value plus quarterly september 2012

Upload: rahulnanda23

Post on 04-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 Value Plus Quarterly September 2012

    1/24

    vpsh

    quarterly

    Bc Nets

    EMC

    Tpp Lte

    HPSymntec

    Csc

    03

    06

    09

    1215

    18

    September 2012presents

    A speciAl publicAtion from red ington gulf VAlue diVision

    Redington Value continues to go from strength to strength

    as a result of great partnerships and a leading portfolio

  • 7/30/2019 Value Plus Quarterly September 2012

    2/24

    SRCOOL33K

    For Pricing and Detailed Product Inormation,

    Contact Tripp Lite Middle East and Arica

    +971.4.887.1633 [email protected]

    In environments with less demanding requirements,

    the award-winning SRXCOOL12K Portable Cooling Unitcontrols hot spots and provides compact,

    maintenance-free cooling at up to 12,000 BTU.

    Efcient, Innovative

    Cooling orData Center NeedsIntroducing Tripp Lites SRCOOL33K

    Energy-Saving, Row-Based AirConditioning Unit

    The harder your data center works, the more it heats up. Tripp Lites

    row-based air conditioning unit provides advanced features that keep

    temperature controlled so your equipment can perform at its peak.

    Noplumberrequiredself-contained unit with built-in condenser

    33,000BTU(9.7kW)ofcoolingpower

    while reducing consumption and

    operating costs up to 33%!

    Outstandingprice/performanceratio

    costsupto38%lessperBTU

    Variable-speedcompressor allows precise cooling adjustmentsno more wasteful, noisy cycling between off and full blast

    DCinvertertechnology limits inrush current to prevent line noise

    and overloads at start up

    Costs38%lessperBTUthantheleadingcompetitor!

  • 7/30/2019 Value Plus Quarterly September 2012

    3/24

    02 Ramkumars Blog

    03 Interview: BarracudaNetworks

    06 Focus: EMC09 Feature: Tripp Lite12 Highlight: HP15 Opinion: Symantec18 Indepth: Cisco

    CoNTENTS03 07

    15

    Dear partner,

    its been six years since

    Redington Gulf extended its

    distribution services to include

    Value Added Services. From a

    struggle to be in the consideration

    set of the channel ecosystem,

    today the Value Division at

    Redington has over 20 vendor

    partnerships trying to deliver a

    variety of technologies to over

    1400 partners in more than 13countries across the Middle East

    from the director:

    and Africa. We continuously

    strive to enable our partners to

    be able to address some of the key

    concerns of IT decision makers

    in the region such as big data

    and analytics, flexible delivery

    platforms, digital marketing and

    social tools. Our Value Added

    Division will continue to engage

    with the channel ecosystem

    through different communication

    platforms by not just fulfilling

    immediate requirements but alsoworking with the channel on

    future opportunities technology

    might bring.

    I hope you enjoy reading this

    edition of The Value Plus Quarterly.

    Yours Sincerely,

    Raj ShankarManaging Director, Redington Gulf

    Ready for complexity - Barracuda Networks Securing results: EMC

    Opinion: Symantec

    Septembe 2012 The ValuePlus Quarterly 1

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    4/24

    Dear Partner,

    The biggest challenge that we seem

    to face as distributors and channel

    partners is how to keep pace with the

    tremendous amount of change that is

    going on with the vendor and technology

    landscape. Which technology and which

    vendor to bet on seems to be the million

    dollar question. On the consumer side,

    the tablet revolution combined with

    smart phones and on the enterprise, the

    cloud transformation is leaving behind

    many traditional players and introducing

    many new entrants into the market. Tenyears back, no one would have thought

    of apple as a phone manufacturer or

    amazon as a major player in the IT

    market!!!

    To keep pace with this change, we

    at Redington Value constantly update

    ourselves in terms of understanding

    the lead indicators and trends in the

    market. Apart from this, we also seekto engage and partner with many of the

    new age principals who are changing the

    dynamics of this market. Internally, from

    a technology stand point, we have our

    pre-sales teams constantly engaging and

    bettering their domain knowledge and

    they in turn are educating the channel.

    We do encourage you to join our partner

    programme, Partner Connect by logging

    on to redingtonvalue.com to be updated

    on the regular online and in-country

    trainings offered by Redington Value.

    In the next few weeks, you will

    hear from us in terms of bringing new

    partnerships on board which will help us

    navigate the ever changing terrain of the

    technology market.

    Thanking you for your continued

    patronage,

    Happy selling,

    Ramkumar B.

    Vice President-Value Division,

    Redington Gulf

    http://ram-valueplus.blogspot.com

    RamkumaRS BLOG

    Keeping pace with change...

    2 The ValuePlus Quarterly Septembe 2012

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    5/24

    BarraCuda NETworkS| inteRview

    Sherif AbdElGawad, Regional Sales Director & GM,

    Middle East and Africa at Barracuda Networksdelves into the details of the recent partnershipbetween Barracuda Networks and Redington.Value aimed at delivering a competitive edge

    rey f cmplexty

    Please tell us a little bit about

    Barracudas operations in the

    MENA region?

    We have been in the region

    for over five years and since

    the beginning of the year

    have revised our strategies to

    focus on expanding the team

    based out of Dubai who focus

    on operations in the larger

    MEA region. Our commitment

    to customers in the region

    has helped us achieve up

    to 30% growth year on year

    across the MENA region with

    customers demanding the

    latest in IT security and data

    protection systems.

    In your opinion, how are IT

    investments in the region evolving

    particularly across the security

    and networking space?

    The strategic initiatives that

    top the list for CIOs in the

    region include enhancing

    operational efficiency,

    enabling cost saving and

    most importantly simplifying

    complex IT infrastructures

    using virtualisation and cloud

    services. Risk management

    and compliance are driving

    demand across the security

    and networking space

    enhanced further by the

    significant interest in

    Septembe 2012 The ValuePlus Quarterly 3

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    6/24

    inteRview | BarraCuda NETworkS

    technologies like cloud and

    virtual isation that requi re

    implementing dynamicsecurity models that offer

    ample protection across

    multiple layers and IT stacks.

    Why did you decide to partner

    with Redington Value?

    Redington provides the

    professional reach that boost

    our ability to deliver solutions

    across the fast evolvingmarkets of the Middle East

    and Africa. We believe that

    Redington will enable and

    scale our business through

    their ability to execute and

    support the channel.

    As a brand how do you differentiate

    your products and solutions?

    Barracuda Networks has donea tremendous job of bringing

    cost-effective, comprehensive

    end-to-end networking

    and security solutions to

    mainstream businesses. With

    the current economic climate

    and consequent restructuring

    of many businesses, there lies

    huge opportunity for cost

    effective solutions like ours.

    Our success is attributed

    to our ability to deliver end-

    to-end, easy-to-use solutions

    that address any network

    issues without unnecessary

    add-ons, maintenance, lengthy

    installations or licensing fees.

    Our simple subscription based

    fee fits the change in business

    eliminating the need to pay per

    user, per session, or per server

    fees. Our partnership with

    Redington, will only further

    enhance our presence across

    the region.

    What do resellers stand to gain

    from this partnership?

    Resellers can leverage

    best in class support

    from a prominent value

    added distributor that

    provides enterprise-class

    services focused on data

    protection, security, and

    network enhancement that

    is reinforced by Barracuda

    Networks commitment to

    its partners. Our product

    and business strategy

    enables partners to adapt

    their own businesses to

    drive revenue and earn a

    significant competitive edge

    through deep product and

    technical expertise.

    How has this partnership fared

    for Barracuda Networks so far?

    Redington has demonstrated

    the commitment which

    gave us the confidence to

    accelerate our partnership to

    the next level by extending

    the partnership to include

    distribution in Africa.

    Customers and resellers

    can now take advantage of a

    certified technical team well

    versed in the deployment

    of our award winning NG

    Firewall, Web Application

    Firewall (WAF), Backup

    Solution, and other award-

    wining security solutions.

    Redington has also

    sponsored two technical

    training sessions for NG

    Firewall and Web Application

    Firewall (WAF) to their

    extended partners in the

    region as part of their Partner

    Enablement program.

    How do you think the IT landscape

    is set to change in the next 12- 18

    months? How will you leverage this

    partnership to tap into these trends?

    Cloud and virtualisation are

    the indisputable major wave

    of disruption in IT. Most

    organisations in the region

    are looking at shifting to IT-

    as-a-Service deployment model

    which necess ita tes a s hif t in

    vendor bus iness mod els t o

    be able to leverage virtual or

    cloud based infrastructures.

    I believe that we are ready

    to cash in on this significant

    opportunity based on our

    comprehensive portfolio of

    solutions covering physical,

    virtual and cloud based

    environments and a strong

    partnership with a leading

    value added distributor in the

    region. I think this is the perfect

    storm to tackle the market with

    valuable cost-effective solution.

    Sherif AbdElGawad, Regional Sales Director and GM, Middle East and Africa at Barracuda Networks

    4 The ValuePlus Quarterly Septembe 2012

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    7/24

  • 7/30/2019 Value Plus Quarterly September 2012

    8/24

    fOcuS |EMC

    Top reasons why customers virtualise their desktopinfrastructures with VSPEX with VMware viewSecng eslts

    6 The ValuePlus Quarterly Septembe 2012

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    9/24

    EMC| fOcuS

    Transform your end-user-computing environment with

    simple, efficient, and flexible

    virtualisation solutions. EMC

    VSPEX end-user computing

    solutions VMware vSphere 5 and

    VMware View provide IT with

    proven flexible architectures

    that improve accessibility,

    centralise management, and

    increase security.

    1SIMPLE CONSOLIDATIONConsolidate your

    end-user-computing

    environment with EMC VSPEX

    Proven Infrastructure for

    VMware View. These Proven

    Infrastructures are built with

    best-in-class technologies that

    allow for flexible, modular and

    fast deployments that deliver

    greater efficiencies.

    2FLEXIBLE REFERENCE

    ARCHITECTURES

    Deploy EMC storage

    architectures with unparalleled

    flexibility. VSPEX enables you

    to combine VMwares industry-

    Septembe 2012 The ValuePlus Quarterly 7

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    10/24

    leading desktop virtualisation

    technologies with your choice

    of servers, and network,

    into a proven infrastructure.

    VSPEX Infrastructure

    ensure predictable levels of

    performance, and eliminate

    the planning, sizing, andconfiguration burden of

    moving from physical

    desktops to virtual desktop

    environment.

    3SIMPLIFY ACCESSSimplify access from

    any device from any

    location with VMware View.

    VSPEX Solutions with VMwareView enables secure remote

    access across multiple devices

    and allows you to effectively

    support bring your own device

    initiatives. This solution allows

    anytime anywhere access

    for users and because this

    solution automates desktop

    management operations, it

    will reduce costs and free upIT so you can do more with the

    same resources.

    4SCALE EASILY

    Easily scale and expand

    your environment

    to deliver predictable high

    performance and high

    availability for 250 up to 2,000

    virtual desktops. VSPEX Proven

    Infrastructures with VMware

    View uses a building-block

    approach that can scale to

    thousands of virtual desktops.

    EMC VNXe and VNX maximise

    your flexibility with scalable

    drive types and configurations.

    In addition, with EMC Avamar

    for backup, youll get the best

    of both worlds IT managed

    backup for virtual desktops

    and the rest of your virtual

    environment - no matter the

    size - combined with end-user

    self-service recoveries. Your IT

    help desk just let out a cheer.

    5SIMPLIFY SECURITY

    Securely support end-user

    mobility by virtualising

    your operating systems, user

    data, and applications in the

    datacenter for simplified

    management and better

    utilisation. VMware Views

    centralised systems enable

    administrators to insulate their

    environments and increase

    security and compliance. For

    end-user backup and recovery,

    EMC Avamar allows for data to

    fOcuS |EMC

    be encrypted both in flight and

    at rest.

    6REDUCE BACKUP STORAGE

    AND BANDWIDTH

    Reduce backup storage

    requirements by 10-30 times

    and get protection of end-user

    data and reduce network usage

    by 99% through EMC Avamar

    global, client-side deduplication.

    7CENTRALLY MANAGE AND

    PROTECT

    Provide complete,

    stateless customised virtual

    desktops that can be deployed

    in minutes with VMware

    View, that simplify access and

    provide faster login times,

    single sign-on support, and

    the ability for end users to

    carry their persona with

    them across non-persistent

    sessions. Easily add and

    provision unified storage from

    VNX with Unisphere, and

    simplify backup managementwith one solution for your

    virtual desktop environment

    and your remaining physical

    environment with EMC

    Avamar and Data Domain.

    8EMC FLASH 1ST

    Improved performance

    with EMCs FLASH 1st

    strategy ensures that you donthave to make concessions for

    cost or performance. EMC FAST

    Cache enables you to boot up

    to 1,000 virtual desktops in just

    7 minutes while using fewer

    drives compared with equivalent

    competitive configurations

    without Flash drives. EMC FAST

    Virtual Provisioning (VP) enables

    automated policy-based tieringof user data ensuring that cold

    or less active data is tiered to NL-

    SAS drives for the lowest total

    cost per GB.

    9SPEED BACKUP AND

    RECOVERYVNX enables

    organisations to build an

    information infrastructure

    that lets you easily scale and

    manage more datamore

    efficientlymaking any

    VMware View deployment a

    success. VNX helps reduce

    data storage requirements

    in your environment by up

    to 50 percent by leveraging

    block compression, thin

    provisioning, and file-level

    deduplication or compression.

    8 The ValuePlus Quarterly Septembe 2012

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    11/24

    TriPP LiTE| featuRe

    Seven steps to increase data centre cooling efficiency

    keepng y clEnergy efficiency in the

    data center used to be an

    afterthought, if it was on the

    radar at all. It made sense at

    the time, says Craig Watkins,

    product manager for rack

    and cooling solutions at Tripp

    Lite. If your data centre felt

    uncomfortably cold, people were

    impressed. It was considered

    a sign that you were doing a

    good job keeping servers from

    overheating. Rack densities were

    lower, electricity was cheaper and

    nobody was paying attention to

    the electric bill.

    Today, data centre

    managers need to keep a

    close eye on energy costs.

    According to the Uptime

    Institutes 2011 Data Centre

    Survey, 97% of respondents

    said reducing energy use was

    either somewhat or very

    important, and 87% said the

    primary motivation was cost

    reduction. An Uptime Institute

    study also found that up to 70%

    of data centre energy use is for

    cooling and air handling, so

    increasing cooling efficiency is

    vital to reducing costs. Start

    with the low-hanging fruit,

    advises Watkins. Youll be

    surprised how much you can

    save with a few simple steps.

    1Implement Hot-Aisle orCold-AisleYou dont need to keep

    your data centre at meat

    locker temperatures, says

    Watkins. Instead, concentrate

    on removing hot air from the

    room before it recirculates.

    Separating hot and cold air is

    the key to cooling efficiency.

    Start by arranging racks in rows

    so the fronts face each other in

    Septembe 2012 The ValuePlus Quarterly 9

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    12/24

    featuRe | TriPP LiTE

    cold aisles and the backs face

    each other in hot aisles. Thatprevents servers from drawing

    in hot air from servers in the

    adjacent row. According to

    studies by TDI Data Centres, hot-

    aisle or cold-aisle configurations

    can reduce energy use up to

    20%. Tripp Lites SmartRack

    enclosures (SR42UB and SR48UB)

    are optimised for hot-aisle or

    cold-aisle.

    2Install Blanking PanelsBlocking off unused

    rack spaces isnt just

    cosmetic, says Watkins. It

    forces cold air through your

    servers and prevents hot air

    from recirculating through

    the enclosure. Tripp Lites 1U

    blanking panels (SR1UPANEL10and SR1UPANEL50) snap into

    place without tools, saving

    significant installation time.

    3Organise Cables

    Tangled cables block

    airflow, says Watkins.

    They prevent efficient cold

    air distribution under raised

    floors and cause heat to buildup inside enclosures. In

    raised-floor environments,

    move cabling to overhead cable

    managers (SRCABLELADDER

    and SRCABLETRAY). Inside

    enclosures, use high-capacity

    cable managers (SRCABLEVRT3,

    SRCABLEDUCTVRT and

    SRCABLERINGVRT) to organise

    patch cables.

    4Replace Inefficient UPS

    Systems

    Removing unnecessary

    heat sources helps cool

    the room, says Watkins.

    Replace traditional on-line

    UPS systems with energy-

    saving SmartOnline models to

    increase efficiency and reduce

    heat output, especially where

    redundant UPS systems operate

    below full capacity.

    5Use Close-Coupled CoolingGartner Group reports

    that close-coupled cooling

    increases efficiency compared

    to traditional perimetre and

    raised floor systems. Close-

    coupled cooling allows you

    to focus cooling where its

    needed most without lowering

    the temperature of the entire

    room, says Watkins. The

    modular nature of close-

    coupled cooling also allows

    data centre managers to

    quickly reconfigure cooling

    to handle new equipment or

    overheating racks.

    Tripp Lites close-coupled

    cooling solutions are

    completely self-contained and

    can be installed by IT staff

    without costly contractors,

    plumbing, piping, special

    ductwork, floor drains, water

    tanks or extra parts. The

    portable SRCOOL12K provides12,000 BTU (3.4 kW) capacity.

    The row-based SRCOOL33K

    has a standard 42U rack form

    factor, provides 33,000 BTU (9.7

    kW) capacity at costs up to 38%

    less per BTU than traditional

    designs. An innovative variable-

    speed, DC-inverter-driven

    compressor prevents disruptive

    inrush current, allows precise

    cooling adjustments and

    dynamically scales output to

    match the application, further

    reducing energy costs.

    6Isolate and Remove Hot Air

    SmartRack thermal

    duct rack enclosures

    (SR42UBTD) route hot air

    through an overhead duct

    to the HVAC or CRAC return

    air stream. They isolate hot

    air so it cant recirculate in

    the room, says Watkins.

    Convection forces hot airup through the duct, like a

    chimney, and positive pressure

    in the room and negative

    pressure in the plenum

    increase airflow. You can also

    add thermal ducts to standard

    SmartRack enclosures with the

    SRTHERMDUCT kit.

    7Solution IntegrationServiceTripp Lites free Solution

    Integration service employs

    experienced project engineers

    to help you determine the ideal

    power and cooling provisioning

    for your data centre and

    deploy an efficient, scalable,

    modular solution. Contact your

    Redington representative for

    more information.

    Combining a hot-aisle or cold-aisle

    configuration with SmartRack thermal

    duct rack enclosures (SR42UBTD) andclose-coupled, row-based air conditioning

    units (SRCOOL33K) creates a highly

    efficient data centre cooling solution.

    10 The ValuePlus Quarterly Septembe 2012

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    13/24

    Add redefined

    the data centerto your resume.HP ProLiant Gen8 servers. So intelligent, theyll transform

    your expectations of the data center.The next generation of HP ProLiant servers with HP ProActive Insight architecture

    brings over 150 groundbreaking design innovations* that will reshape how you meet

    demanding service level agreements and boost performance in your data center.

    With 6X increased performance*, 3X improved admin productivity*, and increased

    uptime*, you can turn IT innovation into business acceleration.

    The power of HP Converged Infrastructure is here.

    Watch a new Computerworldvideo about HP ProLiant Gen8 servers athp.com/go/proliantgen8_redefine

    *For details on claim substantiations, visit hp.com/go/proliantgen8_redefine

    Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warrantystatements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

    HP ProLiant DL360p Gen8 servers and HP ProLiant DL380p Gen8 servers

    powered by the Intel Xeon processor E5-2600 series

  • 7/30/2019 Value Plus Quarterly September 2012

    14/24

    hiGhLiGht | HP

    HP has recently announced it

    is expanding its HP Converged

    Cloud portfolio with new

    solutions for VMware vCloud

    Suite 5.1, enabling clientsto transform traditional

    virtualisation deployments into

    open private and hybrid cloud

    environments with less risk and

    complexity.

    Introduced in April, HP

    Converged Cloud extends

    the power of the cloud across

    infrastructure, applications and

    information to provide clientswith choice, confidence and

    consistency. As the industrys

    first strategy and portfolio based

    on a single open architecture,

    HP Converged Cloud enables the

    integration of any combination

    of private, managed and public

    cloud, as well as traditional

    IT. This combination provides

    workload portability as well as

    dynamic scaling.

    HP has helped more than

    1,000 clients transition

    from virtualisation to cloud

    computing with solutions

    engineered by HP and its

    partners. The expanded HP

    Converged Cloud portfolio,

    built on HP Converged

    Infrastructure and HP

    Converged Management and

    Security, has been optimised for

    VMware vCloud Suite 5.1, and

    includes new capabilities that

    enable clients to:

    Reduce complexity andaccelerate building and

    managing cloud with

    preintegrated solutions.

    Fast-track cloud adoption with

    comprehensive security and

    compliance controls that can

    be automatically applied to

    virtual machines.

    Decrease the risk of data loss

    with automated policy-baseddata protection.

    As organisations move from

    a virtualised environment to a

    private or hybrid cloud, they

    may face significant challenges

    with security, performance and

    the management of multiple,

    heterogeneous computing

    models, said Eyad Shihabi, MD,

    HP Middle East. Extending

    HP Converged Cloud with

    comprehensive, integrated

    solutions for VMware vCloud

    Suite 5.1 enables clients

    to embrace secure cloud

    computing with less risk and

    greater choice.

    With VMware vCloud

    Suite 5.1, organisations will

    have reliable, flexible cloud

    solutions that enhance business

    agility while also addressing

    individual enterprise needs

    quickly and efficiently, said

    Raghu Raghuram, ExecutiveVP, Cloud Infrastructure

    and Management, VMware.

    VMware vCloud Suite 5.1 and

    HP Converged Cloud solutions

    will enable our joint customers

    to accelerate their journey to

    the cloud, giving enterprises a

    proven, integrated solution that

    provides a competitive edge in a

    rapidly evolving market.

    HP accelerates cloud transformation,

    management with new capabilities

    The expanded HP Converged

    Cloud offerings include the

    integration of VMware vCloud

    Suite 5.1 with HP CloudSystem,

    helping clients rapidly

    transform virtualised resources

    into self-service private and

    hybrid cloud environments.

    To accelerate time to value, HP

    offers customers preintegrated

    cloud solutions.

    Combined with VMware

    vCloud Suite 5.1, HP

    CloudSystem doubles virtual-

    machine density, reduces

    network complexity and

    provides flexibility to support

    any workload.

    New HP CloudSystem

    capabilities integrated with

    the VMware vCloud Suite 5.1

    include:

    HP CloudSystem optimised for

    VMwareprovides faster time

    to revenue with preintegrated

    solutions that include HP

    Converged Infrastructure and

    cloud management from HP

    and VMware.

    Auto-flexing featurereduces

    response time to business

    requests and improves overall

    service levels by enabling

    New solutions enable VMware users to rapidly build, secure and protecthybrid cloud environments

    HP Expns CnvegeCl Ptfl thoptmse Sltns f

    VMe vCl Ste

    12 The ValuePlus Quarterly Septembe 2012

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    15/24

    VMware administrators

    to provision hardware for

    vCloud Director to automate

    the scaling of convergedinfrastructure. With this

    technology, customers can

    cut the time required to add a

    virtual host from four hours

    to 15 minutes.

    Virtual-machine importing

    simplifies clients path to the

    cloud by easily importing

    running virtual machines into

    an HP CloudSystem without

    downtime or reconfiguration.

    HP Cloud Maps for

    VMwareaccelerates the

    design of cloud services and

    automates the deploymentof virtual applications using

    prepackaged, optimised HP

    CloudSystem templates.

    New HP security solutions help

    overcome barriers to cloud adoptionThe expanded HP Converged

    Cloud portfolio also includes the

    HP Cloud Protection Program

    and Consulting Services, which

    delivers a comprehensive

    security solution across network,

    storage and server virtualisation

    layers that can be designed

    and implemented in less thanthree weeks. The new service

    identifies an effective mix of

    HP and VMware cloud-security

    capabilities that addresses

    common barriers to the

    adoption of cloud services, while

    enabling compliance controls.

    Management capabilities

    include cloud, virtualisation

    of the network, and storage

    virtualisation layers.

    For VMware clients

    challenged with addressing the

    Payment Card Industry (PCI)Data Security Standard (DSS)

    in virtual environments, HP

    also offers the industrys first

    converged PCI Compliance

    Security Solution Stack for

    virtual and cloud environments.

    The solution accelerates the

    path to compliance covering a

    majority of 200 security-based

    PCI DSS controls, removingsecurity hurdles associated with

    achieving PCI compliance and

    access to cloud.

    New enterprise-class data-

    protection solution extends support

    to the virtual cloud

    HP Data Protector, the

    industrys first and only

    backup and recovery solutionsupporting federated

    deduplication for the

    enterprise, now delivers

    integrated protection for

    VMware vCloud Director.

    This new solution features

    patented HP StoreOnce

    deduplication technology, and

    dynamically provides one-touch

    policy-based protection forVMwares multitenant cloud

    environment. These capabilities

    help vCloud customers and

    service providers eliminate

    the risk of data loss from

    applications, both on premises

    and now in the virtual cloud.

    Availability

    Select expanded HP ConvergedCloud solutions are available

    through HP and its worldwide

    channel partners; the

    remaining solutions are

    expected by the end of the

    calendar year. HP also will

    offer all VMware vCloud Suite

    editions with HP Converged

    Cloud solutions through HP

    sales and channel partners in

    late third calendar quarter.

    HP| hiGhLiGht

    Septembe 2012 The ValuePlus Quarterly 13

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    16/24

    Copyright 2012 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, and Norton

    are trademarks or registered trademarks of Symantec Corporation or its afliates in the U.S. and other countries.

    Mobility without vulnerability.

    Devices. Apps. Data.

    SYMaNTEC | OpiniOn

  • 7/30/2019 Value Plus Quarterly September 2012

    17/24

    Mtgtng the rss f BYod thMble applctn Mngement

    Bring-your-own-device (BYOD), is the

    latest technology trend nipping

    at the heels of nearly every CIO

    and CISO. But make no mistake,

    it is more than just a buzzword;

    it is a true movement.

    The concept is simple: Allowemployees to supply their own

    devices, thereby increasing

    employee satisfaction and

    hopefully reducing capital

    and perhaps even operational

    expenditures. Generally,

    and especially for the

    purposes of this article, t he

    device in BYOD refers to

    mobile devices, particularlysmartphones and tablets.

    For all its potential

    benefits, BYOD is without a

    doubt not the right mobile

    strategy for every employee in

    every organization. For that

    matter, BYOD might not be

    the right approach for some

    organisations altogether; the

    benefits might simply not exist

    in certain use cases. Also, BYOD

    SYMaNTEC| OpiniOn

    be an effective BYOD accident

    avoidance technology, it isimportant to acknowledge

    the three primary, high-level

    considerations that must be

    taken into account when it

    comes to enterprise BYOD

    implementations. These

    considerations are:

    To manage or not to manage:

    When it comes to BYOD, the

    first question every enterprisemust ask is: How much

    management of user-owned

    devices connecting to corporate

    resources does the company

    want to be involved in?

    This question is critical

    because the degree to which

    an enterprise is involved in

    managing various aspects of

    user-owned mobile devices hasconsequences. For example,

    a key anticipated benefit of

    implementing BYOD is often

    no longer having to fully

    manage employees mobile

    devices. In return, support

    costs are hopefully reduced.

    However, this aspiration is

    obviously negated by electing

    to completely manage user-owned devices.

    Also, ful ly managing user-

    owned devices often results

    in intruding on the personal

    use of those devices that goes

    beyond the corporate data and

    resources on them. This might

    include enforcing device-level

    authentication and encryption

    policies and complete device

    remote locking or wiping,

    including users personal

    content. When faced with theserealities, users often become

    disgruntled, and this can result

    in additional headaches for IT

    as they deal with pressure from

    upper management and users

    circumventing IT to secretly

    connect to corporate resources.

    Delivering corporate

    resources: Next, how will

    business-related apps andemail access be delivered to

    user-owned devices? After all,

    without providing BYOD users

    with adequate access to such

    apps and corporate resources,

    having a BYOD program loses

    its luster quickly. In fact, there

    is little purpose behind it at all.

    Thus, a delivery mechanism

    for providing corporate appsand resources to BYOD users

    must be put in place. This

    issue might seem simple on

    the surface, but it is actually

    fairly complex. For example,

    considerations must be taken

    around where the apps and

    resources will be hosted and

    how the company will ensure

    only the resources appropriatefor each user based on their

    specific needs and permissions

    are made accessible to them.

    These issues are made simpler

    if user-owned devices are fully

    managed by an enterprise. But

    what if they are not?

    Securing corporate resources

    once they are delivered: Finally,

    how will the corporate apps,

    including email access (and

    By Sheldon Hand, Territory Manager, Africa, Symantec Corporation

    does involve relinquishing at

    least some control over thedevices connecting to corporate

    networks, resources and data.

    As always, there are some

    concerns when relinquishing

    any such control.

    That said, the concerns

    surrounding BYOD are much

    like those involved with driving

    a car. Are there potential

    hazards involved with both?Of course there are, but can

    those hazards be mitigated?

    Absolutely! In both cases,

    preparing for the various

    hazards by being properly

    equipped with appropriate

    protections and tools enables

    one to reap the benefits of

    these activities without getting

    banged up.Proper training, good tires,

    headlights and seat belts are a

    few of the preparations needed

    to operate a vehicle safely.

    Similarly, there are specific

    strategies and technologies that

    can be employed to avoid the

    hazards frequently associated

    with BYOD. Of course, there

    is also always the option toimplement BYOD without

    any accompanying tools and

    protections. However, like

    driving a vehicle off a cliff, the

    hazards will be hard to avoid.

    In particular, mobile

    application management, or

    MAM, presents an intriguing

    option for preparing for and

    avoiding the hazards of BYOD.

    Before analysing how MAM can

    Septembe 2012 The ValuePlus Quarterly 15

    f a, a w a.va@.

    OpiniOn | SYMaNTEC

  • 7/30/2019 Value Plus Quarterly September 2012

    18/24

    especially the potentially

    sensitive data tied to them),

    remain secured once they are

    on user-owned mobile devices

    and what will happen to them

    when employees leave the

    company? This is really the

    million dollar question.

    In reality, providing access

    to business-related apps and

    corporate resources to user-

    owned devices is only the first

    part of the equation, and is in

    fact not the most critical partwhen it comes down to steering

    around the hazards of BYOD.

    The real issue is maintaining

    the security of those resources

    and data while not hindering

    users experience with their

    personal devices.

    Again, this takes us back

    to the first consideration

    how involved a companywants to be in managing user-

    owned devices. If user-owned

    devices are fully managed by

    an enterprise, the apps and

    resources can be made secure,

    but all the issues associated

    with the complete management

    of user-owned devices are

    brought to the surface.

    With these considerations inmind, it should be noted that

    the most common tool used

    to implement secure BYOD up

    to this point in time has been

    mobile device management,

    or MDM, technology. MDM

    certainly has its place in

    enterprise mobility. In fact, it is

    an essential part of a complete

    enterprise mobility strategy.MDM is technically a

    viable method to both deliver

    applications to user-owned

    devices and secure the corporate

    apps and data on them. For

    example, many MDM solutions

    feature corporate app store

    functionality. They also provide

    the ability to push applications

    to managed devices. In

    addition, MDM solutions allow

    OpiniOn | SYMaNTEC

    enterprises to enforce security

    controls on properly prepared

    corporate-connected user-

    owned devices. Thus, MDM does

    address considerations two and

    three above.

    However, using MDM

    to address these BYOD

    considerations meansenterprises are forced to fully

    manage user-owned devices

    because, simply put, that is

    what the technology does.

    Thus, all of the concerns and

    issues associated with complete

    enterprise management of

    user-owned devices are fully set

    in motion.

    This is where MAM comesin. MAM, in contrast to MDM,

    enables enterprises to avoid

    device-level management and

    instead implement application-

    level management on user-

    owned devices. As a result,

    MAM completely negates the

    issues listed above that are

    associated with fully managing

    user-owned devices via MDM.

    At the same time it also

    addresses considerations two

    and three above just as well, if

    not better, than MDM.

    It does this by allowing

    enterprises to wrap each of

    their corporate apps and the

    data tied to them in their own

    security and management layers.

    This gives enterprises completecontrol of their apps and data

    while leaving the rest of the

    user-owned devices they are on

    and also users experiences with

    those devices untouched.

    In other words, with MAM

    controls such as authentication,

    encryption and expiration

    apps and data can be manually

    expired or set to automaticallyremove themselves from devices

    based on perimeters established

    by administrators can all be

    applied to corporate apps and

    other resources on otherwise

    unmanaged, user-owned devices.

    In addition, superior MAM

    solutions provide app portals

    that are tailored to each user

    to deliver the appropriate

    corporate apps to individual

    user-owned devices. In this

    way, the user experience

    of downloading necessary

    corporate resources is as

    simple and streamlined as

    visit ing a public app store, but

    enterprises can ensure that

    users are only being given

    access to the resources theyhave permission to download.

    Remember when air bags

    did not exist? Now it is hard to

    imagine driving a car without

    the safety and protection

    they offer. At the same time,

    the safety mechanisms of an

    airbag-equipped car are built

    in without ever impeding the

    productive use of the car itself,versus a car that has no airbags

    and is thus more risky to use.

    Likewise, implementing BYOD

    without the proper tools is also

    perilous. However, with the

    proper tools MAM being first

    and foremost the secure use

    of user-owned mobile devices in

    enterprises without hindering

    users experiences with those

    devices can be a reality.

    16 The ValuePlus Quarterly Septembe 2012

    f a, a w a.va@.

  • 7/30/2019 Value Plus Quarterly September 2012

    19/24

    in Depth | CiSCo

  • 7/30/2019 Value Plus Quarterly September 2012

    20/24

    The Challenge: Accelerate the

    Virtualisation Journey

    The path to complete IT

    virtualisation with cloud

    computing capabilities

    has three distinct phases,

    each with its own separate

    challenges. Phase one is

    characterised by the challenge

    of identifying a servervirt ualisation solution that

    will r educe costs and operating

    expenses. Phase two focuses on

    the virtualisation of mission-

    critical applications, and the

    main challenges in this phase

    are helping ensure application

    availability and improving

    compliance with service-

    level agreements (SLAs). InPhase three3 the challeng e

    is to deliver business agility

    through increased emphasis

    on end-to-end automation

    and delivery of IT-as-a-

    service (ITaaS). Each of these

    phases can be an obstacle

    that prevents businesses

    from advancing toward a

    virtualisat ion solution.

    The Solution: Proven

    Infrastructure

    As cu st om er s co nt em pl at e

    the transformation of IT,

    they realise that they need

    a complete and modular

    vir tu al isat io n so lu ti on th at

    is prevalidated. The EMC

    VSPE X pl at fo rm pr ov id es

    such a solution. EMCVSPE X ca n ac ce le ra te yo ur

    organisations journey

    through the phases of

    vir tu al isat io n wi th so lu ti on s

    that are designed to scale

    as your business grows.

    Designed to provide a

    simple, efficient, and

    flexible infrastructure,

    EMC VSPEX solutions come

    in a variety of modularconfigurations to meet

    the needs of your business

    no matter whether you

    have just started or are

    already on your way toward

    vir tu al isat io n of yo ur

    infrastructure. EMC VSPEX

    solutions offer architecture

    choices and enable faster

    deployment, greaterefficiency, and lower risk.

    High Performance

    The Cisco Unified Data Center is

    a complete data center solution

    that combines computing,

    networking, security,

    virtual isation, and management

    resources in a framework

    that delivers outstanding

    performance for physical

    and virtualised businessapplications. It is uniquely

    capable of providing he kind of

    simplicity, performance, and

    security that IT departments

    demand as they transition from

    physical to virtual and then to

    cloud environments.

    SCALABLE

    The Cisco Unified ComputingSystem (Cisco UCS) integrates

    in Depth | CiSCo

    SMB ftCisco Unified Data Center and EMC VSPEX Server Virtualisation are the aptsolution for the midsized companies looking to provision agility and scalability.

    18 The ValuePlus Quarterly Septembe 2012

    f a, a w a.va@.

    CiSCo | in Depth

  • 7/30/2019 Value Plus Quarterly September 2012

    21/24

    CiSCo| in Depth

    computing, networking,

    and storage resources to

    provide a unified data centre,

    a complete data center

    solution that combines

    computing, networking,

    security, virtualisation, andmanagement solutions in

    a framework that delivers

    outstanding performances

    for physical and virtualised

    business applications. Cisco

    UCS has been shown to

    reduce infrastructure capital

    expenditures (capex) by 20 to

    40% and operating expenses

    (opex) by up to 40% and can bedeployed more quickly than

    traditional server platforms.

    AGILE INFRASTRUCTURE

    Cisco Unified Fabric, the

    industrys highest-density

    network fabric for data

    centre business applications,

    delivers end-to-end network

    fabric at half the cost of

    competitive systems and

    wit h tw ic e th e scalab il it y of

    any competitive alternative.

    Cisco Unified Management,

    a framework of award-win ni ng so lu ti ons fo r

    IT service creation and

    self-service capabilities,

    enables IT to operate more

    efficiently and to more

    quickly offer new services to

    the business. Cisco solutions

    manage and simplify the

    deployment and operation

    of networking, computing,and applications and cloud

    services in the data centre,

    and they support open,

    third-party integration with

    Ciscos ecosystem of storage,

    vir tual isat ion, ap pl icat ion,

    and management solution

    partners.

    ChallengeDeliver a complete and modular virtualisation solution

    that is prevalidated.

    SolutionThe EMC VSPEX platform accelerates your organisations

    jo ur ne y th ro ug h th e ph as es of vi rt ua li sati on wi th

    solutions that are designed to scale as your business

    grows.

    High PerformanceImplement as combined computing, networking,

    security, virtualisation, and management solution in aframework that delivers outstanding performance for

    physical and virtualised business applications.

    ScalablesThe Cisco Unified Data Center is a complete data centre

    solution that combines computing, networking, security,

    vi rt ua li sati on , an d ma na ge me nt so lu ti on s in a sc al ab le

    framework that delivers outstanding performance for

    physical and virtualised business applications.

    AgileSignificantly reduces infrastructure capital expenditures

    (capex) and operating expenses (opex) with a solution

    that can be deployed nearly 90% more quickly than

    traditional server platforms.

    ESSENTIALS

    VSPEX OFFERINGS FROM CISCO

    AND EMC

    Cisco and EMC are offeringVSPEX solutions built on the

    Cisco Unified Data Center

    infrastructure architecture.

    In combination with EMC

    storage solutions, these

    reference configurations

    enable flexible solutions

    that can easily be scaled,

    optimised for a variety of

    application workloads,configured for virtual

    desktop applications,

    and optimised for mixed

    application workloads andcloud environments. EMC

    VSP EX with Cisco Unified

    Data Center is a validated

    configuration that delivers

    a virtualised data centre in

    a rack composed of leading

    computing, networking,

    storage, and infrastructure

    software components on a

    choice of hypervisors throughjoi nt partners Cisco and EMC.

    Septembe 2012 The ValuePlus Quarterly 19

    f a, a w a.va@.

    ReDinGtOn event

  • 7/30/2019 Value Plus Quarterly September 2012

    22/24

    4 5

    1. emc-prr Rr e Ryd o 6th My

    2.trdmro-fs tr e Jdd o 12th Jne

    3. hpn-prod Oro Rzcrlo, Ryd o 14th Jly

    4. cso-cORe ebl Ssso By

    Globl koldg o 18th Jne G

    5. cso-cORe ebl SssoBy Globl koldg o 21st Jne tz3

    1 2

  • 7/30/2019 Value Plus Quarterly September 2012

    23/24

  • 7/30/2019 Value Plus Quarterly September 2012

    24/24