I SSUE 21 | OC T 2010
How to Deal with Storage Capacity Crisis Polycom Video Conferencing Established at Daman Branches Boole Server to target Region Security Platform
Unifying proprietary, best-of-breed, military-grade technologies in DLP, RMS, Encryp�on, Secure Messaging & Audi�ng for Compliance The ONLY Military-Grade File Sharing and Encryp�on Pla�orm MAXIMUM SECURITY FOR YOUR SENSITIVE DATA
GITEX STAND ZL-D5 www.booleserver.com info-me@ﬂuxer.net
Polycom Video Conferencing and Rich Media Solutions established across Daman’s major branches in the UAE With the emphasis not only on saving costs but also on reducing travel time, Alpha Data, alongside Polycom’s Value Added Distributor, FVC, has been selected by the National Health Insurance Company – Daman, the region’s premier health insurance company, to implement Polycom’s High Definition video conferencing and rich media solution at its branches in Abu Dhabi, Al Ain and Dubai. Daman’s management considered video conferencing solutions to increase face-to-face meetings among management. The company chose Polycom after an extensive ‘Proof of Concept’ (POC) set up by FVC’s engineers alongside Alpha Data. Daman’s branches are outfitted with the latest technology; and their customers reap the benefits by enjoying speedy processing services. Equipping Daman offices with Polycom’s videoconferencing solution will allow its team to successfully communicate with one another, no matter what time zone they are in. Alpha Data has now installed a total of eleven HDX 4001 XL executive desktop videoconferencing units at Daman for its senior managers, nine HDX 7001 group videoconferencing system for the conference rooms, including five in its Abu Dhabi offices, two in Al Ain and one at its Dubai branch. The company also added Polycom’s CMA, a centralised management system for these videoconferencing systems as well as a CMA Desktop capability for 100 users. This means that more than 100 users within the company can now use CMA desktop software client on their computers, to conduct quality videoconferencing with other colleagues on their desks, or link to the video conferencing systems in conference rooms via a web-cam. In addition, Alpha Data also installed Polycom’s RMX 1000 high performance conference platform, allowing multipoint calls including video and phone calls in the same meeting. Daman has recently crossed the landmark figure of 2 million insured members, and that is the result of its approach to product development, tailored specifically for the health insurance industry in the region, offering different benefit schemes, policy limits, geographical coverage and world class services to customers, both individuals and groups, making it an industry leader.
Communications is key to the success of any industry. Depending on the size of the organisation, enterprises can see as much as 30 percent savings on travel, as well as gains in man hours while reducing carbon footprint. Polycom’s VAD, FVC won an award for saving close to AED 1 million by implementing video conferencing equipment across its branches in the Middle East. Fadi Ramadan, Division Manager- ELV Systems- Multimedia and Security at Alpha Data.
PAGE 3 | ALPHA NEWS | OCT 2010
First phase IT infrastructure completed at Union Railways Full infrastructure completed across four floors
Alpha Data has been awarded the contract to install the IT infrastructure at Union Railways’ new offices located on four floors of Makeen Tower in Abu Dhabi. Phase one covers the tenth floor office. Installation at the new Union Railways’ offices include a raised floor, the setup of a data center, a UPS system, Servers, PC and Laptops, IP telephony and Network Infrastructure, Audio Visual Projection Systems, Access Control Systems and Structured Cabling. Ayman Al Makkawy, Executive Director, Corporate Affair at Union Railways, said, “The work performed by the supplier was according to scope, delivered on time and to our requested standards”.
Riverbed Steelhead and Interceptor Appliances greatly simplifies network set up, while offering a wider choice of high-availability configurations to support the largest and most complex enterprise networks. The appliances scale deployments up to 12 Gbps throughput and 1,000,000 Connections. This enables Union Railways to scale its WAN optimization solutions to support hundreds of thousands of end users across its network, as well as manage very high bandwidth WAN links into its data center.
Mohamed Behery, Division Manager for Project Management Division at Alpha Data, said, “The highlight of the installation is the use of Riverbed’s Steelhead appliances that provide the highest level of WAN performance across the broadest range of applications. One of the key points is its scalability and its ability to allow clusters of up to 25 Steelhead appliances to work together seamlessly, making it perfect for data centres.”
PAGE 4 | ALPHA NEWS | OCT 2010
Built to international standards, Union Railway’s state of the art network will enable the rapid transport of passengers and freight, opening up new trade corridors and journey opportunities. Once complete, it will redefine logistics and transport in the region, providing as a safe, efficient, sustainable network that links all corners of the UAE, and eventually, the UAE to the wider GCC.
Boole Server to target regions security platform and audit capabilities We are pleased to announce our partnership with Boole Server to provide enterprise customers with secure storage and access to data along with full auditing capabilities. Boole Server is a security platform designed to protect against unauthorized viewing, manipulation or distribution of data. It is the result of extensive study into the vulnerabilities of security systems. “In a region like the Middle East that is rapidly expanding its infrastructure, enterprise networks have expanded traditional security to ensure that there are fully fledged policies in place including complete audits of vulnerabilities. We are pleased to partner with Boole Server to bring their unique security platform to our customers to ensure that their data is protected”, said Fayez Ibbini. “Boole Server, which provides companies a secure way to store, share, access and communicate data securely using military grade encryption, both within their network and beyond, is rapidly becoming a global force,” said Avinash Advani, Director at Fluxer ME. “Alpha Data has a strong presence in UAE’s enterprise segment and we are looking forward to developing a high-level client base with them comparable to the one we have in Europe, which features government entities and blue-chip companies of the highest reputation.” Alpha Data will offer Boole’s complete range of products and solutions, supported by their in-house expertise.
Special round table on Cura Governance, Risk and Compliance at the Emirates Palace Alpha Data recently teamed up with Cura to host a special round table on governance, risk and compliance (GRC) in Abu Dhabi. The event, attended by select enterprises, was supported by Cura Software Solutions, South Africa’s largest GRC software provider and regarded as one of five global leaders in Enterprise Risk Management (ERM) by Forrester and Gartner. “As the UAE’s public and enterprise sectors take a closer look at their networks and procedures in line with global standards and best practices, it becomes necessary for senior management to keep track of these changes. We are very pleased to partner with Cura and provide a solution that can now monitor and ensure compliance, efficiently”, said Fayez Ibbini.
PAGE 5 | ALPHA NEWS | OCT 2010
Cura Software Solutions will leverage Alpha Data’s extensive knowledge of up-to-the minute UAE legislation and its interpretation of GRC regulations to help enterprises keep on track with its ERM offerings. Karl Campbell, Cura Software’s Vice President, added, “Alpha Data’s local knowledge and experience are vital for the localisation of Cura’s Enterprise Risk Management solution; ensuring best of class fit and ROI for our customers”.
Critical monitoring services launched through a new Networks Operation Center ‘Do more with less’ has long been the mantra of many corporate departments and with the recent economic crisis; in no place is this better evidenced than in the IT and other internal services departments. Old-model ‘reactive’ service delivery models have become ineffective in delivering consistent up-time for clients. Organizations are looking for a more proactive way of managing their IT system availability, services and budget. As a result, company management teams have turned to outsourcing to enable organizations to focus on their core business, switch expenditure from a variable to fixed cost base and provide access to specific new technical skills. We take a look at the Managed Services Model and the advantages that make it a popular choice among organizations today. 1. There is a lot of focus upon Managed Services these days. What is the 'Managed Services' model and why is it so important today? Managed services is becoming an area that network operators are rapidly exploring given the cost pressures to manage dynamic, multi-partner, multi-protocol networks. Alpha Data’s NOC Managed Services identify network problems before they can impact business functions or productivity and seek to resolve issues remotely from the NOC or by dispatching technicians to customer sites. 2. So how does this new approach differ from traditional IT support services and what extra benefits does it offer? Equating remote support with managed services is a common misunderstanding. Having the ability to remotely monitor customer’s IT systems is just one step toward providing Managed Services. Managed Services entail a series of proactive tasks which are performed on an ongoing basis to prevent many problems from ever materializing. To be cost effective these tasks cannot be done manually, instead software tools are implemented which enables to perform these tasks in an automated fashion every day to keep customer’s system up and running. With the right remote management platform that can automate preventive tasks, customers get the benefit of circumventing problems before they disrupt business operations.
PAGE 6 | ALPHA NEWS | OCT 2010
Our NOC managed services provide customers with: • • • • •
Round-the-Clock Network Surveillance. Performance Monitoring. Trouble Ticket Management. Event Management. Guaranteed Service Levels (Service Assurance).
The different benefits of Managed Services model are as follows: Traditional IT
Support Managed Services
Manual / People Intensive
Automated / Software Enabled
Reactive / Time-Consuming
Proactive / Efficient
Onsite Service Required
Mitigates Downtime / Disruption
Maximizes Availability / Productivity
3. How does Alpha Data provide Managed Services? What is the NOC? Alpha Data provides managed services through a state-of the art Network Operating Center (NOC) based in our main offices in Dubai and Abu Dhabi. Alpha Data’s NOC Managed Services identify network problems before they can impact business functions or productivity and seek to resolve issues remotely from the NOC or by dispatching technicians to customer sites. Our services are conducted via a secure environment. The NOC is staffed by certified systems administrators and network engineers using the latest in network monitoring tools. 4.How do customers benefit from Alpha Data’s NOC offering? Through our NOC managed service offering, customers can: • Reduce operating expenses by up to 25% or more. • Accelerate time to revenue by 3+ months by driving new applications and services to end users faster. • Eliminate the investment to organically grow operations skills to manage new technologies. • Focus on their end users' overall service experience and other core competencies. For more information about Alpha Data’s Managed Service Offering, interested parties may contact: Abu Dhabi Farid El-Fetouh, Tel: 02 673 1873, Email: firstname.lastname@example.org Dubai Venki, Tel: 04 393 5222, Email: email@example.com
PAGE 7 | ALPHA NEWS | OCT 2010
The Power of Polycom OTX Increasing productivity and accelerating the speed and quality of decision-making are vital to your organisation’s success, even as your teams and individual workers are increasingly spread across geographies. By providing an exceptional, across-the-table experience and an open collaboration environment, the Polycom OTX immersive telepresence solution will power your teams, customers and partners to work more effectively across distances. Key Benefits: • Like being in the same room with the Polycom OTX solution, you’ll enjoy natural, interactive meeting experiences where people appear to be sitting across the table from one another in true-to-life dimensions thanks to exceptional video quality, spatial audio and shared content all delivered in high definition. • A design breakthrough enhances your meetings enable your meeting attendees to focus fully on their interactions and collaboration through the highly intuitive, futuristic Polycom OTX design, where the underlying technological elements are integrated and concealed. • Connect across all environments because the Polycom OTX solution seamlessly connects with all standards-based desktop, room and immersive telepresence systems. Your organisation will enjoy full support for collaborative tools and native integration directly into leading UC and network environments.
Juniper Media Flow Controller Juniper's Media Flow Controller, a Junos® Ready Software application, combines deep, media-aware intelligence with an innovative architecture that maximizes system and disk performance to enable ground-breaking scale and performance. Juniper's Media Flow Solution is a content delivery, distribution and caching solution purposely-built to address CDNs' and network service providers' needs for new media and rich content delivery. Media Flow Controller is a highly scalable solution, which reduces the number of servers required to deliver rich content, decreasing power consumption, data center rack space and cooling costs. The solution supports virtually all content protocols to enable media delivery to PCs, handheld devices, Internet-enabled TVs and a variety of other devices. • Enables a comprehensive content delivery solution of best-in-class components. • Tight integration between network, storage, applications, and management layers. • Allows incremental, nondisruptive deployment. • Enables server consolidation by providing a standard platform for all applications. • Meets a variety of business and technical needs. • Mid-tier and multi-tier content deployments offload traffic from network backbone and servers, enabling greater scale and efficiency. • Meets a variety of business and technical needs. • Offers NEBS-compliant options.
PAGE 8 | ALPHA NEWS | OCT 2010
How to Deal with a Storage Capacity Crisis When faced with a storage capacity emergency, you almost always find yourself under enormous pressure to deploy a quick fix. "That's OK, I'll fix it later," you tell yourself, only to live with the unfortunate consequences of your actions for years to come. I know - it's happened to me. Running out of storage unexpectedly in the midst of production is all too common in the era of the enterprise data explosion. Sometimes it happens because proper capacity monitoring isn't in place. Sometimes it's because of an unforeseeable growth spurt in storage consumption. Whatever the cause, the onus is on IT to make more storage available as fast as possible. The trick to avoiding quick fixes is discipline. Management may clamor for a quick solution, but be steadfast, rearrange your work schedule, and dedicate yourself to fixing it the right way. That's the only way to avoid anguish in the long run. The "right way" doesn't always need to take much longer than the "wrong way," either. Here are two real-life examples of capacity emergencies and an expedient ways to fix them that won't haunt you forever.
Storage capacity crisis case No. 1: The full file server It's 9:30 a.m. on a Monday. The help desk phone line has just started to explode with frantic calls from users - apparently nobody can save documents to the network. A quick check reveals that the data volume on the corporate file server is packed to the gills. The server in question doesn't have any free drive slots left, so ordering additional disk for overnight delivery is a no-go. The whole server will need to be upgraded and who knows when that'll happen. Given that all of the critical file shares for the company reside on this volume, the problem must be fixed - and fast. The most obvious action to take is to find data on that volume that shouldn't be there and delete it to buy time. Perhaps there's a copy of a software installation CD or a service pack that you can be absolutely sure nobody will need right away. However, that might
PAGE 10 | ALPHA NEWS | OCT 2010
free up only a few hundred megabytes, which will be gone in the blink of an eye. In my experience, the most common way to solve this problem is to pick one large, less-used file share and move it to a different server, one that happens to have some space - usually an application server. The best candidates are usually file shares for smaller departments, like marketing or finance, that have few users but lots of data. With a low user count, you need only work with a few employees and redirect their drive mappings. That's still an ugly fix, of course. Fortunately, one fairly easy step can make the fix painless to walk back out once your new file server arrives in a few weeks: Set up DFS (distributed file system). If you're not using DFS already, it can be a real life saver. Essentially, DFS allows you to create a virtual file sharing name space (a DFS root) that contains transparent file share mappings (DFS links). From a user's perspective, the DFS root appears to be a normal file share with normal folders. However, those folders represent links to file shares where the data is actually stored. So, while a user might browse to \\example.com\network\departments\marketing, they're actually being redirected to \\appserver1\marketing$ without being aware of it. This can be very valuable to admins because they can easily change where the DFS links point without informing users. Thus, when the new file server shows up and you're ready to move the data back to it, all you need to do is move the data during off hours, and update the DFS link to point to the new share. Having DFS in place will also make the rest of the file server migration easier to accomplish with minimal user disruption.
Storage capacity crisis case No. 2: The over allocated SAN Earlier this morning (also at 9:30 a.m. on a Monday, because that's when everything bad happens), you were confronted by a department director and an engineer from a software vendor who is upgrading a mission-critical application that your organization relies on. Apparently, the new version uses twice as much storage as the old version - a net increase of 500GB. Also, they need the space this afternoon. The fact that nobody bothered to warn you about this doesn't matter - the director in question plays golf with your boss's boss and the storage vendor flew in from San Diego and is getting paid a ridiculous hourly rate. Crunch time!
PAGE 11 | ALPHA NEWS | OCT 2010
Two years ago, when you got your fancy new SAN, you were pretty sure that there was no way your company would ever use 8TB of storage. What could possibly fill that up? Now, however, you have your answer: lots of stuff. The SAN was originally purchased to store a new document imaging system, but since then, you've built a server virtualization environment on it and migrated a large chunk of your physical servers into it. Now there's barely enough free space left to take a few snapshots, much less the additional 500GB you'll need. A new shelf of storage is in the budget, but this problem needs to be solved right now. The best option you can muster is moving a utility server off the SAN and onto a retired server with adequate direct-attached storage - or just giving the vendor that old server instead of giving him SAN space. Neither of these options are palatable. In the first instance, you will be moving a server, only to move it back again later once you have available SAN space. In the second, you will put yourself in a situation where a mission-critical server will be built on obsolete hardware. There may be another way. When initially presented with a large centralized storage device, there's often a strong tendency to over allocate the first few volumes that are created. After all, two years ago when it was installed, the new document management system was going to be "huge," according to every indicator, so giving it a 2TB volume seemed like a no-brainer. To date, though, it has used only 600GB of that space, leaving more than 1TB unused. Unfortunately, shrinking a production NTFS volume is a risky proposition at best. Worse, you don't have enough space to create a replacement volume into which you can move that application's data and free up the space, either. Or do you? If your SAN is worth its salt, it probably supports thin provisioning. Thin provisioning allows you to essentially free as-yet-unallocated space from an existing volume so that you can use it for other purposes. It can also be extremely dangerous: If you eventually try to use the storage that you've freed, the SAN will really run out of space and you will be in serious trouble. However, thin provisioning a large, over allocated volume can give you the flexibility to shuffle items around and get you out of hock. So long as you add storage resources soon after thin provisioning - or migrate the data on the over allocated volume to a correctly sized volume and discontinue the thin provisioning - this cheat can be invaluable in a pinch.
Putting it all together Clearly, the best way to avoid both of these problems is to have good capacity monitoring in place and plan to add storage resources well before needing them becomes an emergency. But even the best planning can't foresee all incidents. When you're presented with a storage capacity crisis, take the time to consider all your options and resist the temptation to go with the first idea you come up with. You may be able to find a solution that will deliver the results your users need without resigning yourself to creating an ugly ball and chain you will be attached to forever. This article, "How to deal with a storage capacity crisis," originally appeared at InfoWorld.com. Read more of Matt Prigge's Information Overload blog and follow the latest developments in network storage and information management at InfoWorld.com.
PAGE 12 | ALPHA NEWS | OCT 2010
How IT Will Change When Gen Y Runs the Show Kristine Harper thinks she and her millennial colleagues will run things better when they're in charge. "Our generation will be a little bit more fun, encouraging, flexible, positive. There will be fewer meetings, more networking, more teams," she says. Flextime will be ubiquitous, and managers will support employees in their efforts to balance work with other interests. Good jobs will be those that always challenge. A day's work will be measured by results, not hours at the desk. Make no mistake: The workplace that this 27-year-old software developer envisions a decade out won't look like the typical office of the 20th century. "If I were a manager in the future, I would focus on increasing motivation and community in the workplace," she says. "I would try to emphasize the importance of employee get-togethers outside of [work] to promote a stronger sense of community and friendship. I think when you feel strongly about the workplace and the people involved, there is a sense of motivation that comes with that." Generation X'ers and millennials - those from Generation Y - are now becoming managers, and they will take on more of the top positions in the coming decades. As they do, they will bring their own philosophies about how the workplace should operate. Expect a more open and flexible work experience, where careers don't necessarily just advance up the corporate ladder but rather move laterally and possibly down, too, depending on changing personal and professional ambitions and needs.
Fulfilling the Dream Workforce consultants say this expectation of flexibility and accommodation signals a new way of working, built on what the previous generations have pushed for. Gen Y workers "don't see career paths in the traditional sense. They're looking for companies that are much more flexible," says Celia Berenguer, co-author of the June 2009 report "Catalyst for Change: The Impact of Millennials on Organization Culture and Policy," from Monitor Co., a Cambridge, Mass-based consultancy. "The traditional development and training processes are probably the least effective for millennials."
How to recruit the IT Managers of the future Jeff Schwartz, global and U.S. talent leader at Deloitte Consulting, says most organizations need to better accommodate individual needs if they want to successfully recruit the best young workers. Most IT organizations, Schwartz says, lack a targeted, aggressive recruiting strategy. Instead, they rely on the company's overall brand and word of mouth, which isn't particularly effective, he adds.
PAGE 13 | ALPHA NEWS | OCT 2010
Moreover, companies need to "create targeted programs for different generations of workers," he says. Deloitte's research has found that millennials, particularly those in IT, are looking for "opportunities to work with senior staff and company leaders," says Schwartz. "A hallmark of this generation is its desire to change positions regularly to gain experience in a range of roles throughout the organization," he says. "You can address this desire by working with Gen Y employees to identify their deep-rooted skills, interests and knowledge, find their best fit in the organization, and craft the job design and conditions that help them perform." Carol Phillips, president of market research firm Brand Amplitude and an adjunct professor of marketing at the University of Notre Dame, has studied millennials and what drives them. "They need frequent bite-size promotions, and things can't be ambiguous. You have to tell them where the goal line is. They need it more than past generations," she says. Susan Donovan, senior director of application development and support at the National Rural Electric Cooperative Association in Arlington, Va., already sees these influences. At 39, she's a Gen X'er. She says a key characteristic of her generation and the millennials is the need for flexible work schedules "so you can be a mom, an employee and a manager." But younger workers also want more than flexibility, she says. They want interesting work that keeps them engaged. They want to keep up their learning. They want the freedom to push boundaries and try new strategies and technologies without fear of reprimands for getting it wrong the first time."They do care about the work, they just don't want to be on the same project year after year after year," Donovan says. "So we need to personalize what projects people are on." "We like to learn and advance our understanding of things, and when we have a job that allows us to do that, that's a big deal," says Deric Abel, a Linux administrator at America First Credit Union in Riverdale, Utah. Abel, 29, says one of his friends, a network engineer, recently left a job in part because he felt that he was boxed in and spending too much time in meetings. That mentality translates into how Abel says he will manage people as he moves into positions with more authority - which he's on track to do. He says he would add more flexibility by, for example, allowing IT workers to choose their own operating systems for their desktops. He wants to add flextime and off-site work options. He envisions being a boss who's more of a facilitator than a manager. Dawn Augustino, 44, an IT technical director at the University of Pennsylvania, has similar notions about the future of the IT workplace. She sees an organization where ideas and results - not the number of years on the job - earn people promotions. She also wants to foster an environment in which workers can promote their ideas throughout the organization, and where they can try new strategies and feel comfortable bringing problems to her as the boss. "It will be very flat," she says, adding that she already manages that way. Jeff Schwartz, global and U.S. talent leader at Deloitte Consulting LLP, says next-generation leaders will also have a more global perspective. They'll be more comfortable with diversity, seize the latest technologies and look for results-oriented work environments that put the value on the job done rather than the hours worked, he says. "The X and Y generations have come up in world where you have more options," says Schwartz. "Hopefully their leadership and management style will evolve to take advantage of some of these complexities." â€“ Mary K. Pratt, Computerworld
PAGE 14 | ALPHA NEWS | OCT 2010
INTERVIEW WITH AN EXPERT
Encryption with Boole Server Alpha News talks security and discusses Boole Server with Avinash Advani, Director at Fluxer ME Head-quartered in Milan, but recently launched in the MENASA territory from its offices in Dubai, Fluxer ME is one of Alpha Data’s newest partners. Alpha News met with one of the principals of this European Vendor to discuss Boole Server, the military-grade encryption and file sharing platform. Q: So please tell us, what exactly is Boole Server? AA: Boole Server is a very powerful, yet extremely useable product. It’s a military-grade file-sharing encryption platform. What does that mean? It means we took the real needs of a CEO or CIO, or anyone with confidential information, and we translated those needs directly into a solution. Boole Server allows you to send or share data safely and effectively, both within your network and beyond, at a level of security which until now was only used by intelligence services across the globe. It has full audit capabilities, can be used for compliance issues, and allows you to even send information to third parties with a ‘time-bomb’ so it disappears from their screen after a preset time. It’s a ‘must-have’ product for senior executives. Q: How does it compare to other security products? AA: Boole Server works in a client-server architecture, and utilises the military concept of securing and sharing data. This military concept means that not only is the access to the server encrypted, but the data within it is also, and the key to the data is also encrypted, and stored inside the secured server. In order to access a file within the server you must have access to this server, the correct key, and the rights for the correct piece of information, and all this is encrypted at 2048 Bit. Boole Server is a combination of products, it draws on encryption; DLP - both on the client side and server side; built in rights management software, which can be fully integrated into most systems such as active directory; and it has elements of document management including comprehensive auditing and archival systems. Q: You were recently cited by Gartner as one of only 5 “Cool Vendors” for 2010, tell us more? AA: Yes, we are really proud of this recognition, and as we are the only European vendor on that list, it’s even more special. Gartner took our product through its paces, and were blown away by the simplicity, functionality, and granular control it allows you to have over every single piece of confidential data within your company.
PAGE 15 | ALPHA NEWS | OCT 2010
Q: What are the key issues you have seen clients are experiencing in this region? AA: We have seen similar issues to those faced by some of our European blue-chip clients. In the last few years, companies and organizations have spent huge sums of money with a view to keeping the bad guys out of their networks by investing in firewalls and other filter technologies to protect against hackers, viruses, spam and spyware. A Ponemon study from 2009 shows that employees leaving a company are considered to be one of the largest security threats for organizations. So now it is time to look inward, and monitor the workflow processes of information within the network and the protection methods when critical information is stored and/or sent outside the enterprise network. What can be done? Today, IT directors and security professionals focus their attention on stopping information from leaking out of the network. And that challenge is much greater compared to inbound protection issues. The current economic climate has meant a huge number of jobs have been lost, and client data or key intellectual property has walked out of the door with those people. Emails concerning company financials have been leaked; HR & Payroll documents have been published online and elsewhere. Designs have been stolen, client records and deals lost. In short, companies are facing their biggest test ever, because the threat is now likely to come from within your network as from outside it. Boole Server provides companies a secure way to store, share, access and communicate data securely using military grade encryption, both within their network and beyond. It’s all very well to secure offices with alarms, locks and biometrics, but isn’t it actually your data that needs to be secured? When clients come to us, they want to be protected, and be 100% sure that what they share with someone can be tracked, audited, and secured. We offer them this comfort factor. Q: What kinds of companies are you working with? AA: The key thing about critical information is that everybody has some. Every vertical, every size of company. Our largest clients come from sectors as diverse as Banking & Finance, Fashion, FMCG’s, Aviation, Healthcare, Governments, the list is endless, but their needs are the same. All of them ultimately have to secure their data against malicious intent. It’s just a matter of getting started, and with Boole Server, getting started has never been easier. So, just like you make sure that you have an adequate insurance for your organization to avoid risks, make sure you also have an “insurance” against Data Leak risks!
REDUCE YOUR OPERATING EXPENSES
‘Do more with less’ has long been the mantra of many corporate departments and with the recent economic crisis; in no place is this better evidenced than in the IT and other internal services departments. As a result, company management teams have turned to outsourcing to enable organizations to focus on their core business, switch expenditure from a variable to fixed cost base, provide access to specific new technical skills. Old-model ‘reactive’ service delivery models have become ineffective in delivering consistent up-time for clients. Organizations are looking for a more proactive way of managing their IT system availability, services and budget. Alpha Data provides around-the-clock network surveillance, performance monitoring, trouble ticket management, event management, and guaranteed service levels (service assurance).
“Not only has the team resolved any issues in a timely manner, but also the team was very proactive in addressing any critical issues and thereby preventing major problems.” Susan Cowen, Office Manager, Taylor Wessing “Alpha Data have always assisted to the n’th degree to resolve problems, be it software or hardware related.” M. Berry, CKR Consulting Engineers “We find it really quick and easy to get in touch with you team 24x7.” Mohamed Amir Bin Yasin, Chief Executive Officer, Petronas “We at GENYX really appreciate all your support and assistance in solving our IT problems and complications.” Smita D’Souza, Office Manager, GENYX
For more information contact us at the following details:
Abu Dhabi: Farid El-Fetouh, Tel: 02 673 1873, Email: firstname.lastname@example.org Dubai: Venki, Tel: 04 3933 415, Email: email@example.com