-frequency trading applications, and parallel database management systems.

CIsCo | highLight

Cisco FEX Technology helps organisations maintain existing administrator roles as they transition from bare-metal to virtualised to cloud-computing environments.

active-active Model with Fabric Failover Internally, the fabric interconnects support three independent networks through an active-active model that allows available bandwidth to be more fully utilized. Fabric failover supports continuous availability even in the event of a single fabric interconnect loss. Externally, the fabric interconnects appear as the system itself. This LAN-safe approach simplifies integration of the system into the data centre fabric, in contrast to traditional systems which increase complexity by adding a hierarchy of switches to handle IP, storage, and management networking.

Unified i/o Means investment Protection Cisco integrates the

unified fabric into Cisco UCS through a modular approach that offers increased investment protection. Customers have already been able to increase the system’s external Fibre Channel connection speed from 4 Gbps to 8 Gbps simply by upgrading a single fabric interconnect component. Today, customers can use the universal ports on Cisco UCS 6200 Series Fabric Extenders to connect any port to 10 Gigabit Ethernet or

native Fibre Channel networks or to directly connect to FCoE storage devices—all while achieving up to 160 Gbps of bandwidth per server.

Cisco Fabric extender Technology Traditional blade servers replicate all of a typical rack’s components inside each chassis, escalating customer costs. These chassis host six devices: two Ethernet and two Fibre Channel switches plus two management modules. In Cisco UCS, a single pair of fabric extenders bring the management and data plane of the fabric interconnects to the blade chassis or server rack, condensing up to three network layers into one. The entire system becomes a distributed, virtual blade chassis that incorporates a full range of blade and

rack server products able to handle any workload. The integrated system efficiently and consistently manages all network traffic at a single point. Cisco FEX Technology decouples complexity from capacity, enabling Cisco UCS to scale more gracefully and at lower cost.

Directly Connecting network Fabric to servers and Virtual Machines Through Cisco VICs, Cisco FEX Technology brings the network directly to servers and virtual machines using the same technology. These connections terminate in the fabric interconnects as virtual ports that are managed exactly the same way as physical ports. This design combines the performance and management of physical networks with the scalability of virtual networks. Cisco UCS brings exceptional visibility and control over virtual environments, an essential characteristic for scalable, secure, and manageable cloud-computing environments.• Cisco fabric extenders directly

connect fabric interconnect ports to blade and rack servers. These low-cost, low-power-consuming devices pass all management and data traffic to the fabric interconnects for consistent, centralized management. When used in a top-of-rack configuration, Cisco Nexus 2232PP 10GE Fabric Extenders aggregate in-rack cabling so that only a few uplink cables need to be connected when a new rack of servers is rolled into the data centre. Blade

chassis are connected directly to the fabric interconnects with only one set of cables supporting management, IP, and storage networks.

• Cisco VICs directly connect fabric interconnects to hypervisors, operating systems, and virtual machines. Cisco Data Center Virtual Machine Fabric Extender (VM-FEX) technology directly connects fabric interconnect ports to virtual machines without hypervisor intervention. Virtual NICs are attached to virtual machines, and their network profiles remain constant even as virtual machines are moved from server to server to balance workloads, enhancing mobility and security. Passing all traffic through the fabric interconnects results in consistent latency for I/O traffic between virtual machines. Eliminating the need for hypervisor-based switches can increase network throughput by as much as 38 percent, while making more CPU cycles available to deliver greater application performance.

Cisco FEX Technology helps organisations maintain existing administrator roles as they transition from bare-metal to virtualised to cloud-computing environments. Because the network remains always in the domain of network administrators, Cisco FEX Technology eliminates the overlap of server and network administrator roles that often occurs with traditional blade chassis.

January 2013 The ValuePlus Quarterly 13

for more information, please write to [email protected]

Page 16: The Value Plus Quarterly- Jan 2013

Anti-DDos protection

in today’s threat landscape, “Denial of Service (DoS)” attacks are increasing in number, speed and complexity. Denial of Service and Distributed Denial of Service (DDoS) attacks are relatively easy to carry out, and can cause serious damage to companies who rely on web services to operate. Multiple (more than 50) DDoS attack “toolkits” are readily available on the Internet, and an increasing number of attacks are initiated in over 230 countries. DDoS attacks are often profit-driven: in 2011, cyber criminals earned a whopping $12.5 billion dollars. 2012 shows an alarming surge of DDoS threats to the financial services industry. However hacktivisim and political motivations are fast becoming the most popular forum to launch Denial of Service attacks. Anonymous successfully spearheaded numerous attack campaigns against individuals, organisations, governments and countries in retaliation for actions or statements they didn’t agree with.

Many DDoS solutions are deployed by an Internet Service Provider, offering generic

provides dedicated 24/7 support and resources to ensure up-to-the-minute protections.

MUlTi-laYereD ProTeCTions neTworK anD TraFFiC FlooD ProTeCTions Protection against DDoS attacks aimed at networks using: Behavioral Dos—Protects against TCP, UDP, ICMP, IGMP and Fragment DDoS attacks with adaptive behavioral based detection. Dos shield—Protects against known DDoS attack tools with pre-defined and customized filters to block rate-limits per pattern. syn Protection—Blocks SYN-spoofed DoS with SYN rate thresholds per protected servers. Black list—Blocks generic attacks with L3 and L4 source-destination classifications and expiration rules. Connection rate limit—Blocks generic, non-supported protocols (non DNS, HTTP) and application level flood attacks with rate-based thresholds.

aPPliCaTion BaseD Dos/DDos ProTeCTions Protects against more complex

DDoS attacks that misuse application resources with: sYn Protection with web Challenge—Protects against HTTP connection-based DoS attacks with SYN rate threshold per protected server. Behavioral Dns Protections—Block DNS query DoS attacks with DNS adaptive behavioral based detection using DNS footprint blocking rate limits and DNS challenge and response. Behavioral HTTP Protections (The “HTTP Mitigator”)—Blocks HTTP connection-based DoS attacks and upstream HTTP bandwidth attacks with server-based HTTP adaptive behavioral detection, HTTP footprint with web challenge response, 302 redirect and JS challenge actions.

DireCTeD aPPliCaTion Dos/DDos ProTeCTions Repels Dos and DDoS attacks that require special filtering criteria. Flexible filtering definitions search for specific content patterns in each packet. Enables the ability to analyze and block ongoing attacks by defining on-the-fly protections.

protections against network layer attacks. However today’s DDoS attacks have become more sophisticated, launching multiple attacks at networks and applications. Successful DDoS solutions will offer companies the ability to customize their protec¬tions to meet changing security needs, fast response time during an attack, and a choice of deployment options.

oVerView Check Point’s new DDoS Protector keeps businesses running with multi-layered, customizable protections and 12Gbps performance that automatically defends against network flood and application layer attacks for fast response time against today’s sophisticated denial of service attacks. DDoS Protector appliances offer flexible deployment options to easily protect any size business, and integrated security management for real-time traffic analysis and threat management intelligence for advanced protection against DDoS attacks. Check Point also

oPinion | CHECkPoINT

Check Point’s DDoS Protector line of appliances are intended for use in the enterprise networks, and thwart Denial of Service attacks in seconds with customised, multi-layered protection that blocks a wide range of attacks. The new Check Point anti-DDoS line is being offered as seven different appliances in two basic form factors, a two-rack unit and a one-rack unit.

14 The ValuePlus Quarterly January 2013

for more information, please write to [email protected]

Page 17: The Value Plus Quarterly- Jan 2013

KeY FeaTUres • Protects against known

and unknown DDoS attacks

• Defends against both network and application attacks

• Flexible filter engines detect and prevent malicious exploits

• Protects against HTTP attacks

• Protects against bandwidth flood attacks

• Fast, customized signature creation keeps businesses running

KeY BeneFiTs • Protection against

evolving DDoS attacks to minimize business impacts

• Advanced techniques help maintain web services during an attack

• Turn-key appliance works right out of the box

• Integrated with Check Point security management for greater visibility and control

• High-performing DDoS solution with 14Gbps capacity and 12Gpbs throughput

• Multi-layered protection blocks multiple attack types

• Customized protections fit different business sizes and security needs

• Flexible deployment options include on-site installation or through your ISP

©2012 Check Point Software Technologies Ltd. All rights reserved. Classification: [Protected] - All rights reserved | 3

Datasheet: Check Point DDoS Protector

DDoS Protector Model 506 1006 2006 3006 4412 8412 12412

Network Grade Enterprise Datacenter

Performance1

Capacity2 500Mbps 1Gbps 2Gbps 3Gbps 4Gbps 8Gbps 14Gbps

Throughput3 500Mbps 1Gbps 2Gbps 3Gbps 4Gbps 8Gbps 12Gbps

Max Concurrent Sessions 2,000,000 2,000,000 2,000,000 2,000,000 4,000,000 4,000,000 4,000,000

Max DDoS Flood Attack prevention rate (packets per second)

1,000,000 1,000,000 1,000,000 1,000,000 10,000,000 10,000,000 10,000,000

Latency <60 micro seconds

Real-time Signatures Detect and protect against attacks in less than 18 seconds

Inspection Ports

10/100/1000 Copper Ethernet 4 4 4 4 8 8 8

GbE (SFP) 2 2 2 2 4 4 4

10GbE (XFP) - - - - 4 4 4

Management Ports

10/100/1000 Copper Ethernet 2 2 2 2 2 2 2

RS-232 1 1 1 1 1 1 1

Operation Mode

Network Operation Transparent L2 Forwarding

Deployment Modes In-line; span port monitoring; copy port monitoring; local out-of-path; out-of-path mitigation

Tunneling protocols support VLAN Tagging, L2TP, MPLS, GRE, GTP

IPv6 Support IPv6 networks and block IPv6 attacks

Policy Action Block and Report; Report Only

Block Actions Drop packet, reset (source, destination, both), suspend (source, src port, destination, dest port or any combination); Challenge-Response for HTTP and DNS attacks

High Availability

Fail-open / Fail-closeInternal fail-open/fail-close for copper ports;

internal fail-close for SFP ports; optional fail-open for SFP ports 4

Internal fail-open/fail-close for copper ports; internal fail-close for SFP and XFP ports; optional fail-open for SFP and SFP ports 5

SKU CPAP-DP506 CPAP-DP1006 CPAP-DP2006 CPAP-DP3006 CPAP-DP4412 CPAP-DP8412 CPAP-DP12412

SPECIFICATIONS

1 Actual performance figures may change per network configuration, traffic type, etc.2 Capacity is measured as maximum traffic forwarding when no security profiles are configured3 Throughput is measured with behavioral protections and signature protections using eCommerce protection profile4 External fiber fail-open switch with SFP ports is available at additional cost5 External fiber fail-open switches with SFP or XFP ports are available at additional cost

ManaGeMenT DDoS Appliances are integrated with Check Point Security Management, including: smartevent: Unified security event and analysis solution that delivers real-time threat management information to instantly stop threats and block attacks with on-the-fly protections. Move from business view to forensics in just three clicks. smartlog: Advanced log analyzer that delivers proactive security intelligence with split-second search results from any log

field for instant visibility into billions of log records over multiple time periods and domains. smartView Tracker: Comprehensive auditing solution to troubleshoot system and security issues, gather information for legal or audit purposes, and generate reports to analyze network traffic patterns. In the case of an attack or other suspicious network activity, use SmartView Tracker to temporarily or permanently terminate connections from specific IP addresses.

alerTinG SNMP V1, 2C and 3, Log File, Syslog, Email ConFiGUraTion SNMP, V1, 2C, 3, HTTP, HTTPS, SSH, Telnet, SOAP, API, Console (user selectable).

TiMe sYnCHronizaTion Based on Network Time Protocol (NTP).

eXPorT real-TiMe siGnaTUre inForMaTion Northbound XML interface exports behavioral parameters.

CHECkPoINT | oPinion

January 2013 The ValuePlus Quarterly 15

for more information, please write to [email protected]

Page 18: The Value Plus Quarterly- Jan 2013

©2010 Check Point Software Technologies Ltd. All rights reserved. Check Point, the Check Point logo, and Check Point Endpoint Security Full Disk Encryption are trademarks or registered trademarks

of Check Point Software Technologies Ltd. or its affiliates.

Check Point DLP prevents data breaches before they occur

Did I just send that file tothe wrong person?

PREVENTdata loss

EDUCATEusers

ENFORCEdata policies

Have you ever accidentally sent an email to the wrong person or attached a document that wasn’t meant to be shared?

Check Point makes DLP work by combining technology and processes to move businesses from passive detection to

prevention, before data breaches occur.

For more information, write [email protected]

Page 19: The Value Plus Quarterly- Jan 2013

TrIPP LITE | in dePth

Powered up

Tripp Lite PowerVerter APS DC-to-AC inverter/chargers offer reliable alternative power sources for backup, mobile, emergency and remote power applications, Vipin Sharma, VP - Middle East, Turkey, CIS and Africa, Tripp Lite, gives the low down.

what does an inverter/charger do?Inverter/chargers provide mobile power and backup power for generators and other AC power sources. They are especially useful in areas where the utility power grid is unreliable or unavailable.

When an AC source is available, the Inverter/Charger

conditions AC power before passing it to your equipment and simultaneously charges your user-supplied batteries. Built-in battery backup, surge suppression, noise filtering and regulated output voltage protect your equipment, your data and your productivity.

If an AC source is not available (during power failures, at remote sites, while driving or when your generator is turned off), the Inverter/ Charger automatically switches to battery power and your equipment continues to operate without interruption. If an AC source becomes available, the Inverter/Charger automatically switches back to passing AC power to your equipment and recharges your batteries.

Inverter/chargers also provide stable output voltage to protect your equipment and help it perform at its peak. When the AC power source generates voltages too high or too low for safe operation, the Inverter/Charger acts as an intermediary, correcting unsafe voltage levels before AC power reaches your equipment. Models with automatic voltage regulation are able to correct voltages without switching to battery, preserving battery backup runtime and reducing battery wear. Inverter/chargers also correct output frequency, allowing sensitive equipment such as computers and electronics to operate without malfunction.

When Inverter/chargers operate from battery power, the AC output is strictly controlled by a microprocessor to provide your equipment with clean, safe, reliable power at all times.

why should one select an inverter/charger?The primary reason to choose one is to handle peak power requirements. Many tools, appliances and printers require brief bursts of power that

exceed their continuous wattage ratings, either at startup, during use or both. Inverter/chargers temporarily provide extra output power to handle these “peak surge” demands without shutting down. For example, the DoubleBoost feature from Tripp Lite delivers up to 200% output for up to 10 seconds, and the OverPower feature delivers up to 150% output for up to 60 minutes. By providing ample reserve power to support heavy-duty startup and usage demands, Inverter/chargers can support a much wider range of equipment and applications.

Preserving your batteries is another reason. An advanced 3-stage charger recharges your batteries faster than conventional chargers, while protecting batteries against over-charge and over-discharge. A charge conservation setting preserves battery power by automatically shutting off the inverter in the absence of any power demand from connected equipment. When in use, all models operate with high efficiency, extending battery backup runtime. Runtime is also determined by the number and size of user-supplied batteries connected to the inverter/charger. Since you can connect as many batteries as you want, runtime can be tailored to match any application.

Inverter/chargers also offer a cleaner and greener backup power. With no fumes, fuel or excess noise, it is a better option for applications where generators would be hazardous such as indoors or inside a vehicle or too loud such as residential areas or outdoor areas during quiet hours.

ViPin sHarMa, VP - MiDDle easT, TUrKeY, Cis anD aFriCa, TriPP liTe

January 2013 The ValuePlus Quarterly 17

for more information, please write to [email protected]

Page 20: The Value Plus Quarterly- Jan 2013

They’re also ideal for backing up generators with a more reliable source of power for uninterrupted equipment operation.

It is important to note that inverter/chargers consume no fuel as it draws power from your AC source and battery system instead. Generators require frequent, costly trips to the pump. Inverter/ chargers can also store power while your generator is running, allowing you to turn it off to conserve fuel without turning off your equipment.

Further, inverter/chargers produce stable, microprocessor-controlled voltage and frequency to help your equipment perform at its peak. Generators can compromise the reliability of your equipment by producing

Charger. Equipment wattages are often listed on nameplates or in manuals. If your equipment is rated in amps, multiply by the AC voltage to estimate wattage. For example, 1,3 amps × 230 volts = 300 watts.

If your AC source suffers from frequent voltage fluctuations, consider models with automatic voltage regulation (AVR). AVR corrects voltages without draining battery power, preserving runtime and reducing battery wear. AVR is very useful for conditioning generator sources. If you are powering computers, network equipment or other sensitive electronics, consider models with fast transfer times (from AC source to battery) and pure sine wave output for maximum compatibility.

Multiply the DC amps required (from Step 2) by the runtime required—the estimated number of hours you need to operate your equipment before recharging your batteries. Multiply this number by 1,2 to allow for inefficiency. This will give you a rough estimate of how many Amp Hours of battery capacity you need. Keep in mind that runtime varies with load characteristics, temperature, battery condition and other factors.

Then the final step is to estimate battery recharge time. Divide the battery capacity (from Step 3) by the Inverter/Charger’s charger capacity to estimate the time required to recharge your batteries completely.

what can you use inverter/chargers for? It can be used to provide reliable backup power for all business and residential applications. In areas with limited or unreliable access to on-grid power sources, Inverter/chargers store power to be used when the on-grid source is unavailable. They also make irregular utility power and generator output safer for your equipment.

Also, Inverter/chargers function as UPS systems, providing surge suppression, line noise filtering, voltage correction, frequency regulation and battery backup power. They also convert generator output to computer-grade power safe for use with computers, network equipment and other sensitive electronics. Models with faster transfer times and pure sine wave output are ideal for maximum compatibility and system availability.

Inverter/chargers support point-of-sale equipment, ATMs, kiosks and back-office systems, keeping retail locations productive, avoiding lost sales and protecting important data, and provide reliable backup power to security systems,

cameras and alarms, ensuring continued functionality during blackouts and other power problems.

It can be used to provide mobile backup power for vital equipment in ambulances and other emergency and service vehicles, keeping them fully operational in any location.

Renewable Energy is another application as inverter/chargers store power generated by solar panels, wind turbines and other renewable energy systems, ensuring that backup power will be available during non-generational periods such as night time hours.

Inverter/chargers provide reliable battery backup power when generators break down or run out of fuel. They also act as intermediaries, providing surge suppression, line noise filtering, voltage correction and frequency regulation to make generator output safer and more compatible with your equipment.

In the area of telecommunications, inverter/chargers provide reliable backup power for telecommunications equipment in remote GSM network sites, VoIP systems and traditional PBX systems. They also make irregular utility power and generator output safer for your sensitive telecom equipment. Models with faster transfer times and pure sine wave output are ideal for maximum compatibility and system availability.

In remote sites using generators, Inverter/chargers make generator power safer for your equipment and provide reliable backup AC power when generators break down or run out of fuel. In sites using solar panels and other renewable AC sources, Inverter/chargers store power for use at night or during other non-generational periods to keep equipment operating around the clock.

TrIPP LITE | in dePth

Also, Inverter/chargers function as UPs systems, providing surge suppression, line noise filtering, voltage correction, frequency regulation and battery backup power.

overvoltages, frequency variations and surges. Using an Inverter/Charger between the generator and your equipment conditions the generator output to keep your equipment safe.

Less maintenance is another added benefit as inverter/chargers provide years of worry-free operation without requiring maintenance. Generators require frequent maintenance and parts replacement, increasing expense and waste.

what should you keep in mind while choosing inverter/charger? To avoid overloads, the total wattage of connected equipment must be lower than the continuous wattage rating of the Inverter/

How do you go about selecting batteries?Select a battery or battery system that will provide the Inverter/Charger with the correct DC voltage and an Amp-Hour capacity that provides adequate runtime for your application. The first step is to determine total wattage requirement. After finding the wattage ratings of the equipment that you will connect to the Inverter/Charger, add them together. The next step is to determine DC amps required. For this, divide the total wattage required (from Step 1) by the battery system voltage to determine the DC amps required.

The step 3 is to estimate battery amp-hour capacity required.

18 The ValuePlus Quarterly January 2013

for more information, please write to [email protected]

Page 21: The Value Plus Quarterly- Jan 2013

FoCUs on FeaTUresa) aC outlets or Hardwire aC output Terminals Connect the outlets or terminals to your compatible equipment, outlet strip, power distribution unit or electrical panel. B) operating Mode switch Inverter/Charger models have an operating mode switch with three settings: “Auto”, “Charge Only” and “Off”. Inverter models have an On/Off switch. C) Battery level leDs The LEDs indicate the approximate charge level—High/ Medium/Low—of connected batteries. D) operation leDs The LEDs indicate whether the Inverter/Charger is supplying power from an AC source or from

your batteries. They also indicate whether the connected equipment load exceeds the continuous output rating of the Inverter/Charger. e) remote Control Jack Connect the jack to an optional Remote Control Module (model APSRM4, sold separately) to enable remote monitoring and control. F) Battery Conservation Dial The dial sets the load level at which the inverter shuts off to conserve battery power. G) DC input Terminals The terminals connect to your batteries with user-supplied cabling. H) aC inlet or Hardwire Terminals Connect the inlet or terminals to your AC power source to charge connected batteries and pass

conditioned AC power to your equipment when available. i) Configuration DiP switches Use the DIP switches to change the Inverter/Charger’s settings and optimise operation for your application. J) resettable Circuit BreakersK) Durable Polycarbonate or Metal Case l) integrated Mounting Feet/Flanges M) Cooling Fan n) Grounding lug o) automatic Voltage Regulation Select Inverter/Charger models can correct abnormal voltages without draining battery power, making them ideal for supporting equipment powered by generators and other AC sources that experience

frequent voltage fluctuations. P) Pure sine wave ouputSelect Inverter/Charger models include pure sine wave output from battery, making them ideal for supporting the most sensitive electronic equipment, including servers, networking and telecommunications equipment. Q) Fast Transfer Time from aC source to Battery Inverter/Charger models with a fast transfer time (½ cycle) are better for supporting computers and network equipment. The fast transfer time ensures that sensitive electronic equipment loads will not be dropped when switching from the AC source to battery power during a power failure. r) remote Battery Temperature sensor The sensor increases the operational lifespan of your batteries by adjusting the charging level based on battery temperature. s) remote Generator Controller The remote generator controller automatically starts or stops your generator to keep your batteries at an optimal charge level. low Battery alarm (internal, not shown) Automatically detects low battery voltage and shuts down the inverter to prevent battery depletion/damage.overload alarm (internal, not shown) Automatically detects output overloads and shuts down the inverter to prevent damage.

TrIPP LITE | in dePth

7

FEATURE FOCUS F E A T U R E F O C U S F E A T U R E F O C U S F E A T U R E F O C U S F E A T U R E F O C U S F E A T U R E F O C U S

APSX750 Similar Model: APSX1250

K

M

A H

J

IQQ EC D

B

A

NL APSINT2012

K

M

G

I C E D

B

F

J

HALL

N

K

BJ

APSX700HF

G

CDF

M

AH

APSX6048VR Similar Model: APSX3024SW

O

K

PQ

M

IR CS E D

FG

B

M

N

H

A LAPSINT2424

K

L

M

G

I C E D

B

F

JHA

APSINT3636VR

K

LM

G

IOC E

D

B

F

JHA

Model

Continuous Output

Rating (A)

Peak Output

Rating (B)AC

Outlets

Nominal AC Output Voltage/

Frequency

Nominal DC Voltage

(Range)

Nominal AC Input Voltage/

FrequencyAC Input

Connector

Battery Charger Capacity

Transfer Time (AC to Battery) (G)

Unit Dimensions (H x W x D)

Shipping Weight (kg)

PowerVerter APS Inverter/ChargersAPSX700HF 700W 1 400W 1 C13 (C) 230V / 50Hz 12V (10-15V) 230V / 50Hz C14 Inlet (F) 10A ½ cycle 70 x 138 x 323 mm 2,4 kgAPSX750 750W 1 500W 2 C13 (C) 230V / 50Hz 12V (10-15V) 230V / 50Hz C14 Inlet (F) 20A or 5A (E) ½ cycle 178 x 222 x 229 mm 9,1 kgAPSX1250 1 250W 2 500W 2 C13 (C) 230V / 50Hz 12V (10-15V) 230V / 50Hz C14 Inlet (F) 30A or 7,5A (E) ½ cycle 178 x 222 x 229 mm 11,8 kgAPSINT2012 2 000W 4 000W Hardwire 230V / 50Hz 12V (10-15V) 230V / 50Hz Hardwire 60A or 15A (E) 1 cycle 178 x 216 x 356 mm 20,9 kgAPSINT2424 2 400W 4 800W Hardwire 230V / 50Hz 24V (20-30V) 230V / 50Hz Hardwire 30A 1 cycle 184 x 216 x 413 mm 19,1 kgAPSINT3636VR 3 600W 7 200W Hardwire 230V / 50Hz 36V (30-45V) 230V / 50Hz Hardwire 30A 1 cycle 178 x 216 x 356 mm 28,6 kgPowerVerter APS Inverter/Chargers with Pure Sine Wave OutputAPSX3024SW 3 000W 6 000W Hardwire 230V /

50Hz or 60Hz (E)24V (20-30V) 230V /

50Hz or 60Hz (E)Hardwire 90A or 22,5A (E) ½ or 1 cycle (E) 254 x 229 x 318 mm 39,5 kg

APSX6048VR 6 000W 12 000W Hardwire 208V or 230V / 50Hz or 60Hz (E)

48V (42-60V) 208V or 230V / 50Hz or 60Hz (E)

Hardwire 90A or 22,5A (E) ½ or 1 cycle (E) 254 x 229 x 495 mm 56,7 kg

Medical-Grade Inverter/Charger (Complies with IEC 60601-1 and IEC 62040. Includes Isolation Transformer, 90 Amp-Hour Battery Module, Remote, USB Port and Pure Sine Wave Output.)HCRK-INT 300W 300W 1 C13 230V / 50Hz 12V (10-15V) 230V / 50Hz C14 Inlet (F) 12A ¼ cycle 89 x 152 x 292 mm (H)

178 x 216 x 368 mm (I)7,3 kg (H) 30,4 kg (I)

PowerVerter Inverters (Inverters provide mobile AC power derived from your vehicle’s battery. They do not include a battery charger.)PVINT375 375W 600W 1 Universal (D) 230V / 50Hz 12V (10-15V) N/A N/A N/A N/A 51 x 108 x 197 mm 1,1 kgPVX700 700W 1 400W 1 Universal (D) 230V / 50Hz 12V (10-15V) N/A N/A N/A N/A 70 x 126 x 208 mm 2,5 kg

(A) Maximum output power available only when connected batteries are properly charged. (B) Peak output level and duration varies with model, battery condition, charge level, ambient temperature and other factors. Peak output duration for Inverter models is instantaneous. (C) Includes an adapter that converts a C13 outlet to a universal outlet compatible with more than 20 plug types, including most household plugs worldwide. (D) Compatible with more than 20 plug types, including most household plugs worldwide. (E) User-selectable. (F) C14 inlet connects to user-supplied input power cord with a region-specific plug. APSX750 and APSX1250 include a detachable 2-meter C13-to-C14 power cord. (G) 1/2 cycle = 10 milliseconds at 50Hz (nominal). 1 cycle = 20 milliseconds at 50Hz (nominal). (H) Power module. (I) Battery module.

For additional product specifications and the most recent updates, go to www.tripplite.com.

Medical-Grade Inverter/Charger

PowerVerter APS DC-to-AC Inverter/Chargers

HCRK-INT

IEC 60601-1 • IEC 62040

Internal Isolation Transformer

C13 Outlet

PowerAlert Data-Saving Software

User- Replaceable Battery Module

Mounting HardwareKit

Remote User Interface

USB Port

C14 Inlet

Fan

Pure Sine Wave Output Durable Metal Case

Fast Transfer Time

SPECIFICATIONS

online seleCTor GUiDe Find the perfect Inverter/Charger or Inverter for your application! Go to www.tripplite.com/selectors and use Tripp Lite’s dynamic Selector Guide to choose the features you want and see matches instantly!

January 2013 The ValuePlus Quarterly 19

for more information, please write to [email protected]

Page 22: The Value Plus Quarterly- Jan 2013

redington vaLue channeL events

4 5

1. fortinet Launch event in nigeria on 9th october 2012

2. siemens Partner road show in Qatar on 19th December 2012

3. tripp Lite Product road show in al khobar on 28th November 2012

4. emc rush event in ethiopia on 16th october 2012

5. avaya Partner Launch in ghana on 22nd November 20123

1 2

Page 23: The Value Plus Quarterly- Jan 2013

Redington Value is a value-added distributor for the following brands in parts of Middle East and Africa:

Redington Value is an end-to-end value-added distributor in Middle East and Africa. It assists value-added resellers with most optimalIT solutions across technology domains such as Unified Communications, Virtualization and Cloud Computing, Converged Infrastructure,

End-to-end security, Mobility Solutions, Power Solutions, Cabling Solutions, Storage, Back-up and Recovery. They are also supported with in-house pre-sales expertise and regular sales/technical training and programs.

For more information, contact [email protected]

Breathe easy. Partner with Redington Value.

Some recent recognitions:

Dell SonicWallDistributor of the Year 2012

Trend MicroDistributor of the Year 2012

Red HatValue Added Distributor of the Year 2012

AvayaDistributor of the Year 2012

Page 24: The Value Plus Quarterly- Jan 2013

Recommended