SPECIAL SUPPLEMENT BY V O L U M E 0 2 | I S S U E 03 | M A R C H 2 0 1 6 With various emerging technologies like IoT and Big Data making their way to the enterprises heart, holistic security is the need of the hour. ARE YOU READY FOR THE NEXT MOVE? SECURITYCHECKMATEAND!

04 MARCH 2016
Secondly, IoT is reckoned to be the biggest source of security breaches reason being in the IoT environment, devices get connected with multiple sensors at mul tiple points so there is a positive chance for the network getting infected. In this case also the vulnerability becomes really high. The sensors come from various vendors and with different standards and I do not know how many devices in the region will be connected – may be some billions but for sure – these devices will inflict injury into the networks.
As per the opinion of the Cisco, security is and will be the largest contributor for the margin of the partners.
The worldwide cybersecurity market is defined estimated to grow from $77 billion in 2015 to $170 billion by 2020. This number includes investment on the security start-ups. If Apple Phone can be hacked, then imagine other devises and applications.
WELCOME TO THE THIRD EDITION of Cyber Sentinels. For last two years we have been trying to capture the essence of security landscape in our specialized publication highlighting the evolution of the industry not only from the stand point of the technologies but also from the adoption and need perspective. We are also trying to put out the pattern of the breaches and style of the hackers or spammers by quoting various stake holders of the industry. It is for sure that security is becoming one of the largest concerns in 2016 and beyond. It is not for the reason that the people will amass wealth and there will be double digit growth in the enterprises but also for the reason that the things will be connected. The software and the hardware will be decoupled from each other and put into applications through various operating systems and hypervisors. The data will be collated by the enterprises from structured and unstructured sources to create pool of intelligence to be used for the better marketing and sales. This means while mining the data there could be intrusion of bad codes and can easily infect the entire system. In all the virtualizations, cloud computing, the data goes and comes up from various sources and through various servers and connectors. So in order to make the entire value proposition better, the enterprises adopt multi-tenet solutions, and it becomes the starting point of the breach because in this environment compatibility always becomes the issue.
So Security is the ultimate technology that needs attention as priority from all enter prises and more content around it is better for the industry. Happy reading the third edition of Cyber Sentinels. ë
EDITORIAL WELCOME TO THE THIRD EDITION OF CYBER SENTINELS PUBLISHER: SANJIB MOHAPATRA COO: TUSHAR SAH00 EDITOR: SANJAY sanjay@accentinfomedia.comMOHAPATRA M: +971 555 119 432 ASSISTANT EDITOR: ANUSHREE RONAKSALESINFO@ACCENTINFOMEDIA.COMSUBSCRIPTIONSDESIGNER:LEADVISUALIZER:REPORTER:anushree@accentinfomedia.comDIXITSONALLUNAWATsonal@accentinfomedia.comMANASRANJANVISUALIZER:DPRCHOUDHARYAJAYARYAANDADVERTISINGSAMANTARAYronak@accentinfomedia.com M: + 971 555 120 490 SHAMALshamal@accentinfomedia.comSHETTY M: + 971 557 300 132 KHYATIkhyati.mistry@accentinfomedia.comMISTRY M: + 971 556 557 191 SOCIAL MARKETING & DIGITAL RICHAPRODUCTIONYASOBANTCOMMUNICATIONMISHRAyasobant@accentinfomedia.com&CIRCULATIONSAMANTARAY + 971 529 943 982 PUBLISHED BY ACCENT INFOMEDIA MEA FZ-LLC PO BOX : 500653, DUBAI, UAE 223, BUILDING 9, DUBAI MEDIA CITY, DUBAI, UAE PHONE : +971 (0) 4368 8523 A PUBLICATION LICENSED BY INTERNATIONAL MEDIA PRODUCTION ZONE, DUBAI, @COPYRIGHTUAE 2013 ACCENT INFOMEDIA. ALL RIGHTS RESERVED. WHILE THE PUBLISHERS HAVE MADE EVERY EFFORT TO ENSURE THE ACCURACY OF ALL INFORMATION IN THIS MAGAZINE, THEY WILL NOT BE HELD RESPONSIBLE FOR ANY ERRORS THEREIN. PRINTED BY AL GHURAIR PRINTING & PUBLISHING LLC. MASAFI COMPOUND, SATWA, P.O.BOX: 5613, DUBAI, UAE INFO MEDIA SANJAY MOHAPATRA sanjay@accentinfomedia.com

COVER STORY CONTENTS With various emerging technologies like IoT and Big Data making their way to the enterprises´heart, holistic security is the need of the hour. SECURITY- CHECK AND MATE ! -ARE YOU READY FOR THE NEXT MOVE?12 SECURITY LANDSCAPE A LANDSCAPESECURITYOFREPRESENTATIONPICTORALTHEMEA 26 GUEST TALK THE TEMPO FOR TODAY´S LATEST ROUND OF CYBER ATTACKS 35 DONT ANDSECURITYEXPERTSINDUSTRYMISSSHAREDOSDONTS 36 GUEST GRABBINGTALK THE CYBER THUGS BY HORNS 33 05MARCH 2016




Fortinet has updated its FortiOS cybersecurity operating system. The updated FortiOS 5.4 offers new features that enable custom ers to deploy internal network segmentation for containment and defense against advanced threats.. With the latest con figuration, analytic capabilities and assisted one-click actions in FortiOS 5.4, enterprises can implement internal segmenta tion firewalls (ISFW) and Secure Access Architectures to move beyond traditional perimeter defense to stronger layered security strategies.
According to Frost & Sullivan report, over the next five years, the Middle East’s homeland security market is set to grow from USD 17 billion to USD 34 billion, at three times the global growth average. The largest share, 55 percent or USD 15 billion, will go to securing government, energy, and critical national infrastructure. The Arab World was well-represented at ISNR 2016. The event is hosted over 20 country delegations and 200 representa tives from government buyers, including armed forces, customs agencies,and ministries.
A Thunderous Security
TIGHTENING THE FENCES OF SECURITY
The 7th edition of ISNR was held under the theme of “Connecting Governments, Society, and Business, Through Innovation, Leadership, and Excellence to Build Safer Communities and Ensure a More Resilient World.”
Michael Xie, Founder, President and CTO of Fortinet said, “FortiOS 5.4 deliv ers new features that empower organizations to implement internal segmentation strate gies that isolate and remediate malware should it make it past the perimeter. Integration with Fortinet’s ATP framework of services including FortiClient, FortiMail, FortiSandbox and FortiWeb enables automated threat intelligence sharing with one-click mitigation of threats attacking the network directly, or through all major attack vectors. Leveraging FortiGuard Labs’ threat intelligence, FortiOS receives a constant feed of mobile-specific intelligence to deliver automated protection against emerging threats that target platforms like Android, iOS and Windows. enables organizations to scale for a hybrid cloud scenario. With the ability to encrypt over 100 Gbps of traffic, Thunder CFW unifies IPsec, firewall and load balancing in a highly efficient one rack-unit form factor. aGalaxy provides device management, configuration, reporting and troubleshooting for Thunder CFW. A high-per formance Secure Web Gateway with integrated explicit proxy, URL filtering and SSL Insight. Ability to classify more than 13 billion URLs into 83 categories to provide outstanding scale and accuracy. Plus, superior decryption capabilities allow for a highly efficient solution with single pass SSL decryption and SSL inspection for multiple devices.“Weare seeing early interest from our large installed base of customers for the Thunder Convergent Firewall. We believe Thunder CFW will prevent and contain some of the most demanding cyber security threats our customers face now and in the future. ” said Lee Chen, CEO of A10 Networks.
06 MARCH 2016
LEE CHAN- CEO,
A10 Networks unveiled the Thun der Convergent Firewall (CFW), a standalone security product built on A10’s ACOS Harmony platform. Thunder CFW is the first converged security solution for service providers, cloud providers and large enterprises.
´UPDATED´ANDSECURITYCYBERREDEFINED´
STREETSECURITYA10
The Thunder CFW Gi/SGi firewall delivers up to 220 Gbps throughout, up to 268 million concurrent connections and up to 5 million connections per second in a one rack-unit appliance. The firewall delivers up to 220 Gbps throughput, up to 268 million concurrent connections and up to 6.9 million connections per second in a one rack-unit appliance. It is a high-performance IPSec site-to-site VPN and pro vides data privacy when traffic is transported between data centers. High-performance encryption


A HEALTHY WAVE OF SECURITY
The annual TOP3 rating, devised by Kaspersky Lab, assessed the performance of over 100 vendors that took part in a variety of IT security tests for corporate, consumer and mobile products during the course of the year and Kaspersky products passed with flying colors leading to the top spot. Tests included in the TOP3 score assessed solutions’ performance relating to malware detec tion and removal, mobile security, anti-phishing and parental control, among others. Only tests from recognized and independent labs, whose methodology is transparent and clear were considered. Tests performed in these programs assess all protection technologies against known, unknown and advanced threats. Kaspersky Lab products participated in 94 independent tests throughout 2015, being awarded first place in 60 of them. Kaspersky Lab products also achieved a higher percentage of top-three places than any other vendor – 82%.
Theseservices.new solutions will bring together key elements of both companies’ technology platforms and address current shortcom ings of traditional point security products by avoiding the operational silos that widen the gap between detection and response. BT and Intel Security are focused on integrated, open security systems with cloud-first technology designed to empower organizations to resolve threats faster and with fewer resources.
COMING TOGETHER FOR NEXT GEN SECURITY
A TROUBLEMAKER IN OS X PARADISE NIKITA SHVETSOV, CHIEF TECHNOLOGY OFFICER, KASPERSKY LAB. GRABBING THE TOP SPOT!
FireEye launched Mandiant ICS HealthCheck service, a minimally-invasive cyber security assessment for operators of mission-critical ICS. The ICS HealthCheck service is available now and is a core component of FireEye’s continued focus on securing critical infra structure.ICS HealthCheck was specifically designed to meet the needs of asset owners concerned about the operational risk associated with software-based agents, network scan ning or other security evaluation techniques. This unique methodology bridges IT security and operational technology (OT) by enabling IT security teams and the engineering staff who manage ICS infrastructure to help create and identify joint solutions to identified vulnerabilities.DanScali,Senior Manager, ICS Security Consulting, FireEye said, “The ICS Health Check is a critical service offering for any organization running ICS infrastructure, and, as part of the FireEye platform, allows customers to benefit from our intelligence on ICSspecific threats, strategically address risks, and reduce their time to detect and respond to threats.” Mandiant ICS HealthCheck customers receive tools like Threat Model Diagram, ICS HealthCheck report, Technical & Strategic Recommendations.
Raj Samani, EMEA Chief Technology Officer, Intel Security, said: “Our goal is to enable businesses around the globe to more aggressively and effectively defend against data security incidents and targeted attacks. Together with BT, we plan to close the gaps between detection and remediation by creating and managing a security ecosystem designed to enable real-time communica tion, intelligence exchange and response across security tools.”
“Coupled with our inhouse technology expertise, we not only deliver multi-layered security to deal with today’s threats, but develop next generation technologies to deal with the threat landscape of tomorrow, providing the most comprehensive protection available.” said Nikita Shvetsov, Chief Technology Officer, Kaspersky Lab. Mac users have been targeted by hackers with “ransomware” in what is believed to be the first attack campaign of its kind against users of Apple’s operating system. Research done by Unit 42 detected that the Transmission BitTorrent client installer for OS X was infected with ransomware, just a few hours after installers were initially posted. Since the attack Apple has revoked the abused certificate and updated XProtect antivirus signature, and Transmission Project has removed the malicious installers from its website. Palo Alto Networks has also updated URL filtering and Threat Prevention to stop KeRanger from impacting systems. Palo Alto Networks, discovered the particular ransomware, “KeRanger” targeting Mac users and explained how it was infecting systems. The KeRanger application was signed with a valid Mac app development certificate; therefore, it was able to bypass Apple’s Gatekeeper protection. The only previous ransomware for OS X was FileCoder, discovered by Kaspersky Lab in 2014. As File Coder was incomplete at the time of its discovery, KeRanger is the first fully functional ransomware seen on the OS X platform. Additionally, KeRanger appears to still be under active development and it seems the malware is also attempting to encrypt Time Machine backup files to prevent victims from recovering their back-up data. The 2 KeRanger infected Transmission installers were signed with a legitimate certificate issued by Apple BT and Intel Security entered into a strategic agreement to create new solutions to help organizations improve security and prevent cyberattacks. The companies will also work together in a joint cyber partner ship to further develop their common vision of creating next generation security
08 MARCH 2016
Mark Hughes, CEO of BT Security, said: “We are collaborating with Intel to bring together BT’s security intelligence with Intel’s advanced security tools in real time. Intel’s cutting edge security technology and our knowhow in service design Can help make our customers safer.”


SECONDS6 SECURITY CHECK!
10 MARCH 2016
MAKING SECURITY A PRIORITY
ANALYZING CYBER SECURITY IN A NEW LIGHT Paladion is all set to participate at GISEC 2016 and will focus on how enterprises can move to a predictive cyber defense model using security frameworks that actively and continuously adapt to the changing threat landscape. At the center of showcase will be RisqVU Active Detection & Response (ADR), a Big Data based security platform and proprietary CyberActive Security Analytics as a Service. Paldion will be joined by their Technology partners CounterTack,
Koenig participated as the Knowledge Sponsor for the IT DNA Security Workshops 2016. During the event, Koenig trained leading cyber security professionals in an intensive two-day ‘Deep-dive’ to master critical IT security challenges with the guidance of leading industry experts. Rajneesh Upadhyay, Senior Trainer – Cyber Security for Koenig Dubai, said “The IT DNA Security Workshops 2016 recognizes the need for educa tion and training in the efforts to develop and train cyber warriors that can help us defend our families, our jobs – and even our lives
STARLINK & VERACODE REDEFINE APPLICATION SECURITY StarLink has signed a distribution agreement with Veracode that enables StarLink to provide partners and customers the opportunity to benefit from application security solution. Star Link partners and customers will have access to Veracode’s platform, providing centralized policies, metrics and reports while simplifying information sharing across global teams. The offerings provide solutions for: Secure Web Application Development, Web Perimeter Security, Software Supply Chain and Security, Mobile Application Security.
Sophos to place the spotlight on Security Heart beat and showcase best in class security solutions.
Cisco has introduced innovations to its flagship Next-Generation Firewall— the goal of which is to deliver leading protection to keep organizations safer. Cisco’s first fully integrated and threat-focused Cisco Firepower Next-Generation Firewall (NGFW) marks a significant departure from the focus of legacy NGFWs on application control. By focusing instead on threat defense, Cisco will help organizations better manage and minimize risk. Think of it as legacy NGFWs protecting “homes” by securing windows and doors, whereas Cisco’s approach is to identify, detect and protect against would-be burglars no matter how they try to gain access to a property.
THE HEARTBEAT TO RESONATE AT GISEC 2016
Sophos will be participating in the Gulf Informa tion Security Expo & Conference (GISEC) 2016. The company will feature Sophos Security Heartbeat–the synchronized security protection for endpoints and networks, and showcase its best-in-class security solutions including Sophos SG Firewall, XG Firewall and Cyberoam NG Services at the Middle East’s leading security event. “By automating threat discovery, investiga tion and response, Sophos’ synchronized security vision revolutionizes threat detection and reduces incident response times exponentially sotactical resources can be refocused on strategic analysis,” said Harish Chib, Vice President, Middle East & Africa for Sophos. With Sophos Security Heart beat, organizations of any size can advance their defenses against increasingly coordinated and stealthy attacks and drive a dramatic reduction in the time and resources required to investigate and address security incidents. Sophos also plans to showcase the latest versions of its next-generation endpoint and network security solutions.
With an intense focus on boosting the IT security, communications & technology industries in the Middle East region, Bulwark Technologies has an array of internationally acclaimed products lined up to be showcased at the Gulf Information Security Expo and Conference (GISEC) 2016. The company will be offering latest technologies and new product launch spanning Enterprise Data Governance, Enterprise File Share/Sync, Privilege identity management, Data Clas sification, IAM, vulnerability management and two-factor authentication, in addition to their other security technologies at the event. The Value-Added Distributor would join hands with its strong vendor portfolio consisting of Sophos, Varonis, Linoma, SecurEnvoy, Radar Services and ESET for GISEC 2016.
HARISH CHIB, VICE PRESIDENT, MIDDLE EAST & AFRICA FOR SOPHOS.
POLISHING CYBER SECURITY PROFESSIONALS
Bulwark to Demonstrate allrround IT Security Throughout
DarkMatter is all set to participate at the ISS world Middle East where the members of the company’s senior management team are being given an exclusive platform to present on a range of cyber security topics. DarkMatter will look to interact with conference attendees as the company continues to develop its strategic focus to provide end-to-end cyber security solutions to the Public sector, Financial Services, Telecom, and the Energy sector.








ARE YOU READY FOR THE NEXT MOVE? With various emerging technologies like IoT and Big Data making their way to the enterprises´heart, holistic security is the need of the hour. COVERSTORY SECURITY CHECKMATEAND! 12 MARCH 2016

“There is a clear momentum for Internet of Things (IoT) adoption.IoT-enabled applications and solutions are evident across the Middle East, in various industry and government sectors, including manufacturing, health care, transportation, oil/gas, utilities, energy and water,” says Anthony Perridge, Security Sales Director, Cisco. Digital Guardian, The swift adoption of cloud services and overall digitization of the MEA region across sectors has posed serious risks to organizations’ sensitive data, and the risk will only grow if proper data protection technologies are not in place to thwart cyber attacks.
Going down the lanes of 2015, what the security market saw was some increased upfront investments in the security siblings. As Cisco puts it acrossCountries in the Middle East are witnessing significant economic and technological transformation due to growing business opportunities in large industries such as banking, financial services, insurance (BFSI) and the region’s dominance on heavy industries such as oil and gas. With oil and gas industries having remote and geographically vast operations that are highly dependent on internet networks their vulnerability to cyber-attacks only mag
A s the modern workforce grows overly mobile, Security is no longer a decision to be made!Even though worldwide spending on cyber security is continuing to grow at 10 to 15 percent annually, many CISOs are apprehensive that the hackers may gain the upper hand sometime in the future. For the CISO´s, the responsibilities and span of control are changing dynamically. Security experts are increasingly advising the organizations to stop adding on security solutions to an existing framework and rather work on the basic design of the infrastructure. In a recent IT security survey of Middle East organizations con ducted by International Data Corporation (IDC), almost 60% of the respondents identified budget constraints as a major challenge when it comes to implementing IT security solutions. At the same time, 68% of Middle East CIOs indicated that maintaining security will remain their biggest technology challenge throughout 2016 as they face mounting pressure to ensure high levels of system performance and availability.
SECURITY LANDSCAPE OVERVIEW
Though all the likes of Cloud, Big Data and IoT have been around for a while and there has been a good number of additions to its platforms, what remains unchanged is the ´Security´ factor.
As Help AG we successfully launched our Managed Security Services in 2015. This is a major positive development for our existing customers and prospects to elevate their security posture significantly. While obtaining 24x7 Security Event Management and Incident Response as a managed security service delivered by Help AG locally the organizations can be fully assured that NO log data is leaving their premises. This will help from a compliant point of view as well to maintain all relevant policies, processes and procedures according the information security frameworks they have to adhere to.
ENTERPRISE READINESS
MOMENTUM ON THE SECURITY FRONT
nify. With the rapid economic growth and increasing threat of cyber-crime, many organizations in the region are beginning to recognize the need for a holistic security strategy that protects throughout the entire attack continuum - before, during and after an attack.
Cisco’s Security Report 2016 revealed that
TYPES OF SECURITY DDOS MitigationDisasterSVM/SIEMRecoveryUTMDLPAMIDS/IPS AntivirusFirewall Web Filtering Risk & Compliance Management Encryption 13MARCH 2016
Annual


As Cisco says, as networks continue to grow and expand, new devices and applications with widely varying security postures are constantly connected. These devices often include but are
andproperty,datathreats,“Datatheftisoneofthebiggestspecificallyofsensitiveincludingintellectualfinancialstatements,employeecredentials.” attackbeforeandtargetcanmulti-dimensional“Today,effectivecybersecuritymustbeandtiered,asthreatsoriginatefromvirtuallyanywhere,numerouslevelsofanorganization,sometimespersistformonthsoryearstheorganizationisawareofanorbreach.” BEHINDMOTIVATIONSATTACKS KEY STATISTICS FROM HACKMAGEDDON CYBER60.6%CRIME 27.7%HACKTIVISM7.4%CYBERESPIONAGE 4.3%CYBERWARFARE JANUARY 2016 14 MARCH 2016
only 45 percent of organizations worldwide are confident in their security posture as today’s attackers launch more sophisticated, bold and resilient campaigns. “This shows that Cisco has to work that much harder to make sure that 10 out of 10 businesses are confident in their security posture,” says Anthony.
As Tony puts it across, the action of actually deploying solutions that are natively integrated is not largely in presence yet. Most IT security directors are reluctant to consider moving away from the traditional security model (silo prod ucts). Which leads to the ultimate fact, each and every silo solution is good on its own, but would be part of the gap when it’s unable to feedback its threat information down to the other security solutions in the organization. “Endpoint devices and systems are being consistently targeted by opportunistic cyber criminals who combine the use of social engineering and the exploitation of common vulnerabilities to infect machines and gain entry to organizations’ networks.”“To increase readiness and protect our customers from ever evolving threats, at Help AG we assist them from all relevant aspects to follow our Cyber and Information Security Assurance program,” says Stephan. The program focuses on Cyber Security Analysis, Consulting, Integration and Support elements with an over spanning strategy of Managed Security Services. Having an holistic 360 decree information security approach will seamlessly integrate in the business requirements.
ANTHONY SALES DIRECTOR, CISCO
PERRIDGE SECURITY
SECURITY FORECAST
LUKE BROWN VP & GM, EMEA, INDIA AND LATAM AT DIGITAL GUARDIAN


TECHNIQUESATTACK 22.3UNKNOWN34%%DDoS13.8%ACCOUNTHIJACKING10.6%DEFACEMENT 7.4%TARGETED ATTACK 2.13.25.3%SQLi%MALVERTISING%MALWARE1.1%CODEBACKDOOR 15MARCH 2016
TONY ZABANEH CHANNEL SYSTEMS ENGINEER, FORTINET
STEPHAN BERNER
MANAGING DIRECTOR, HELP AG technologies.”otherlabeledtechnologiesdeveloperssecurityintegration;“Integration,integrationandforyears,ITvendorsandtechnologyfocusedoncreatingthataremainlyassiloproductsorinwords:independent
“Help AG will focus on information security blue prints rather than point not limited to mobile devices, web-enabled and mobile applications, hypervisors, social media, web browsers, and home computers. This grow ing trend greatly expands the attack surface and creates opportunities for attackers to compromise a non-critical asset and pivot from there to attack more critical assets and data.Help AG will focus on information security blue prints rather than point products and/or services,” says Stephan. The blue print will combine technology stack with business processes strictly following local and internal security frameworks from a compliance point of view. “The threat landscape is getting only wider, thus the only solution for defending these well-crafted attacks is by broadening our security strategies to include the new innovations and adaptations in the cybersecurity market; such as the single vendor “natively integrated solu tions” – especially when it comes to vertical and horizontal organization security i.e. vertical: from endpoint to perimeter and most importantly the horizontal: east to west inspection” says Tony.
FINALLY.... There will be a huge shift in the security market once people realize that Security is a joint effort. Security will be complete only when the end users are equally alert and defensive to the threats. With IoT, the situation is just set to get intense. While many companies are still strug gling with their legacy infrastructures, the bad guys out there are upgrading their techniques. Lack of qualified resources and skill sets can definitely pose a fatal threat to enterprises. Indeed, the game just got hotter! ë
complianceandbusinesswillproductsand/orservices.Theblueprintcombinetechnologystackwithprocessesstrictlyfollowinglocalinternalsecurityframeworksfromapointofview.”


EVOLVING ICT ARCHI TECTURE AND CISO/ CIO The key is to be prepared, the question is not if but when an attack will come, and the businesses which can best defend themselves will fare best in the modern market. The CISO has to critically examine threats and choose viable solutions. ë
PARTNER ECOSYSTEM AND STRATEGYENGAGEMENT
A10 Networks’ security products address various security areas like DDoS protection, SSL Insight, Data Centre Firewalls, Gi/ SGi Firewalls, Secure Web Gateways, Web Application Firewalls and DNS Application Firewalls. We strive to empower our cloud, service providers and web-giant customers to deliver an amazing application experiences that are secure, responsive and always ON to their end-customers, with A10 ACOS Harmony platform and associated products. A10 Networks offers a range of security products with the new premium Thunder and original AX application delivery controllers (ADCs) and Thunder Threat Protec tion System (TPS). Each is built on the Advanced Core Operating System (ACOS) with rich security feature sets. These A10 products can help you scale, improve efficiency and enhance the security posture of your DMZ security infrastructure.
A10 is 100% channel, operating a two tier model starting with key distributors in each region, who supply our growing channel partner community. Our channel strategy
SHOWCASEVENDOR 16 MARCH
GLEN OGDEN, REGIONAL SALES DIRECTOR, MIDDLE EAST AT A10 NETWORKS A10 Network’s solutions enable enterprises, service providers, web giants and government organizations to accelerate, secure and optimize the performance of their data center applications and networks. A10 Networks has a portfolio of application-layer networking products that assure user-to-application connectivity is available, accelerated and secure. in a small form factor results in lower OPEX through significantly lower power usage, reduced rack space and lowered cooling requirements.
SOLUTIONS — BLENDED
PRIME STRATEGY We strive to empower our cloud, service providers and web-giant customers to deliver an amazing application experi ences that are secure, responsive and always ON to their end-customers, with A10 ACOS Harmony platform and associated products.
BUILDING SECUREDANETWORK
SECURITY2016 AND REDEFINED
WOur distributors support key stra tegic partners like Beta IT, MDS, SEE, E-Links, SMS, Alpha Hub, Dynamic Systems.
AN EDGE ABOVE THE REST Powered by A10’s scalable Advanced Core OS (ACOS) architecture, A10’s products surpass the competition with superior reliability, high-performance and an energy efficient footprint for lower total cost of ownership (TCO). The combination of high performance is based around choosing the right partners for each region, leveraging their expertise and customer relations and providing them with A10 training, on-site assistance when needed to help drive their continued growth.
MAJOR WINS Government/Military and Tier 1 Telco operators besides a number of large enterprises across various verticals including healthcare, banks, etc

OFFICIAL TECHNOLOGY MEDIA PARTNER

•WHEN to use those technologies
Cisco has a security portfolio which includes solutions for Access Con trol and Policy, Advanced Malware Protection, Email Security, Firewalls, Network Security, Next Generation Intrusion Prevention System (NGIPS), Security Management, VPN and Endpoint Security Clients and Web Security. Cisco offers Incident Response, Advisory, Integration and Managed services as well. With Cisco’s Managed Services, organizations are able to lower operational expenses and take advantage of advanced analytics, Cisco’s global security operations centers, and a team of technical experts. The company provides monitoring and management to comprehensive and fully managed threat solutions.
GISEC SPOTLIGHT Cisco is extending Security Everywhere with new capabilities and services that deliver greater visibility, context and control from the cloud to the network to the endpoint, for organizations of all sizes. ë
RABIH DABBOUSSI, GENERAL MANAGER, CISCO UAE
Cisco helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected.
•WHERE to use those technologies and •HOW those technologies address the specific problem (and eventually evolve)
Cisco delivers intelligent cybersecurity for the real world, providing one of the industry’s most comprehensive advanced threat protection portfolios of solutions that is pervasive, integrated, continuous, and open.
TOMORROW´SECURE´
BUILDING SECUREDANETWORK
SHOWCASEVENDOR 18 MARCH
•The scope of WHAT technologies they can use
Identity-based user and device authentica tion is critical to securing applications and data across mobile and cloud deployments.
BUILDING2016 A
Currently, Operational Technology (OT) and Information Technology (IT) often do not work in tandem, creating gaps in information and security vulnerabilities. As infrastructure evolves with IoE, Cisco solutions secure IT & OT systems to offer greater protection, quicker action, and richer context for intel ligence based decisions.
Cisco has an extensive security portfolio which includes solutions for Access Control and Policy, Advanced Malware Protec tion, Email Security, Firewalls, Network Security, Next Generation Intrusion Prevention System (NGIPS), Security Management, VPN and Endpoint Security Clients and Web Security.
AN EDGE ABOVE THE REST In addition to providing one of the industry’s most comprehensive advanced threat protection security portfolios. Cybersecurity solutions need to protect not just networks and devices, but also critical applications and data.
PARTNER ECOSYSTEM AND STRATEGYENGAGEMENT
Cisco ensures that we train, enable and certify our partners and offer them the latest security solutions such as Cisco ASA with FirePOWER and Cisco ISE. Through our Channel Partner Program, which is designed to strengthen our partners’ ability to capture market opportunities, we train, enable and support our partners and help them gain a competitive edge. We conduct regular training programs, road shows and certification workshops and also incentivize and reward our performing partners.
FRAMEWORKSECURITY
Our framework for security, divided into three phases that allow customers to understand:

DECODINGENCODING OPPORTUNITIESPOSSIBILITIES ARE YOU ONE? IT’S ONCE AGAIN THE TIME TO FLASH THE SPOTLIGHT ON THE TRAILBLAZERS WITNESSAPRIL6-72016THEUNVEILING OF THE FUTURE OF IT REGISTER NOW IT´S ONCE AGAIN TIME TO PUT SPOTLIGHT ON THE NOMINATETRAILBLAZERSNOW GLOBAL ENTERPRISE CONNECT BROUGHT BY ORGANISED BY Anushree <anushree@accentinfomedia.com> or Shamal <shamal@accentinfomedia.com> Ronak <ronak@accentinfomedia.com> FOR MORE INFORMATION VISIT GECOPEN.COM OR CONTACT VENUE


The partners should have strong relationships with their customers and have a history of delivering successful Security technology solutions to their customers. In being able to deliver these solutions, it is critical that the partner has a depth and breadth of technical capabilities with experts in their various disciplines. Primarily, a Digital Guardian Partner needs to be able to demonstrate their deep understanding of their customers’ requirements and challenges. They should have strong credibility and heritage in providing solutions to these challenges.
EVOLVING ICT ARCHI TECTURE AND CISO/ CIO
AN EDGE ABOVE THE REST
The Digital Guardian Data Protection Platform is the first and only DLP solution to combine traditional DLP functionality with advanced threat detection capabilities using the SAME endpoint agent and the SAME manage ment console. Additionally, Digital Guardian offers instant visibility into the movement of sensitive data with a patented and proven kernel level agent that (1) provides the strongest indepen dent context-aware agent on the market and (2) conducts the system event log ging and monitoring required to detect and remediate malicious outside attacks.
PARTNER ECOSYS TEM AND ENGAGE MENT STRATEGY
BUILDING SECUREDANETWORK
SHOWCASEVENDOR 20 MARCH 2016 $619m GUARDING SECURITY
The role of the CISO/CIO has evolved from being reactiveto being a business-enabler across the company. The CISO/CIO is viewed as the figurehead in all IT operations and should have a place on the executive leadership team for strategic planning initiatives while assisting to meetcor porate objectivs. At the same time the CISO/CIO must be responsible for having the proper security measures in place to compete with the evolving threat landscape.
LUKE BROWN, GM & VP, EMEA, INDIA AND LATAM AT DIGITAL GUARDIAN
The 451 Group estimates total DLP revenue for the leading vendors was $619m in 2014, up more than 26% from the previ ous year. The firm predicts 22% CAGR through 2019, when total annual revenue will reach $1.7bn.
The Digital Guardian platform performs across the corporate network, traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. Digital Guardian’s data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, enables you to protect data without slowing the pace of your business.
Data Loss Prevention, Advanced Threat Prevention, Endpoint Detection & Response. We aim to provide corpora tions with ubiquitous data protection independent of the threat actor, the data type, the system, the application, the device, or the point of access.A core strength of DG is preventing theft of IP and trade secrets. DG’s ability to protect often unstructured IP based on a mix of context and content awareness and user classification, offers the flexibility to define what sensitive data is and where regardless of the file type. I am delighted to partner with Credence Security as the DG partner of choice for the region.
MAJOR VAD Every region has its own specific charac teristics and these need to be respected by any technology vendor wishing to do business in that market. It is therefore critical to work with the correct partners in each region to ensure these charac teristics are being respected, and I am delighted to partner with Credence Security as the DG partner of choice for the region. ë

IVAN DOLENSKY, VICE PRESIDENT INTERNATIONAL SALES AT FIDELIS CYBERSECURITY
STORMING SOLUTIONSSECURITY
Fidelis Cybersecurity protects the world’s sensitive data by equipping organizations to detect, investigate and stop advanced cyber-attacks. With two core products Fidelis network and Fidelis endpoint the organization believes in delivering a secured structure for catering to security needs of customers. Its security team has provided testimony in more than 100 court proceedings and they also successfully guided one of the largest forensic laboratories (DCFL) to achieve international digital forensic accreditation.
52% During the first nine months of the year, Fidelis announced that it had grown 52 percent on a year-over-year basis and that it has grown its employee base from 150 to more than 300.
By analyzing all network traffic at multi-gigabit speeds in real time, Fidelis provides security teams with the visibility, context and speed required to identify threats and ensure data theft never happens.
MAJOR VADS Our main distributors are Spectrami, RedingtonGulf and Credence Security and customer facing channel partners. We are on the forefront of the field enabling our channel partners.
SOLUTIONS Fidelis Network – this solution analyses network traffic at multi-gigabit speeds in real-time. It detects the tools and tactics of advanced attackers – including advanced malware, exploits, command and control activity, and data theft techniques – that can often get past traditional network security systems, such as firewalls and intrusion prevention systems.
AN EDGE ABOVE THE REST
BUILDING SECUREDANETWORK
Fidelis detects the tools and tactics of advanced attackers. With Fidelis, orga nizations can initiate investigations in response to threats at both the network level and to endpoint devices – across all ports and protocols, without depending on third-party proxies. The technology can identify attacker behavior, including lateral move ment across the network to establish command-and-control footholds that allow data to be stolen.
SHOWCASEVENDOR 21MARCH 2016
Fidelis Endpoint - allows an organiza tion to initiate an investigation and respond to a threat, no matter where it is in the corporate environment – network, endpoint or mobile device – across all ports and protocols, without depending on third-party proxies. The combined technology which underwent significant updates in October 2015 – can also identify attacker behavior, including where there is lateral movement across the network to establish command and control footholds, allowing data to be stolen.
Fidelis Cybersecurity has moved beyond its heritage of network-based detection, prevention and monitoring capabilities by acquiring Resolution 1 Security and incorporating network, endpoint and mobile protection. With Fidelis Cybersecurity you can reduce the time to detect and resolve security incidents so you can stop attackers before they stop you.
CREATING DIFFERENCEA Fidelis Cybersecurity has moved beyond its heritage of network-based detection, prevention and monitoring capabilities by acquiring Resolution 1 Security and incorporating network, endpoint and mobile protection. ë

SECURITY2016 AT THE HEART
TEM AND ENGAGE MENT STRATEGY
Fortinet is a 100% channel driven company, and sells only through the channel. We have an established channel presence and network across the Middle East which has grown exponentially. 100% dedicated to security, Fortinet provides its channel base an unparalleled business opportunity on the market by delivering the most complete portfolio of IT security solutions. We recently revamped our partner program to include new certifications and re-align partner levels.
ALAIN PENEL, REGIONAL VICE PRESIDENT - MIDDLE EAST, FORTINET.
BUILDING SECUREDANETWORK
MAJOR CUSTOMERS
AN EDGE ABOVE THE REST Technological innovation is at the heart of Fortinet’s strategy to address the stringent security requirements of its customers. Fortinet’s solutions are continuously enhanced with the latest technological innovations to remain at the forefront of the industry in terms of functionality and performance at the best price. As part of our overall data center strategy, we are closely with a large and growing number of partners to tightly integrate security within their key infrastructure platforms.
Fortinet’s products and subscription services scale to meet the requirement of every business size and cover each solu tion segment from Firewalls, to DDos, Mobile and Cloud Security, SDNS, and provide broad, integrated and high-per formance protection against dynamic security threats while simplifying the IT security infrastructure. Its customers include enterprises, service providers and government entities worldwide, including high-profile customers in the region. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify IT infrastructure for large enterprises as well as SMB’s. From wired/wireless networks and messaging systems to web applications, databases and much more, Fortinet’s solutions portfolio helps secure the broad enterprise information infrastructure, allowing customers to ensure security and control of their networks, users and data.
Fortinet designs, develops and markets its portfolio of products and services to deliver high performing network security platform that allows organizations to securely build and grow their IT infrastructure. Fortinet offers a broad set of complementary solutions that allow customers to further secure and simplify their networks.
MAJOR VADS
INNOVATION
Fortinet works with Exclusive Networks for the Middle East, with Redington Value in GCC, Saudi Arabia, Levant, Pakistan and Sub-Saharan Africa, Oxygen in Saudi Arabia and Online distribution in Pakistan
In the past 18 months, Fortinet deployed a variety of its network security solutions in telcos, universities and banks such as JS Bank, The Holy Spirit University…. ë
PARTNER ECOSYS
SHOWCASEVENDOR 22 MARCH


AN EDGE ABOVE THE REST Our holistic security solutions are based on the integration of encryption and authentication solutions with widely deployed technologies to create a safer world for data and applica tions. Gemalto has been working to constantly update its solutions to the market requirements by addressing the complexities brought on by the technological trends.
LAURELS OF 2015
selected Gemalto to provide and operate its Mobile ID solution for secure mobile authentica tion token. In Saudi Arabia, Riyad Bank launched a few months ago the country’s first contactless EMV bank card with Gemalto. Recently, Gemalto became the first mobile payment vendor to receive full MasterCard approval for a complete Cloud-
Gemalto enables companies and admin istrations to offer a wide range of trusted and convenient services by securing financial transactions, mobile services, public and private clouds, eHealthcare systems, access to eGovernment services, the Internet and internet-ofthings and transport ticketing systems. Gemalto offers multi-layered and more data centric approach solutions which are gaining more demand as they ensure minimal damage when a breach occurs. Strong user authentication has been an increasingly essential component of the security framework as it offers IT administrators a multilayer approach to access control.
SHOWCASEVENDOR 24 MARCH
PORTFOLIO FOR NEXT GEN SECURITY
ROBUST2016
We just announced that MTN Nigeria, larger mobile operator in the country with over 70 million subscribers, Based Payment (CBP) solution. In December 2015, Gemalto was awarded by three market research analysts as the world’s number one supplier of contact less and mobile solutions for public transportation. Also the company was recognized as a Representative Vendor for its issuer tokenization solution in Gartner’s industry Market Guide last year.Major distributors and VADs. In the Middle East region, Gemalto works with StarLink.
PARTNER ECOSYS
BUILDING SECUREDANETWORK
TEM AND ENGAGE MENT STRATEGY Gemalto is significantly expanding its global network of channel partners focused on data security solutions for enterprises, financial institutions and other organizations. Gemalto strongly relies on the company’s strategic channel partnerships with leading distributors and resellers across the EMEA region and will continue to invest in building a strong channel to support the growing customer base and enabling them to develop new solutions. We continue to grow our Cipher Partner Program which was built to offer access to a portfolio of the industry’s most innovative IT security solutions, along with support and benefits specifically designed to match our partners’ business models and business goals. ë
SÉBASTIEN PAVIE, REGIONAL SALES DIRECTOR, MEA AT GEMALTO Gemalto’s unique technology portfolio ranges from advanced cryptographic software embedded in a variety of familiar objects, to highly robust and scalable back-office platforms for authentication, encryption and digital credential management. A detailed understanding of the importance of security and remarkable growth in the past few years makes Gemalto a trusted organization.

AN EDGE ABOVE THE REST Pulse Secure is the single vendor of choice for the next generation of Secure Access needs. Pulse enables connectivity to corporate resources from any device in any location while allowing the administrator to maintain visibility and control. Pulse has the flexibility to vary the level of access granted depending on who the user is, where they are, and the security posture of the device they are using.
SOLUTIONS
SECURING THE PULSE OF SECURITY
BUILDING SECUREDANETWORK
Pulse Secure’s vision is to be the leader in providing Secure Access for the Next Generation of Workers, Applications, Networks and Things. We have been the market leader for SSL VPN connectivity, and have a strong Network Access Con trol portfolio. We are now consolidating this to provide Secure Access for all plat forms. We have four key solutions: Pulse Policy Secure, Pulse Connect Secure, Pulse Workspace , Pulse One.
We have four key solutions:
1) Pulse Policy Secure – Provides contextaware security policies, analyzing user, role, device, location, time, network, and app - and compliance status information
3) Pulse Workspace - A trusted BYOD container for iOS and Android that secures apps and preserves the native user experience4)Pulse One – Provides centralized management of enterprise access to the data center and cloud from one console. ë
2) Pulse Connect Secure - Empowers mobile and remote workforces by support ing their work style with a proven mobility access solution
Pulse Secure is a provider of secure access and mobile security solutions to both enterprises and service providers. Enterprises from every vertical and of all sizes utilize the company’s virtual private network (VPN), network access control (NAC) and mobile security products to enable worker mobility securely and seamlessly in their organizations.
LAURELS OF 2015 Without a doubt, separating from Juniper Networks and operating as an independent entity was our biggest milestone. Another big milestone was the rollout of our channel program; Connect Now. In terms of customer wins, we secured deals with a couple of large government entities in Saudi Arabia and Abu Dhabi for our connect secure product line.
SHOWCASEVENDOR 25MARCH 2016
PARTNER ECOSYS TEM AND ENGAGE MENT STRATEGY
ABDUL REHMAN, REGIONAL SALES MANAGER AT PULSE SECURE
Our partner engagement model is unique. We focus on the capabilities of the partner rather than stress on certifications to define the partners tier status. This is important for us as we put the emphasis on the partner being self sufficient in catering to their customers needs.Wealso have a strong deal registration process, which rewards and protects the partners that are making an investment in partnering with us.


FIDELIS For
DON’T MISS 26 MARCH 2016 SECURITY MARKET
FINESSE We have partnered with top vendors to provide more solutions and services in the IoT, Big Data, Governance Risk & Compliance and Converged Infra structure domains.
we
BULWARKS There is a huge demand and require ment of new frontiers like Social media, cloud, Big Data, mobile & Internet of Things. There would also be significant develop ment in the areas of Storage and Security that would show substantial growth and gain momentum this year.
FUTURE SECURITY SOLUTIONS
GROW $170 BILLION BY 2020
SPECTRAMI Major security mea sures that enterprises should adopt is, Adopt a zero trust model on the network and keep reinnovating a long While it is challeng ing to predict which threats will cause the most damage in the future, believe that trends like encryption, IoT, mobility, cloud and
risksdangerousdronesInternet-connectedwillintroducesecurityin2016. OVERVIEW $10billion MIDDLE EAST CYBER SECURITY MARKET TO VALUE $10 BILLION BY 2020 $101billion GARTNER SAYS WORLDWIDE SPENDING ON INFORMATION SECURITY TO REACH $101 BILLION IN 2018 $170billion
THE SECURITY MARKET IS ESTIMATED TO
capabilities.responsedetection,towardsseencyber-attacks.thatproductsthatadoptedMiddleenterprisestime,intheEasthaveamindsettheyrequireandservicespreventadvancedWehaveashiftrecentlyinvestinginincidentandforensic A10
CYBER
SECUREPULSE Having a strong mobil ity or BYOD solution to provide Secure Access for remote or mobile workers to make them more productive is what enterprises need to look at. $8.7 60% of data is stolen in hours. 54% of all attacks are not detected for months or even years
FORTINET
CISCO A strong operational security model needs to be built by secu rity and IT leaders by having an open dialogue with business leaders, who define common goals and measure progress with metrics are able to determine accept able levels of risk that translate into the most efficient deployment of a company’s limited IT resources.
$8.7billion THE CLOUD SECURITY MARKET IS EXPECTED TO BE WORTH
2019
GUARDIANDIGITAL Threat servicesintelligentarelikely to be commissioned to provide reports and validation on malicious threats – but they are only effective if IT teams can take action on the intelligence and mitigate the threat before it becomes a full-scale attack.
BILLION BY 2019 $1billion GCC COUNTRIES ARE AMONG THE GLOBAL LEADERS IN CYBERSECURITY PREPAREDNESS, AS THE REGION’S NETWORK SECURITY SPENDING WILL TRIPLE TO $1BN BY 2018.
The best security measure is to have a remoteers,connectionsextendedtakeThatwheredatacentertheentireencompassessecuritycomprehensivepolicythatthenetwork,fromendpointstotheandeveryinbetween.policyshouldalsointoaccountthenetwork;thetosuppliconsultantsandworkers.
27MARCH 2016 THE REPORTCISCO FACTS AND FIGURES FROM CISCO
GEMALTO Traditional security methods such as firewalls and anti-virus should be integrated in a more evolved and robust security strategy.
Only 45 percent of organizations worldwide are confident in their security posture Cisco reports stopping an average of 320 million cyberattacks each day, up substantially year over year. According to some estimates, up to 90% of organisations are not fully aware of devices accessing their network;
CISCO ESTIMATES CYBERCRIME TO COST BUSINESSES $2.1T GLOBALLY BY
CHALLENGES
PARTNER ECOSYSTEM
MILESTONES OF 2015 Major achievements include deployments in Business Intelligence & Analytics solutions and dashboards, Management Information System solutions, Enterprise Process Manage ment Solutions, Governance Risk & Compli ance Solutions, Consulting and support services for Enterprise Content Management and Enterprise Information Management, outsourced security and process management services. ë
10mn
Our turnover has crossed USD 10 million in 2015 and we have maintained a steady 50% YoY growth till date. various domains and the leading products / solutions currently used by global organizations. Our competency model is built on the basis of providing value by being a service provider with a deep understanding of the business function that our teams deliver. We were one of the first to recognize and build our strategy on the basis that sooner or later pure technology skills would become a commodity product. This basis has been proven today by the edge we are able to garner in the solution consideration by the customer.
SUNIL PAUL, COO AND CO-FOUNDER, FINESSE TIGHT KNIT SOLUTIONSSECURITY
SOLUTION PORTFOLIO
Finesse provides solutions for verticals backed up by industry domain experts.
UNIFIED SOLUTIONS FOR MULTIPLE
We work with customers to come up with a solution that focuses on their business objectives, adding value in process enablement and reduce operational cost.
Finesse currently provides solutions for Informa tion Risk Management and Data Loss Prevention. We also provide Compliance and Real Time Fraud Management solutions to the banking and financial services industry. Finesse system inte gration services include the supply, installation and integration of infrastructure, software, and onsite support services. Our services are backed by our partnerships with leading technology vendors such as IBM, Oracle, Microsoft, Tagetik, Software AG, EMC, Qlik, VCE, MetricStream, Seclore, Kofax among others. We have a very strong managed security services portfolio and solutions for Information Rights Management, Data Loss Prevention, Security Information and Event Management. Our customer base is spread across the BFSI, Healthcare and education verticals.
Providing for a unified solution for clients that meet all their requirements, coming up with unique solution and integrating everything for each client.
Identifying and suggesting the right business solution to our clients spread across multiple domains, in depth knowledge of technology.
Apart from our Information Security portfolio, our solutions and services for Business Intel ligence & Analytics, Enterprise Performance Management, Enterprise Content Management, Governance Risk & Compliance and Converged Infrastructure are exceptionally qualified to deliver innovation with measurable performance. It believes in delivering tangible value through Cloud-Ready Solutions, Mobile Devices and Social Media Platforms. Our services are backed by our partnerships with leading technology vendors such as IBM, Oracle, Microsoft, Tagetik, Software AG, EMC, Qlik, VCE, MetricStream, Seclore, Kofax among others.
The continuous extension of solutions portfolio based on market dynamics makes it a trusted system integrator of the region.
SHOWCASEPARTNER 28 MARCH 2016
STRENGTHS
Finesse consultants possess excellent functional, operational, and technical knowledge of the OPPORTUNITIES
DOMAINS
























PRIME STRATEGY Channel development and growth into focused territories across GCC and Middle East has been our constant endeavor. As part of this strategy, we execute comprehensive, action-oriented and established Channel programs which benefits our channel through deal registrations, better rebates, joint marketing activities, technical and sales enablement and promotes greater synergy among our vendors and partners and added value to end customers.
It was a year of adding major Security vendors & building a stronger Information Security product and solutions portfolio, along with the launch of two entities of distribution; Bulwark Distribution and Bulwark Technology
MAJOR CUSTOMERS Banking & Finance, Oil & Gas, Government, Manufacturing, Hospitality, Medical and Education. ë
A well planned strategic approach along with a futuristic know how of the market makes Bulwark Technology a key player in this region.
Bulwark has excelled in providing and delivering value-added services, that include solutions pre-sales consulting, training, channel enable ment programs, post-sales implementation and technical support, and adding value at every stage of product life cycle. We execute comprehensive, action-oriented and established Channel pro grams which benefits our channel. We provide tailor-made offerings to the verticals. Bulwark plans to keep its channel community up-to-date on the specialized cutting-edge technology products and solutions. It is our continuous and ongoing effort to invest on channel initiatives.
SHOWCASEPARTNER 30 MARCH 2016 BULWARK TECHNOLOGIES JOSE THOMAS, MANAGING DIRECTOR, BULWARK TECHNOLOGIES TIGHT KNIT SOLUTIONSSECURITY Bulwark Security Distributor comprises of more than 20 vendors, who provide security technolo gies like data governance, privileged identity management, managed file transfer solutions, endpoint security, unified threat management/ firewall amongst other specialized security solutions with the aim of bringing the best in technology to the Middle East region to address the region’s growing cyber security needs. Bul wark has a wide array of ‘Best in Class’ Security products and solutions from key vendors like; l Sophos – Unified Threat Management/End point Security l Varonis – Enterprise Data Governance l Arcon - Privileged Identity Management Solution l Securenvoy – Tokenless Two-Factor Authentication l Linoma – Secure Managed File Transfer l Netwrix – Change Auditing Solution l ESET - Antivirus l Mailstore – Email Archival l Netsupport – IT Asset Management / Classroom Management l SendQuick – Gateways for Enterprise Mobility OPPORTUNITIES New EmergingPartnersMarkets in the Security AdditionDomain of more products to provide complete range of products/solutions in the Security domain CHALLENGES There is a greater demand for emerging technologies as new frontiers of technologies like Social media, cloud, Big Data, mobile & IoT are evolving in the market. STRENGTHS Channel ExperiencedFocusManagement Team Proven cutting-edge technology HousesLeadingsolutionsvendorsateamof experienced Sales and marketing experts WEAKNESSES Logistics and credit facilities 40% Bulwark has showcased a significant turnover in rev enue in the year 2015 and we are anticipating greater than 40% growth in rev enue in the current year. l Radar Services – Risk Detection and Intel ligence Service l Kerio – Mail Server / Firewall / VOIP based PBX l Jacarta – Environmental and Power Monitoring PARTNER ECOSYSTEM
MILESTONES OF 2015

Copyright © Unify Software and Solutions GmbH & Co. KG 2016 Connect. Share. Give. Take. Solve. Save. Smile. Unify. Introducing Unify. Unifying business communications for the new way to work. unify.com 13481_Unify_Ad_Channel Arabic_275x240_v1.indd 1 25/01/2016 14:09
l Banking and Finance – ADCB, ADIB, ENBD FGB, QNB, Boubyan Bank, Bank sohar etc l Government, MOI – Qatar, ADIA, PASI, etc l Oil and Gas – ADCO, Oryx, ZADCO,OGC, etc l Enterprise – EMAL, Oman Airports, etc. ë l Exabeam – User Behavioiur Analytics. l Storage platform includes; l Actifio – Copy Data Management l Pure Storage – Flash Storage System. OUR MAJOR CUSTOM ERS INCLUDE l Telco – Omantel, Nawras Telecom, Etisalat, Mobily, etc
customer focused events such as TechCafe and CIO
–
ANAND CHOUDHA, DIRECTOR AT
PARTNER ECOSYSTEM AND STRATEGYENGAGEMENT have three kind of partners, strategic, opporutnity based and Large SI, strategic are not more then 2 per technology per country, which helps us focus on them and invest on them so they develop the business and more importantly also reap benefits, opportunity are purely transaction partners and we work with them on opportunity basis while Large SI are the ones who make us part of their larger deals
MANAGING
l
l
consultants,GreatSTRENGTHSmonitoring.teamoftechnicalgoodproduct line,
l Fidelis by General Dynamics – Advanced Threat Defense System – Security Intelligence Platform Tenable – Network Monitoring and Vulnerability CA / Xceedium – Privileged Access Management, Good – Secure Mobility Solution A10 – Application delivery controll R Open Source solution Packet Ninja Cyber Security Solution
PORTFOLIOPRODUCT/SOLUTION
SlewCHALLENGESinfrastructure.oftechnologies committing and under customers expecting to have a black box solution, security is more of an artisan which requires continuous complementing framework strategy 2014 – $10M , 40% growth model. It hosts round table sessions resiliency.
SPECTRAMI.
Extended local presence in Kuwait and Oman, reached the FY14 target in first nine months, looking at 60% growth this year
SHOWCASEPARTNER 32 MARCH 2016 SEAMLESS BLEND OF NICHE SOLUTIONS
delivering,
over
We
l
l
l
TheOPPORTUNITIESsecuritymarket has huge opportunity for customers who are looking at bridging the security deficit and strengthening their
We
l LogRhythm
for vendors and resellers to attain higher operational efficiency and
TIGHT KNIT SOLUTIONSSECURITY essentially specialize in leading and bleeding edge security for customers in areas of offensive and defensive practice. Today we have solutions around SIEM, Vulnerability Management, Privileged Identity Management, APT protection among others.
40%
edHat –
YOY
l
MILESTONES OF 2015
Spectrami has created a 100% channel driven business

ManageEngine’s IT security solutions precisely help organiza tions in this aspect. ë
Emerging trends like mobility, virtualization and cloud adop tion have certainly complicated IT security. But, organizations can easily overcome the issues by ensuring the basic controls.
Especially, privileged access should be not just centrally controlled, but also closely and continuously monitored.
THREATSBATTLINGREADINESSENTERPRISEFORTHEEVOLVING
V
Nowadays, it is quite common for employees to use the same login credentials for multiple sites – social media, banking, brokerage and other business accounts. If the password gets exposed in any of the sites, in all probability, hackers would be able to easily gain access to all your other accounts too.
As things stand today, the biggest threat to the information security of your enterprise might be germinating inside, right at your organization! The business and reputation of some of the world’s mightiest organizations have been shattered in the past by a handful of malicious insiders, including disgruntled staff, greedy techies and sacked employees.
An analysis of some of the recent high-profile security breaches reveals that the threat landscape is rapidly evolving with Advanced Persistent Threats (APT) leading the way. Though there are numer ous loopholes, inadequate access controls and internal security measures, improper password management and lack of monitor ing and log reviews are found to be causing the majority of cyber attacks.Thehackers’ predominant activities include spreading malware infections, siphoning of login credentials and denial of service attacks that disrupt service to legitimate users. The traditional security attack channels include viruses, keylogger trojans and cross-site scripting. Perimeter security software and traffic analysis solutions help in combating traditional attack vectors. However, hackers have changed their modus operandi in recent times. Cyber-criminals are now siphoning off login credentials of employees and administrative passwords of IT resources, using techniques that include spam and phishing emails, keystroke loggers, and Remote Access Trojans (RAT). Majority of the attacks on IT infrastructure (on-premises and cloud infrastructure) are centered on brute force attacks on administrative credentials. Hackers always set their eyes firmly on the Keys to the Kingdom – the administrative credentials for control panel/management console and employee credentials.
Insider Threats – Another Top Concern
MY VIEWS 33MARCH 2016
GRABBING THE CYBER
Organizations of all types and sizes face the tough challenge of ensuring information security and data integrity. V Balasubramanian, Marketing Manager, IT Security, ManageEngine shares his expert opinions on how to combat the increasing threats and watch out for the cyber thugs.
How ManageEngine helps combat?
THUGS
Administrative passwords, system default accounts and hard-coded credentials in scripts and applications have all found themselves in the cyber criminal’s sights. Lack of internal controls, access restrictions, centralized management, accountability, strong policies and to cap it all, haphazard style of privileged password storage and management makes the organization a paradise for malicious insiders.
The situation becomes much graver if a stolen password has also been used to access a variety of applications and websites.
BALASUBRAMANIAN, MARKETING MANAGER, IT SECURITY, MANAGEENGINE
Once the login credentials of an employee or an administra tive password of a sensitive IT resource is compromised, the institution will become a paradise for the hacker. The criminal is then able to initiate unauthorized wire transfers, view the transactions of customers, download customer information, erase details or carry out sabotage.
Combating sophisticated cyber-attacks demands a multipronged strategy incorporating a complex set of activities. As outlined earlier, important combat measures include deploying security devices, enforcing security policies, controlling access to resources, monitoring events, analyzing logs, detecting vulnerabilities, managing patches, tracking changes, meeting compliance regulations, monitoring traffic and more.
BY HORNS

are
SHOWCASEPARTNER 34 MARCH 2016 A ONE-STOP SECURITY TERMINUS
PORTFOLIOPRODUCT/SOLUTION
PRIME STRATEGY Being a one-stop-terminus for specialized InfoSec Solutions & Services, while hand holding partners to extend niche security platforms to an assortment of businesses.
STRENGTHS Technically strong extending the much needed value add to partners specially on niche technologies With specialized InfoSec solutions and services, ComGuard holds their partners hands to deliver niche security solutions to the market. Threat Management / Content Filtering / BYOD Solution, Wireless Intrusion Prevention System (WIPS) / Secured WiFi (WLAN) / Cloud Secured Wi-Fi, Application Delivery Controller / Access Gateway(AG) / WAN Optimization, Authentica tion / Data Encryption, Network Recorder, Analysis and Monitoring, DNS / DHCP & IPAM, Network Automation, Identity and Access Management, End User IT Analytics, Web Appli cation & Penetration Testing, Privileged Access Management (PAM) / Vulnerability Management / Active Directory Audit, 4th Generation Mali cious DLP Solution, Cybersecurity / Network Performance Optimization, Anti-virus, Disk Encryption, Mobile, UTM, Real-Time Endpoint Threat Detection & Response, Security Configu ration Management / Vulnerability Management / Log Management. ë 9.89 LAKH10.35 LAKH 19.20 LAKH 2012 2013 2014 2015 35.00 LAKH TURNOVER
Our vendors are our pillars of support, with majority of ours having been steadily with ComGuard for a substantial amount of time. ComGuard is their extended arm wherever need be, providing partners and end users with certified and professional support options with least downtimes and prompt assistance. With over a 1000 partners within the region, our partner ecosystem is one of the key reasons for our success. We try to engage them with various promotions, partner programs, roadshows, webinars and conferences, in order to enable and keep them up-to-speed with the ever changing security landscape.
Security Information and Event Manage ment (SIEM), Intrusion Prevention System (IPS) / Next Generation Firewall, Application Security, Encryption Solutions, Web Vulner ability Scanning, End Point Security / Network Monitoring and Security / eMail Security to which more organizations compelled very volatile market at present due to plummeting prices, as a result of which spends are less and even worse, payments are also either delayed or never happen
& Archiving Solution / Internet Faxing Solution, Antivirus and Internet Security, Web Filtering / OPPORTUNITIES Growing security threats owing
AJAY SINGH CHAUHAN CEO, SPECTRUM GROUP.
oil
PARTNER ECOSYSTEM AND STRATEGYENGAGEMENT
COMGUARD IN BRIEF
to deploy security solutions CHALLENGES A
ComGuard’s core business is Value Added Distribution in the Information Technology and Security space. ComGuard, the Flagship Division of the Spectrum Group of companies and brings to the fore a mix of complementing technology solutions in various disciplines

According to the Cisco Annual Security Report, 60% of data is stolen in hours. 54% of all attacks are not detected for months or even years and, if discovered, it may take several weeks before full containment and remedia tion are achieved. During that time, sensitive customer information and intellectual property is compromised, putting the company’s reputation, resources, and intellectual property at risk. Here are five techniques that online criminals are using to gain entry to networks in the Middle East and accomplish their mission that security professionals need to understand in order to more effectively defend their organizations.
THE TEMPO FOR TODAY'S LATEST ROUND OF CYBER ATTACKS
GUESTTALK 35MARCH 2016
In the hyper-connected world, cyber security attacks are a fact of life. Hackers today are highly organized, well-funded and financially driven. Today’s motivated attackers are disciplined and use systematic techniques that leverage advanced malware, spam, phishing and other cyber-attacks with strategic intent and goals. As adversaries continue to innovate they are accessing networks undetected and evading security measures while the security industry, as a whole, struggles to innovate at a similar pace.
1. Exploit kits: In the business world, companies strive to be known as an industry leader. But when it comes to exploit kits, the top spot isn’t as coveted. Producers of high-profile exploit kits like Blackhole have been targeted by authorities and shut down. As a result, attack ers are realizing that bigger and bolder is not always better – be it the size of malicious C&C (Command & Control) infrastructures or ways into networks.
3. More sophisticated spear phishing: Adversaries continue to refine messages, often using social engineering tactics, so that even experienced end users have a hard time spotting fake messages. The latest round of spear-phishing messages appear to come from well-known vendors or service providers from whom users commonly receive messages. These emails may include a trusted name and a logo and a call to action that is familiar to recipients, such as a notice about a recent order, or a delivery tracking number. This well-planned and careful construc tion gives users a false sense of security, enticing them to click on malicious links contained in the email.
5. Malvertising from browser addons: Malware creators have devised a refined business model using web browser add-ons as a medium for distributing malware and unwanted applications. Users pay a small fee to download and install applications such as PDF tools or video players from sources that they believe are legitimate. In reality the applications are bundled with malicious software. This approach to malware distribution is proving successful for malicious actors because many users inherently trust add-ons or simply view them as benign.
Attackers make money from many individual users in small increments by persistently infect ing their browsers and hiding in plain sight on theirNotmachines.justinthe Middle East, but globally as well, security professionals and online criminals are in an ongoing race to see which side can outwit the other. Adversaries are becoming more sophisticated not only in their approaches to launching attacks, but also in evading detection in ways we haven’t seen before. But defenders aren’t standing still. By continuing to innovate and learn based on what we’re seeing in the wild, defenders can identify and thwart the latest round of attacks. ë
4. Sharing exploits between two differ ent files: Flash malware can now interact with JavaScript to hide malicious activity by sharing an exploit between two different files and formats: one Flash, one JavaScript. This conceals malicious activity, making it much harder to identify and block the exploit, and to analyze it with reverse engineering tools. This approach also helps adversaries to be more efficient and effective in their attacks.
2. Snowshoe spam: So named because much like a snowshoe that has a large but faint footprint that is harder to see, with this technique the attacker spreads a lot of messages across a large area to avoid detection by traditional defenses. Snowshoe spammers send unsolicited bulk email using a large number of IP addresses
ZIAD SALAMEH, MANAGING DIRECTOR & GENERAL MANAGER GULF, LEVANT & PAKISTAN AND MIDDLE EAST SERVICES LEADER, CISCO SYSTEMS and at a low message volume per IP address in an attempt to bypass IP-based anti-spam reputation technologies. They rapidly change body text, links, the IP addresses used to send from, and never repeat the same combination.

THE SECURITY ADVISOR MOHAMED DJENANE, SECURITY SPECIALIST - ESET MIDDLE EAST RABIH DABBOUSSI, GENERAL MANAGER, CISCO UAE GLEN OGDEN, REGIONAL SALES DIRECTOR, MIDDLE EAST AT A10 NETWORKS ESET CISCOA10 n Focusing on the User awareness n Keeping your passwords secure and use of OTP: n Implementation of Endpoint Protection n Perimeter protection n Data encryption and backup n Vulnerability assessment, and penetration testing n Personnel training and awareness n Threat-centric orientation that extends beyond standard policies based on past events n Pervasive internal monitoring n Sharing of security intelligence within and between organizations n Implement a multi-layered defense to protect servers and endpoints VOLUME 1 TIPS: SECURITY MEASURE NOT TO MISS
With the dawn of the era of digitalization, the CISOs and the CIOs are going through a transitional phase and they have to reinvent themselves on the techno logical regime to live up to the change. The chang ing role of the CIOs have been the talk of the town of late and we can also see a good number of CIO focused events, summits, forums and clubs coming up to further empower and fuel their role. Amidst all these, the enterprise security should never play a spoilsport in ruining the ambitions of the CIO. Security is no more just a worry on the brow of the IT department. It is an enterprise challenge that a business needs to address keeping a holistic view of the entire infrastructure in mind. took the opinions of some key industry veterans to know, what according to them are the critical security measures that business should not miss out on.
We
DON’T MISS 36 MARCH 2016




FORTINET
Having a strong mobility or BYOD solution to provide Secure Access for remote or mobile workers to make them more productive is what enter prises need to look at
The internal network architecture should also be segmented to prevent lateral movement of malware.
37MARCH 2016 ABDUL REHMAN, REGIONAL SALES MANAGER AT PULSE SECURE JIM DANIEL, DIRECTOR OF SALES AT ESENTIRE ALAIN PENEL, REGIONAL VICE PRESIDENTMIDDLE EAST, FORTINET.
Have a comprehensive security policy that encompasses the entire network, from the endpoints to the datacenter and everywhere in between
Focus on detection and response over the traditional focus on prevention alone Have the means and ability to detect these events early, and contain and mitigate them quickly
n
n
Implementing a robust solution that provides both technology and human intelligence
n
The security policy should encom pass technology that focuses on three key areas; detection, prevention and mitigation
n
PULSE SECURE ESENTIRE
n
n
n




SIGNS TO DETECT A DDOS ATTACK n unusually slow network performance (opening files or accessing websites) n unavailability of a particular website n inability to access any website n dramatic increase in the amount of spam you receive in your account
n
The Serbian president’s website faced a large-scale “hacking” attack on Monday, which brought it down for several hours, his press office said. A statement carried by Tanjug explained that the distributed denial-of-service attack (SYN flood) targeted www.predsednik.rs, and that the president’s website is “subject to daily hacking attacks.”
• When choosing an ISP, an organization should pay particular attention to what level of DDoS protection they provide. If none is available, they should evaluate both cloud based DDoS mitigation services and on premise equipment and consider using both solutions collab oratively. Alain Penel, Regional Vice President - Middle East, Fortinet.
38 MARCH 2016 WHAT IS DDOS? n DISTRIBUTED DENIAL OF SERVICE WHAT’S A DDOS ATTACK? n A multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. KEY MOTIVE: n Preventing legitimate users from accessing a system or site. VARIOUS OUTCOMES TARGETED: n Criminal extortion technique n As a smokescreen to camouflage or draw attention away from other nefarious activity an attacker might be doing n Political hostility n To express displeasure against targets n To cause website downtime for big brand corporations, financial services companies, and even governments
• Most experts recommend that organizations should employ both on-site and cloud-based DDoS solutions, capable of detecting new attack threats in addition to known ones. Despite their increasing frequency, the tech nology to counter DDoS attacks exists, and is becoming more sophisticated. SébastienPavie, Regional Sales Director, MEA at Gemalto
In January 2016, HSBC reported that it was working with local police to find those who disrupted its online banking services with a denial of service attack, as customers complained of not being able to access their accounts. The attack was made even more painful for customers as the last Friday of the month is a traditional payday in the UK, the home of HSBC.
• DDoS attacks are disruptive in nature and pre vent businesses from operating. They can also be used to mask cybercriminals’ attempts at infiltrating a desired target network. Prepare your system and invest in an anti-DDoS solu tion to help prevent such attacks from occuring.
Luke Brown, GM & VP, EMEA, India and LATAM at Digital Guardian • Strong external network-facing access control lists (ACLs) should be instituted to keep outof-profile traffic off services. The upstream ISP should also be notified to place mitigations on their connected devices to protect networks. Spreading awareness about these types of attacks and reporting them to the authorities is also important.
• Ensure that your security system is flexible and capable of scaling to meet demand. For the foreseeable future, your system should be able to detect both application and network attacks and closely inspect information as it comes in. Glen Ogden, Regional Sales Director, Middle East at A10 Networks
• How an organisation responds, after a breach has been identified and contained, is vital to the future success of the organisation. Stopping a threat once doesn’t mean it has gone away for ever. So it is vital that security is seen as a living risk management process that is continuously learning and evolving. This involves improving systems, processes and human behaviour. Rabi hDabboussi, General Manager, Cisco UAE
RECENTLY IN NEWS:
• The counter measure may vary on the type of the DDOS attack, technique being used and the scale of the attack. The protection can start on the firewall level, which can block simple attacks based on the used IP addresses or based on the protocols. Mohamed Djenane, Security Specialist - ESET Middle East ë COUNTERING THE DDOS
THE DDOS DECODEDTHREAT
Ivan Dolensky, Vice President International Sales at Fidelis Cybersecurity
n
n Security vendor Imperva says it has observed a sharp increase in automated bot traffic directed at florist sites. Cyber criminals have shown a consistent tendency to exploit major news and seasonal events to slip phishing and other malicious attacks past unwary victims. And so it is with this Valentine’s Day as well.


Rittal Middle East FZE PO Box 17599, Dubai, UAE I Tel: +971-4-3416855 I Email: emanuel.i@rittal-middle-east.com For Enquiries: Keep up with the pace on innovations, increase functionality and scale the network conveniently with Rittal IT infrastructure portfolio offerings that deliver, ef ciency boosting solutions for customer speci c IT requirements. IT Security Room Scalable, System-tested security Multifunctional protection from physical threats RiMatrix S The first mass-produced data centre Simply plug in and its ready to use Experience the New Generation Smart Systems for IT Infrastructure from Rittal NETWORKING & SERVER CABINETS COOLING SYSTEMS POWER SYSTEMS IT SECURITY ROOM MONITORING & REMOTE MANAGEMENT Compact Server RoomTS-ITDatacentre-in-a-Box



© 2015 Dell Inc. All rights reserved. Dell Emerging Markets (EMEA) Limited is registered in England and Wales. Company Registration No: 3266654. Registered address: Dell House, The Boulevard, Cain Road, Bracknell, Berkshire, RG12 1LF. Company details for other Dell UK entities can be found at www.dell.co.uk With customer satisfaction and your profitability on the line, choosing a stable technology partner is a critical business decision. While other technology providers in the industry are splitting apart, Dell is committed to remaining a true source of end-to-end solutions. Certainty in an uncertain world — now that’s a choice you can make with confidence. Sell with confidence. Sell with Dell. To learn more, visit Dell.com/partner/yoursuccess One company. One source. One focus.