February Issue 2020

Page 1

@entitworld

@enterpriseitworld

@enterpriseitworld

R S 2 0   |   PA G E S 4 0   |   V O LU M E 0 4   |   I S S U E 1 2

WWW.ENTERPRISEITWORLD.COM

FOR THE CIOs. BY THE CIOs.

5G: RECONFIGURING TECHNOLOGY

RECONFIGURING

LIVES

The next big game changer in the industry is 5G. With the potential to revolutionize consumer experiences as well as the industrial Digital Transformation, 5G holds immense potential. Its application areas are vast and spread across all major sectors. 5G will effectively rewrite the way we perceive technology. P/14

FEBRUARY 2020



EDITOR’S  LETTER

COVIT-19: LIKELY TO HAVE INDELIBLE MARK ON THE GLOBAL ECONOMY

Hello Friends.

As 2020 February, the whole humanity is facing the greatest pandemic that can ever happen on the earth – that is Novel COVIT – 19. This is going to influence and affect every nation financially. The biggest supply chain hub – China holds key to the growth of every country. Since the largest nation is locked down due to the deadliest virus there is no movement from and to the country therefore supply chain around medicine, automotive, electronics, IT & Telecom, clothing, iron & steel and chemicals, etc. would be contracted for longer period. Most of the countries including the USA, India, European Nations and APAC will be affected due to the short supply. Today, India’s economic growth has been dubbed to be below 7% by the global finance majors and China’s growth is below 6.5% but due to the outbreak of the virus, China’s growth is expected to be around 3% and India’s growth would be much lower…so also other countries. We are going with massive digitization. The core of

COVER STORY

NEXT MONTH SPECIAL

CLOUD COMPUTING AND MULTI CLOUD STRATEGY The next issue is dedicated to Cloud Computing And Multi Cloud Strategy. We would like to take feedback from the CIOs and Vendors and create our judgment on the same.

the digitization is IT and telecom hardware, which comes from China. It means the juggernaut of growth would be disrupted on the mid-way. First victim is the government sector, which has laid down massive structure around infrastructure and control lies with the command and control center, which are compute based. Irrespective the nation where the server is based, the environment would be affected in next three – six months. Today, on the earth no organization which are into IT and Telecom have manufacturing independence of Greater China. If someone says that “we do not have China manufacturing”, it is a lie. They are dependent on China for some component if not the whole piece for achieving economy of scale. For example, Korean, American and Japanese automotive all are dependent on China for mass-scale production. India’s entire small phone population and telecom equipments are directly China made or components are sourced from China. Similarly, finished plastic products, iron products clothes and chemicals, etc., significant portion of the supply chain of India is dependent on China. Large manufacturing facilities are dependent on China. Therefore, it is a caution for the India incorporates to hold the breath and watch out how the things are panning out in next three – six months.

S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M

SUPPLEMENT

QUOTES FROM TOP CIOS The supplement story of the magazine would have relevant quotes from the top CIOs in India.

PLUS

Interviews and Case Studies

Catch interviews, guest articles and case studies of recent applications from the Industry stakeholders, IT/ITES Vendors and IT leaders and CIOs from the Enterprise IT World CIO Community.

Send in your inputs to sanjay@accentinfomedia.com FEBRUARY 2020    ENTERPRISE IT WORLD

3


CONTENTS V O L U M E 0 4   |   I S S U E 1 2   |   FEBRUARY 2020  |   W W W . E N T E R P R I S E I T W O R L D . C O M

FOR THE CIOs. BY THE CIOs.

Publisher: Sanjib Mohapatra Chief Editor: Sanjay Mohapatra Managing Editor: Anisha Nayar Dhawan Sub Editor: Pooja Jain, Nidhi Shail Designer: Ajay Arya Assistant Designer: Shadab Khan, Rahul Arya Web Designer: Vijay Bakshi, Sangeet Technical Writer: Manas Ranjan Lead Visualizer: DPR Choudhary MARKETING Marketing Manager: Vaishali Shukla SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016 Phone: 91-11-41055458

COVER STORY

14

E-mail: info@accentinfomedia.com EDITORIAL OFFICE

5G: RECONFIGURING TECHNOLOGY – RECONFIGURING THE TECH INDUSTRYLIVES The next big game changer in the industry is the 5G. With the potential to revolutionize consumer experiences as well as the industrial Digital Transformation, 5G holds immense potential. Its application areas are vast and spread across all major sectors. 5G will effecitively rewrite the way we perceive technology. But it also poses additional security threats and other challenges for the industries to combat.

GUEST TALK: /20 India to Emerge as World’s Largest Data Center Hub

MORE INSIDE Editorial~ ~~~~~~~~~~~~~~~~~~~~~~~~~ 03 News~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 05

24 FUTURE OF TECH INFUSED TRAVEL INDUSTRY HARISH CHANDRA

“CTO, Sarovar Hotels” 4

33

28 CLOUD MIGRATION NIKHIL TANEJA

“Managing Director-India, SAARC & Middle East, Radware.”

ENTERPRISE IT WORLD    FEBRUARY 2020

DELL TECHNOLOGIES LISTS TOP SERVER TRENDS FOR 2020 RUDRAMUNI B

“Vice President & India R&D Head, Dell Technologies.”

Delhi: 6/103, (GF) Kaushalya Park, New Delhi-110016, Phone: 91-11-41657670 / 46151993 info@ accentinfomedia.com

Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/103, (GF) Kaushalya Park, Hauz Khas New Delhi-110016

Phone: 91-11-46151993 / 41055458

Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.

35 CYBERSECURITY PREDICTIONS 2020 SURENDRA SINGH

“Senior Director and Country Manager, India & SAARC, Forcepoint..”


NEWS BRIEF   //  IT WORLD

ITWORLD

ROUND UP

B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

ESDS Expands its Foot Print to Kolkata ESDS has opened its new office in Bidhan Nagar, Kolkata, to support its rapid growth and leverage the high-technology talent pool in the region. This new expansion supports the company’s growth strategy in its mission to become a billion-dollar enterprise. Renowned Bollywood actress Raima Sen along with Piyush Somani, CMD, Founder and CEO, ESDS Software Solution Pvt. Ltd, inaugurated the new office in Kolkata. “ESDS has a proven track record of Digital India enablement with advanced technologies and we hope this new expansion helps West Bengal emerge as a Technology Leader in the coming years, while creating a surplus of employment opportunities for

upcoming talent,” said Raima Sen. “We are delighted to announce the opening of our new Kolkata office. This new facility is located close to some of the world’s leading high-tech companies. The location will give us access to a very large pool of the finest talent in the region, that we can use to fuel the continued growth of ESDS,” Piyush Somani, CMD, Founder, and CEO, ESDS. ESDS’ decades of focus on latest technologies has made it a pioneer in the cloud and datacenter market by introducing world’s first ever Patented Vertically Auto-Scalable cloud solution – ‘ESDS eNlight Cloud’.

D ATA BRIEFING

India’s Internet User Base Will Cross 900 Million by 2023 Source: Cisco

FEBRUARY 2020   ENTERPRISE IT WORLD

5


ITWORLD  //  NEWS BRIEF

Sophos Launches ‘Xstream’ Version of XG Firewall

Sophos introduced a new “Xstream” architecture for Sophos XG Firewall with high performance Transport Layer Security (TLS) traffic decryption capabilities that eliminate significant security risk associated with encrypted network traffic, which is often overlooked by security teams due to performance and complexity concerns. XG Firewall now also features AI-enhanced threat analysis from SophosLabs and accelerated application performance. “As SophosLabs’ research demonstrates, cybercriminals are boldly embracing encryption in an attempt to bypass security products. Unfortunately, most firewalls lack scalable TLS

CIO

6

crypto capabilities and are unable to inspect encrypted traffic without causing applications to break or degrade network performance. With the new Xstream architecture in XG Firewall, Sophos is providing critical visibility into an enormous blind spot while eliminating frustrating latency and compatibility issues with full support for the latest TLS 1.3 standard. Sophos’ internal benchmark tests have clocked a two-fold performance boost in the new XG TLS inspection engine as compared to previous XG versions. This is a game changer,” said Dan Schiappa, Chief Product Officer, Sophos.

Veeam Launches the New Veeam Availability Suite V10

Veeam Software launches New Veeam Availability Suite v10, which offers the next generation of data protection capabilities that increase data availability, portability, and extensibility. First introduced in 2008 as Veeam Backup & Replication, Veeam’s flagship Backup solution – Veeam Availability Suite – now delivers modern file data protection for Networked Attached Storage (NAS), Multi-VM Instant Recovery to automate disaster recovery (DR) and greatly enhanced ransomware protection. With greater platform extensibility, data mining through APIs, and more than 150 major enhancements, Veeam has launched the a solution for complete data management and protection for hybrid-cloud environments. “v10 is the biggest release in the history of Veeam, and the enhancements we’ve made take data protection to the next level, creating the simplest, most flexible, and most reliable solution for hybrid-cloud environments. NEW Veeam Availability Suite v10 stays true to these ideals, helping businesses of all sizes ensure that their data is always available, portable, and protected across any cloud or platform, so they can intelligently use that data to accelerate their business success now, as well as plan for future needs,” said Danny Allan, CTO & SVP Product Strategy, Veeam.

EVENTS

24-29 FEB 2020

28-29 FEB 2020

27-29 FEB 2020 27 FEB 2020

Bengaluru The platform provides information on security, cybersecurity training, technology, computer technology, etc.

Bhopal A forum for presentations on Big Data, Data Mining, Machine Learning, Data Science and their associated learning systems and applications.

Kolkata Provide a platform for scientists from Computational Intelligence, Control & Communication Networks, and Complex Dynamical Networks to meet and exchange ideas, collaborate and work together.

Bengaluru A platform for discourses on IT Disaster Recovery, Emergency Response & Crisis Management and Information Security.

SECURE INDIA

INTERNATIONAL CONFERENCE ON DATA, ENGINEERING & APPLICATIONS

INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & NETWORKS

BUSINESS & IT RESILIENCE SUMMIT

ENTERPRISE IT WORLD  FEBRUARY 2020


NEWS BRIEF   //  IT WORLD

Orange Business Partners to Accelerate Network Edge Transformation

S/HE SAID IT

RAJIV BHALLA

MANAGING DIRECTOR, BARCO INDIA

“Strategic initiatives aimed at leveraging technologies like the IoT, ML, Robotics, Bioinformatics, Quantum Computing and AI across sectors will help in laying the foundation of a robust, digital economy.”

Orange Business Services has chosen Ekinops and Dell Technologies as partners for a new universal customer premise equipment (uCPE) solution. This platform plays a key role in network transformation, including software defined networking (SDx), providing customers with increased business agility, flexibility and simplicity in service deployment. Orange will deliver solutions based on this uCPE to mid-market and large enterprise customers worldwide starting in 2020. The solution is a result of co-innovation between Orange and its strategic partners Ekinops and Dell Technologies, combining Enterprise Branch Server IT and Virtualization Management. The uCPE uses hardware provided by Dell Technologies OEM | Embedded & Edge Solutions running middleware built by Ekinops, a supplier of advanced network access solutions. It will allow enterprises to consolidate their site connectivity and functionality with virtual network functions (VNF) management. QUICK BYTE ON

The solution will also help enterprises move toward Edge computing, with use cases such as video, AI or IoT running locally on the uCPE. Carrying out data processing at the Edge will help them improve application performance and assure data privacy. “Our global enterprise customers require increased flexibility in terms of connectivity solutions and infrastructure optimization. This uCPE solution developed with Ekinops and Dell Technologies will give enterprises further choice in terms of deployment and reinforces our ecosystem-based approach. We believe that flexible solutions such as these are essential for customers looking to run an increasing number of services at the Edge,” said Anne-Marie Thiollet, Vice President, Connectivity Business Unit, Orange Business Services.

“With India projected to become a trillion dollar digital economy by 2025, it’s an exciting time for emerging businesses to explore the potential of digital technology to transform millions of lives.” NIKHIL ARORA V I C E P R E S I D E N T A N D M A N A G I N G D I R E CTO R , GODADDY INDIA

SECURITY

75% of Respondents Said Their Company Had Experienced a Security Breach: Keysight Keysight Technologies’ Security Operations Effectiveness survey shows that security professionals are overconfident in their tools. About 50% of respondents have reported that they have experienced a security breach. 57% were confident their current security solutions are working as intended. Yet only 35% of survey respondents stated that they conduct testing to ensure their security products are configured and operating as they expect. FEBRUARY 2020   ENTERPRISE IT WORLD

7


ITWORLD  //  NEWS BRIEF

Tata Elxsi IoT Software Powers Tata Motors Connected Vehicle Platform

Data Center Survey Reveals Lack of Preparedness A new report from Forbes Insights and Vertiv, has highlighted that only 29% of data center decision-makers say their current facilities are meeting their needs, and just 6% say their data centers are updated ahead of their needs. “The Modern Data Center: How IT is Adapting to New Technologies and Hyperconnectivity,” examines the results of a survey of 150 data center executives and engineers from various industries around the world. The survey results indicate a troubling lack of planning and preparation for today’s evolving data ecosystem. A closer examination of the results reveals a stark contrast between executives and engineers: 11% of executives say their data centers are updated ahead of current needs while just 1% of engineers say the same.

EXECUTIVE

8

“As today’s data center evolves to incorporate enterprise, cloud and edge resources, thorough planning and foresight is needed to meet organizational computing requirements and business objectives. It is clear, however, that many organizations are lagging on that front. With that in mind, we anticipate considerable investment and activity among businesses trying to catch up and get ahead of the changes,” said Martin Olsen, vice president of Global Edge Systems for Vertiv. Other notable results from the survey include - 92% of CIOs and CTOs say their business will require faster download and response times in the near future; 63% say they have difficulty meeting bandwidth needs at all times and Security (45%) and bandwidth (43%) are the two areas most in need of upgrades.

With a collaborative approach, Tata Motors & Tata Elxsi developed a cloud based IoT Platform which provides Tata Motors with a common standard technology stack that delivers the scalability and high performance required to support the entire range of electric, commercial and passenger vehicles. Tata Motors is in the process of offering the connected Vehicle feature as a key differentiator to most of its BS6 range of Passenger & Commercial Vehicles. Nexon EV, “India’s own Electric SUV”, is the very first application enabled vehicle, with a number of connected vehicle features. This unified cloud native approach will enable data & analytics synergies for Tata Motors, across product development, customer use cases, dealerships, allied businesses and service networks, enabling innovations in customer experience, offerings, services and business models. “We are delighted to partner with Tata Motors in the Connected Vehicle Program, to help unify and synergize data through a common digital services platform enabling completely new services, innovative business models and enhanced customer experience,” said Manoj Raghavan, MD & CEO, Tata Elxsi.

MOVEMENT Lowe’s India has appointed Mayur Purandar as the Vice President, Enterprise Architecture.

Check Point Software Technologies has roped in Shivin Sharma as the Head – Commercial Business & Channel Sales for India and South Asia.

Harish Kumar has been appointed as the Head of Enterprise, India, Check Point Technologies.

Brad Rowland has been taken in as the Executive Board Advisor for CloudJumper.

ENTERPRISE IT WORLD  FEBRUARY 2020

Kathy Chen has joined Citrix as the Vice President of Channel for the APJ region.


NEWS BRIEF   //  IT WORLD

BOOK

SHELF

5G Core Networks: Powering Digitalization

GLOBAL UPDATE

Ericsson Launches New AI-Powered Network Services

BY

STEFAN ROMMER, PETER HEDMAN, MAGNUS OLSSON, LARS FRID, SHABNAM SULTANA AND CATHERINE MULLIGAN

PRICE

RS. 8,387.00 (PAPERBACK) WHERE:

AMAZON.IN

About The Book The book provides an overview of the 5G Core network architecture, as well as giving descriptions of cloud technologies and the key concepts in the 3GPP rel-15/16 specifications.

Ericsson has launched two new AIpowered offerings in its Network Services portfolio, enabling communications service providers to secure always-on networks and deliver optimal user experiences. The two new portfolio additions — Network Intelligence and Omni Network Channel – are part of Ericsson’s Network Services offering. They employ AI, automation and predictive analytics to address the complex reality faced by communications service providers: exponential data

growth and the continuous introduction of new technologies such as 5G, digital transformation, and scattered information sources and insights. Network Intelligence is an AI-driven preemptive support service that allows issues to be identified and resolved before they impact network performance. The service prevents critical outages and delivers the network stability needed for service continuity and optimal end-toend performance.

Key Feature An overview of the 5G Core Architecture - The Stand-Alone and Non-Stand-Alone Architectures; detailed presentation of 5G Core key concepts; and an overview of 5G Radio and Cloud technologies.

Atlassian Strengthens Commitment to Advanced Cloud Solutions for Enterprises in India Atlassian Corporation Plc is soon to deliver on its advanced cloud offerings for the Indian market. With India witnessing a huge uptake in cloud adoption, and with the cloud market expected to grow approximately 3-fold to USD7.1 billion by 2022 according to Nasscom, Atlassian is building products to cater to this demand, while also providing its Indian customers access to its innovative new cloud offerings. Its customers in India include Ola Cabs, Reliance, Walmart Labs, and Flipkart, among others. Atlassian is also aiming to double its number

of Indian employees, working to add 300 more local employees to help support the growth of the Atlassian R&D centre in Bengaluru. Atlassian has also announced enterprise-grade controls and security features, with data privacy upgrades to its underlying cloud platform. It has introduced new cloud plans including a Premium offering, giving customers the highest level of service with advanced features, a 99.9% uptime SLA, unlimited storage and access to premium security tools, ensuring enterprises have everything they need to confidently scale. FEBRUARY 2020   ENTERPRISE IT WORLD

9


ITWORLD  //  NEWS BRIEF

Hackers Monitor, Track Activity to Learn and Then Launch Phishing Attacks: Barracuda Report

DIGEST

Researchers from Barracuda and UC Berkeley, conducting a largescale analysis of email account takeover and the timeline of attacks have highlighted the behaviors hackers are using to try to avoid detection, ways to identify suspicious activity that could indicate an email account has been compromised, and precautions you can take to protect your business. Among the key findings - Attacks are spread out over a period of time; they don’t always happen as soon as the account is compromised; Attackers are getting smarter about geography; they send phishing emails and perform other actions from IPs tied to similar regions and countries of the hacked account; and IP addresses and ISPs provide important clues; attackers tend to use anonymous IPs belonging to ISPs that are different from the hacked account’s provider.

ARTIFICIAL INTELLIGENCE TO BE $100 BILLION SECTOR BY 2025

Stolen Credentials and Vulnerabilities Weaponized Against Businesses: IBM X-Force IBM X-Force Threat Intelligence Index 2020, highlights how cybercriminals’ techniques have evolved after decades of access to tens of billions of corporate and personal records and hundreds of thousands of software flaws. According to the report, 60% of initial entries into victims’ networks that were observed leveraged either previously stolen credentials or known software vulnerabilities, allowing attackers to rely less on deception to gain access. “The amount of exposed records that we’re seeing today means that cybercriminals are getting their hands on more keys to our homes and businesses. Attackers can deploy their attacks simply by using known entities, such as logging in with stolen credentials. Protection measures, such as multi-factor authentication and single sign-on, are important for the cyber resilience of organizations and the protection and privacy of user data,” said Wendi Whitmore, VP, IBM X-Force Threat Intelligence.

Avaya Spaces Provides New Capabilities for Cloud-Based Collaboration and Meetings Avaya Holdings has added new capabilities to Avaya Spaces that embrace a multi-experience approach by centralizing voice, video, messaging, chat and task management in one place to improve productivity and increase employee satisfaction. Avaya Spaces is a cost-effective cloud meeting and team collaboration app that effortlessly integrates voice, video, tasks, sharing and more into one app that can be accessed from any endpoint device. 10 ENTERPRISE IT WORLD  FEBRUARY 2020

Avaya Spaces is easy-to-use, integrating web meetings and team collaboration and allowing users to create cloud work spaces where they can message, meet, share content and manage tasks from a browser or mobile device, and provides a simple, secure and effective way to get work done in the cloud. “Spaces is the much required stepping stone into the evolution of the Digital Experience Economy. This would bring in the required ‘Always Connected Experience’ into all our transactions presented through Rich Media. In my personal opinion,” said Vishal Agrawal, Managing Director, Avaya India & SAARC.

The Confederation of Indian Industry’s (CII) Summit and Expo on AI Application & Digi-Tech highlighted the benefits of AI interventions in Agriculture, Smart Cities, Healthcare, Skilling, Education, Public Utility Services, Judiciary and Governance. Globally, AI has seen $45 to $58 billion investment during the last year. It is growing at the fastest pace of any exponential technology. The AI segment will be worth over $100 billion by 2025. This gives ample indication of the scale and opportunities in this sector. According to Dhanrajani, the companies that have adopted AI will take away $1.2 trillion worth of business from their competitors. In 2019 alone AI startups have received $14 billion investment across 600 funding events. Realizing the importance of AI currently, 28 nations around the world are curating or drafting AI policies and strategies. India is one among them however where the country lags behind is in research. In India we have only 2000 to 2500 research papers submitted every year and China has 10 times more. Out of 34.8 million students coming out of our higher education system in the country only 18% are employed. The job opportunities in the new age will require skills that are not taught in our educational system and this needs to change.

TSC DONATES LABEL PRINTERS TO FIGHT CORONAVIRUS OUTBREAK As a part of its CSR drive, TSC Auto ID Technology Co., Ltd. has donated 300 pcs of barcode printers to nearly 20 hospitals among different cities in China to fight Novel Coronavirus (2019-nCoV) outbreak in association with its China partner. On this occasion, Sam Wang, TSC president said “We should all join hands to fight this epidemic and help the people in China suffering from this severe outbreak in whatever possible way we can. And we really hope this small gesture of lending a helping hand to the hospitals can help the authorities to facilitate the treatment facilities in a better and efficient way.”


NEWS BRIEF   //  IT WORLD

MANAGEMENT

MANTRA

“Success is making those who believed in you look brilliant.” Dharmesh Shah, CTO & Co-Founder, HubSpot

Haptik develops KAYA, Virtual Assistant for Kotak Life

RP Tech India introduces UbiquitiR UniFi Protect G3 Video Surveillance Series in India

RP Tech India introduces Ubiquiti UniFi Protect G3 Video Surveillance series in India. Designed for maximum performance in the smallest form factor, the G3 UniFi Protect Cameras deliver superior video quality at an affordable price. The Company has launched five models. The UniFi Video G3 series represents the next generation of cameras designed for use in the UniFi Video surveillance management system. These cameras offer 1080p Full HD resolution for day or night use and are integrated with the UniFi Video software for powerful and flexible, integrated IP video management. It offers

scalable plug and play, where users’ can add up to 20 cameras to their surveillance system to cover every angle or perimeter. Automatic camera detection in the UniFi Video software makes it easy to install and deploy cameras. The cameras are easy to operate and manage using the UniFi Video software, which is preinstalled on the optional UniFi Cloud Key Gen2 Plus and UniFi Dream Machine Pro. Users can download Video software on a Windows or Linux-based system free of charge. UniFi Video can also be accessed on iOS and Android platforms using the UniFi Video mobile app.

Kotak Mahindra Life Insurance Company (Kotak Life) has launched its voice assistant KAYA – AIdriven conversational assistance to get instant solutions. Kotak Life At Your Assistance (KAYA) has been developed by Kotak Life and Haptik. KAYA provides 24X7 assistance and easy instant solutions to consumers thereby enhancing customer experience by resolving queries about premium payment, policy renewals, policy statements, policy information and bonus / fund value. Presently, Kotak Life’s customer service department handles a huge number of customer queries on a day-to-day basis. KAYA’s integration into customer service department significantly reduces human dependency and call waiting time, and importantly, ensures queries do not go unattended. “KAYA is a major milestone in Kotak Life’s digitalization journey. KAYA has reduced the wait time for our customers by as much as four times, and has reduced human dependence to resolve a large number of routine queries. With its selflearning architecture, KAYA can connect to various sections of the support team for a smooth customer experience,” said Kirti Patil, Chief Technology Officer, Kotak Mahindra Life Insurance Co. Ltd.

Pine Labs launches a Merged QR Product to Accept Payments via UPI and Bharat QR Apps Pine Labs has launched Pine Labs Paper POS for its merchants. Pine Labs Paper POS is an all-in-one solution for accepting multiple forms of Unified Payments Interface (UPI) and Bharat QR payments through a single merged static QR at the point of sale. Merchants can use Pine Labs Paper POS to accept payments across different kinds of UPI and Bharat QR payments, including those from Amazon Pay, Google Pay, PayZapp, PhonePe, YONO, among others. Using the Pine Labs countertop POS machines – Plutus and Plutus Smart – merchants can print a customer

charge slip, thus, immediately confirming the transaction. “We, at Pine Labs, are constantly striving to develop innovative technology solutions to cater to the requirements of our diverse merchant base and their customers. Paper POS is our latest innovation and will accelerate the growth of electronic payments acceptance in the country. It will not only be a one-stop solution for acceptance of all payments through UPI and Bharat QR, it will also save transaction cost,” said Venkat Paruchuri, Chief Product Officer, Pine Labs.

FEBRUARY 2020   ENTERPRISE IT WORLD

11


ITWORLD  //  NEWS BRIEF

ServiceNow Introduces New Industry Solutions Strategy

Deskera Launches App for On-The-Go Workforce Deskera has launched ‘Desk app’, a super app designed for today’s workforce that’s always on-the-go. Built for all platforms, the Desk App is available for iOS and Android and is feature-rich at no cost. There is a massive opportunity for apps such as Desk to offer mobilefirst solutions that address the challenges faced by organisations today. Being an all-in-one app, Desk Mobile helps people run their complete accounting business practice. With its efficient sharing and chat

features, whether you are an SME, freelance professional, startup, or large organisation – the Desk app gives you the power to always stay connected with your partner organisations, vendors, agencies, and so on. Additionally, it gives you access to inventory and product movements on a daily / monthly basis. Improved productivity, streamlined processes, and real-time information tracking allow you to make informed decisions and serve your customers better.

ServiceNow brings a new industry solutions strategy to deliver workflows that help companies in specific industries address their unique digital transformation challenges and create value at scale. ServiceNow initially will focus on developing industry solutions for banking and telecommunications and will work with strategic partners to support its industry solutions journey and integrate those solutions in the customer environment. ServiceNow’s new banking solution will simplify middle–to– back office operations to help banks move at the speed of digital business, delivering seamless customer experiences throughout the enterprise that drive customer loyalty. The company’s new telecommunications solution will align customer care and service assurance to transform how communication service providers deliver great customer experiences by proactively anticipating issues and addressing them quickly while maximizing availability and quality of service. “Every company around the world aspires to deliver great experiences that drive fierce customer loyalty and create powerful employee engagement. And companies across many industries are turning to ServiceNow to help them transform their business to unleash productivity and fuel innovation. By creating industry– specific solutions, delivered through a partner–led model, we can better address the unique challenges that companies in key vertical markets face as they look to digitally transform their businesses,” said Bill McDermott, President and CEO, ServiceNow.

IBM India Unveils Automation Innovation Center In Pune IBM has inaugurated its Automation Innovation Center (AIC) in India at its Pune facility. The AIC is a state-of-the-art facility themed around Intelligent Automation and Future of Work, with experiential demonstration centers showcasing IBM’s flagship Automation Platform, Digital Worker suite of solutions, Automation Operations Command Center for monitoring and managing bots, and co-creation zone for quick Design Thinking with visiting clients, all hosted in an agile workplace. The AIC also showcases industry vertical

12 ENTERPRISE IT WORLD  FEBRUARY 2020

solutions for Banking, Insurance, Retail, CPG, Telco, Healthcare etc and the intersection of automation solutions on enterprise applications such as Salesforce, SAP and Workday which are a significant part of IBM’s services business. The centre will allow clients to experience IBM Cloud Pak for Automation, available on Red Hat OpenShift that helps design, build and run automation applications and services on any cloud, using pre-integrated automation technologies and low-code tools.


NEWS BRIEF   //  IT WORLD

OYO Develops a Comprehensive Bug Bounty Program

OYO Hotels & Homes is set to ramp up efforts to improve its information security framework and rolling-out stronger ethical hacking and bug bounty programs to encourage continuous improvement and collaboration with ethical hacking experts. This development is in line with the company’s commitment towards ensuring data privacy and building a robust cybersecurity network. According to Jagbir Singh, Engineering Manager – DevOps and InfoSec, OYO Hotels & Homes, “One of our biggest assets is the trust our customers, partners and employees place in us. We understand that trust is hard to earn and easy to lose. One key responsibility in earning this trust is protecting the data our customers and other stakeholders have with us from any unauthorised use. Our team of 1100+ world-class security, network and software

engineers and external partners across multiple geographies is at work 24×7 ensuring the protection of this data, so our customers and stakeholders can rest easy.” The Bug Bounty program that the company aims to introduce is towards ensuring that there is a credible and continuous flow of positive feedback from independent security groups and individual researchers to mitigate against any bug or shortfall in the company’s systems. This is in line with the established practice of recognition and reward for ethical hackers who help responsibly investigate shortfalls within the tech architecture of several tech companies including the likes of Silicon Valley giants like Facebook, Google etc. OYO has accordingly developed an improved responsible disclosure policy to encourage honest and responsible reporting of any potential risks.

Open Cybersecurity Alliance Unveils First Open Source Language to Connect Security Tools

The Open Cybersecurity Alliance (OCA) creates OpenDXL Ontology, the first open source language for connecting cybersecurity tools through a common messaging framework. With open source code freely available to the security community, OpenDXL Ontology enables any tool to automatically gain the ability to communicate and interoperate with all other technologies using this language. By eliminating the need for custom integrations between individual products, this release marks a major milestone in the OCA’s mission to drive greater interoperability across the security industry. The OCA includes more than 25 member organizations and has brought two major interoperability projects into the open-source realm, with OpenDXL Ontology (contributed by McAfee) and STIX Shifter (contributed by IBM Security) now available for cross-industry collaboration and development on GitHub.

Cisco Launches Cloud-Native Platform, SecureX Cisco has launched a cloud-native security platform, Cisco SecureX. The platform provides a comprehensive user experience across the breadth of Cisco’s integrated security portfolio and customers’ existing security infrastructure. It unifies visibility, identifies unknown threats, and automates workflows to strengthen customers’ security across network, endpoint, cloud, and applications. Because simplicity is essential to securing today’s digital transformation, it is included with every Cisco Security product. Cisco’s 2020 CISO Benchmark Study of 2800

security professionals surveyed found that 28% feel that managing a multi-vendor environment is very challenging. “Cisco SecureX is a fundamental shift in the customers security experience by removing the complexity and providing one unified view on the state of customers’ security services and alerts. In doing so, security teams can become more efficient with resources and be a business enabler that propels the digital transformation forward,” said Gee Rittenhouse, SVP and GM of Cisco’s Security Business Group.

FEBRUARY 2020   ENTERPRISE IT WORLD

13


COVER STORY  //  ERP

5G: RECONFIGURING TECHNOLOGY – RECONFIGURING LIVES The next big game changer in the industry is 5G. With the potential to revolutionize consumer experiences as well as the industrial Digital Transformation, 5G holds immense potential. Its application areas are vast and spread across all major sectors. 5G will effectively rewrite the way we perceive technology. BY POOJA JAIN POOJA@ACCENTINFOMEDIA.COM

I

n April last year, South Korea launched the world’s first nationwide 5G mobile networks. The top three telecom providers in South Korea – SK Telecom, KT and LG Uplus, initially made the much awaited wireless technology accessible for six South Korean celebrities, making them ‘the world’s first 5G smartphone subscribers’. By June 1.6 million people had subscribed to the new service as 14 ENTERPRISE IT WORLD    FEBRUARY 2020

reported by the GSM Association. The South Korean 5G subscribers then made up 77 per cent of the global population of 5G users. China closely followed South Korea in the race to deploy 5G network by launching the world’s largest 5G network. China Mobile, China Unicorn and China Telecom – the three largest Chinese operators activated their 5G networks in October last year. At the time of the launching

of the 5G services, the three telecom operators had collectively deployed close to 86,000 5G base stations. The GSM Association predicts that 36% of China’s mobile users will be using 5G by 2025, comprising 40% of the global 5G market by 2025. US, UK and Japan are also in the race to deploying 5G technology. The onset of 2020 witnessed global 5G leaders – América Móvil, KT, Rogers, Telstra, Verizon


ERP 5G //  COVER STORY

and Vodafone - coming together to create a specialized forum to accelerate the delivery of 5G and mobile-edge computing-enabled solutions around the world. “Telecommunications companies are in the driver’s seat when it comes to creating opportunities for their customers to take advantage of the world of possibilities enabled by 5G,” said Nikos Katinakis, Group Executive for Networks and IT, Telstra. 5G: The Game Changer 5G is expected to be the game changer for the enterprises as it has the potential to impact all

sectors - Automobiles, Supply chain, Education, Healthcare, Manufacturing, Distribution, Retail, BFSI, Emergency services, etc. This is why enterprises are eagerly awaiting the advent of 5G, which will lay the foundation for the development of multiple domains as the whole gamut of emerging technologies dependent on low latency connectivity for optimum functionality. The evolution of deployment of technologies like Cloud Computing, Robotics, AI&ML, IoT, Edge Computing, etc. is fundamentally linked to a seamless connectivity and 5G holds the promise of speed as high as 10Gbps.

Keysight predicts that, “In 2020 the industry will move from a small group of early-movers who have commercialized initial 5G networks, to a global community in which multiple operators in every continent and in many countries will have commercial 5G networks. The early adopters will add scale and those who launch in 2020 will quickly resolve issues in their initial deployments. Second-generation devices and base stations will be added to the market.” As 5G evolves, it enables technologies like mobile-edge computing, and together they deliver lowest latency networks to mobile and connected FEBRUARY 2020    ENTERPRISE IT WORLD

15


COVER STORY  //  5G

ERIC ZHOU EVP, UNISOC.

“A large-scale 5G rollout is likely to come to pass in 2020, with chipset manufacturers,

NINAD DESAI DISTRICT CHAIR, BICSI INDIA

“5G will go beyond mobile broadband and positively impact disruptive technologies such as

robotics, self-driving cars, and smart cities. It will foster innovation in agriculture, health care, and education by highly enhancing the mobile user experience through cloud-based virtual reality, which will allow emerging and developed markets to deliver quality health care to people living in remote areas. 5G will also allow ultra-high definition video availability wherever you go and take it even further in helping open new revenue streams for telecom companies and content service providers. It will enhance the business value chain and boost the country’s IT market and economy in the long run.”

devices while improving data throughput, reliability, power efficiency and security. This allows organizations, the capability to deliver a wide range of transformative business and consumer use cases, like Machine Learning at the Edge, Smart Cars and Cities, etc. Commenting on the possibilities that 5G opens up for the industries, Ninad Desai, District Chair, BICSI India, says, “With more than 3 billion devices connected, 5G’s collaboration with technologies such as RFID, Ethernet Wi-Fi and 5G enabled WANs, coupled with AI-ML and Data Analytics will help provide huge opportunities in predictive analytics that has the potential to save precious lives and resources in case of natural as well as manmade disasters.” Another key reason why 5G is the great enabler is that it intrinsically brings together the Mobile Networks Operators, Equipment Vendors and 16 ENTERPRISE IT WORLD    FEBRUARY 2020

other Industry Stakeholders. As the Mobile Network Operators will play a central role in the deployment and management of the 5G networks by committing to the CAPEX and OPEX requirements. The Equipment Vendors will be responsible for developing 5G technologies, defining and introducing 5G products. Finally, the Industry Stakeholders will contribute to the wave of 5G enabled massive innovation on the product (autonomous vehicles) and the productivity side (IIoT). According to a report by Spirent, 5G: What to Expect In 2020, 5G Standalone might be coming earlier than expected. There is a rush to move past Non-Standalone (NSA) to Standalone (SA) rollouts in an effort to capture revenues in industries like manufacturing, automotive, mobile gaming, manufacturing and beyond. Based on testing timetables, Spirent expects a slate of 5G SA

smartphone brands, and telecom operators taking a page out of the playbooks of 5G nations such as the China and US. This 5G adoption will also increase the network bandwidth in new-age chipsets, powering a rapid increase in the number of everyday use-cases for these cutting-edge technologies such as AI, ML and Edge Computing.”

deployments in the first half of 2020. So, while the industry awaits 5G becoming a reality, it discusses the potential of 5G deployment. Application areas 5G is primarily built on 3 main pillars – eMBB, URLLC and mMTC. It is these capabilities that create tremendous opportunities for the application of the 5G network. • Enhanced Mobile Broadband (eMBB): This will provide customers and industrial users of the mobile network with enhanced capacities across sectors. • Ultra-reliable and Low Latency Communication (URLLC): This will support new use cases as it will expand the purview of mission critical applications. • Massive Mahcine-type Communications (mMTC): This will enable the industry to expand the network of their connected devices and machinery. 5G Enabling Robotics 5G makes possible Ultra Reliable Low Latency Communication that increases the application areas of the technology. One highly anticipated and talked about application area of 5G enabled Robotics is Autonomous Vehicles. Onboard computer systems operating at nominal latency, coupled with automation, will pave way for autonomous vehicles. 5G will enable the vehicles


5G //  COVER STORY

RENAUD DERAISON CO-FOUNDER AND CTO, TENABLE.

“With 5G networks will come the advent of 5G-only IoT and IIoT devices, which do not

HANS VESTBERG CHAIRMAN AND CEO, VERIZON

“5G is a key enabler of the next global industrial revolution, where technology will transform how we live and work. It’s

require connecting to the local network to operate. This will diminish the risk of an IoT device used as an attack vector against the rest of the network.”

critical that technology partners around the world unite to create the most seamless global experience for the customers.”

to respond at a faster rate than is otherwise possible, which means that they can not only detect but also simultaneously respond to the objects and changes around them. Connected vehicle technology will be enabled with bidirectional communications – vehicle to vehicle and vehicle

to infrastructure. This will promote safe transportation systems. “5G is going to being in a revolution to the new era of robotics, that is looked upon to be equipped with next gen robotics with zero latency performing in real time visual and haptic

scenario with sense of touch to even the most critical and delicate tasks been assigned. It is going to revolutionize by drastically cutting down on cables, electrifying wireless connectivity, making automated through IoT sensors, optimization with higher agility.” FEBRUARY 2020    ENTERPRISE IT WORLD

17


COVER STORY  //  5G

Sunil Gubrani, IT-Head, RAL Group. 5G Enabling Healthcare Healthcare is one of the sectors that stand to greatly benefit from high-speed uninterrupted connectivity. From real-time video surgeries and wireless tele-surgery with a robot to telemedicine, 5G opportunities in healthcare are crucial to enhancing the quality of the patient care provided. “5G will help turn ambulances into mobile clinics wherein equipment could be operated through VR and patients could be thoroughly examined. The stability that the 5G communication protocol provides is what will help make these procedures perform as desired. This will invariably help improve the quality of health care received by millions worldwide and help change the traditional approach that is cluttered with inefficiencies of cost and technology limitations. Wearable devices connected via 5G will help medical professionals effectively screen and diagnose patients remotely and even allow surgeons to perform minor surgeries anywhere as the technology matures with time and experience.” Ninad Desai, District Chair, BICSI India 5G Enabling IoT As the number of connected devices continue to grow, both at the consumer and the industrial level, 5G will go a long way in providing seamless, low latency connectivity that supports the pace at which the number of devices requiring data connection in the network increases. In the consumer market it will expand the network of wearables, trackers, sensors, gadgets, appliances 18 ENTERPRISE IT WORLD    FEBRUARY 2020

and machines. Industrial IoT, on the other hand, will greatly impact the Logistics and Manufacturing sectors, for instance, by connecting sensors, trackers, heavy machinery, etc. This also means that 5G enabled IIoT will also be highly scalable, error-free and quick, as it will do away with the limitations of manual labor. “The biggest opportunities are the growth and adoption of 5G adoption worldwide, means a plethora of opportunities for IoT to thrive and expand. Many solutions that are in ideation phase could see life. The sole reason being 5G is the solution to all challenges posed by IoT in terms of connectivity. Billions of devices are getting connected but that poses a serious constraint on bandwidth and challenge to the security in terms of how things are managed over the network. Also speed is another factor that remotely connected sensor hub demands.” Sukanya Mandal, IEEE Member and Data Science Professional. 5G in India In a recent whitepaper, TRAI identified 5G as the latest iteration of cellular technology that will provide seamless coverage, high data rate, low latency, and highly reliable communications. It is also slated to increase energy efficiency, spectrum efficiency, network efficiency as well as efficiency of other systems. In the upcoming 5G spectrum auction by the government tentatively in April-June 2020, Bharti Airtel, Vodafone Idea and Reliance Jio will be the major players partnering with equipment vendors Ericsson, Nokia, Huawei, ZTE and Samsung.

What are the Challenges? There are innumerable theoretical applications as speculated by the professionals of how the deployment of 5G will practically revolutionize the Digital Transformation process. But there are very tangible challenges that obstruct such a transformation. Commenting on the same, Sunil Gubrani, IT-Head, RAL Group said “As 5G takes shape I am sure it is going to witness challenges in two main areas wherein to meet the expectations of the high demands of a wide set of application domains, and deploying across diverse social and geographic environments.” Security Concerns The first challenge that baffles the industry is the security concerns that 5G connectivity will create for the organizations. It can open multiple ports for the hackers to enter the main network and eventually access the critical data to disrupt operations. 5G, while expanding the network and making it efficient, it will simultaneously make the network vulnerable, thereby increasing the security threats for the organization. The double edged sword of interconnectedness, will make the network prone to cyber-attacks. Information Security, then becomes a critical concern of large scale 5G adoption. The next challenge is Infrastructure. Given that deployment of 5G fundamentally relies on a robust ICT Infrastructure, it will require a complete overhauling of the network systems. As per industry estimates, more than $250 billion investment in equipment and infrastructure for 5G will be required over the next 10 years. Such


5G //  COVER STORY

a large scale investment poses its own issues. The existing service providers will have to invest a considerable amount in getting the required infrastructure in place, including but not limited to base stations, antennas and most importantly the fiber optic network cabling infrastructure, as the technology isn’t an upgrade over 4G but a complete overhaul. “While 5G holds tremendous promise, overhauling our essential networks will open a Pandora’s box due to the introduction of radio frequencies that to date have not been accessible, not to mention the minimized visibility that will result from them. This will require us to put an even greater focus on the security of our connections, devices and applications. 5G devices come with built-in radios that don’t require communication with the corporate network anymore. This makes it incredibly difficult to identify threats and compromised devices. It’s never been more critical for cybersecurity products to work together as a system. Organizations will need a layered approach to security where products connect and share actionable intelligence. A synchronized security approach builds bridges allowing products to work together stronger than they would on their own,” said Dan Schiappa, Chief Product Officer, Sophos Forecepoint comments, “Fifth generation cellular network technology (5G) allows data transfer at a 10 times faster rate than 4G. While this appears to be a promising service for organisations, the more reliable connectivity and lower latency of 5G will also work in favour of determined employees wishing to transfer swathes of corporate data. With the roll-out of 5G continuing in 2020, cybersecurity stack needs to

VINOD KUMAR CEO, VODAFONE BUSINESS

“New specifications will allow us to offer services that work consistently across the globe and support devices moving between countries. 5G opens up a wealth of opportunities for new solutions and business models and we’re excited to play a role in bringing them to life.”

have visibility and control of such data movement else organizations risk being unable to identify data theft at the speed necessary.” Another challenge that follows the adoption of all new technologies, is the Skills and Workforce Deficit. “The industry currently has a workforce that has the skills for the wrong century, the industry skillsets required to get ready for the 5G onslaught needs professionals who can understand and build the ICT and telecom infrastructure for the 21st-century. But the way most people perform these jobs today is still stuck to that in the previous decade,” said Ninad Desai, District Chair, BICSI India.

Conclusion… 5G will evidently be a revolutionary force driving digital economies, improving economic growth, enhancing consumer experiences and creating new business models & opportunities. Low latency, larger bandwidth and greater connectivity will pave the way for improving the existing services and developing new use cases. The vast economic value generated by 5G deployment, therefore amply justifies the substantial investment in ICT infrastructure without which 5G will remain a theoretical possibility.

FEBRUARY 2020    ENTERPRISE IT WORLD

19


GUEST ARTICLE  //  DATA CENTRE GROWTH

B.S.RAO

Vice President, Marketing, CtrlS Datacenters Ltd

“The anticipated Data Center Park (DCP) policy combined with the anticipated

BY SANJAY@ACCENTINFOMEDIA.COM

personal data protection (PDP) policy has the potential to propel the data center market size beyond $10 billion in revenues by 2030 and play a key role in employment and contribute to the growth of the country’s economy.”

20 ENTERPRISE IT WORLD    FEBRUARY 2020


DATA CENTRE GROWTH   //  GUEST ARTICLE

INDIA TO EMERGE AS WORLD’S LARGEST DATA CENTER HUB B.S.Rao, Vice President, Marketing, CtrlS Datacenters Ltd writes about the journey that India is embarking upon to become the world’s largest data centre hub. India is likely to emerge as the World’s largest data center hub, thanks to the announcement by the Union Government to introduce a data center park policy aimed at strengthening the private sector to build Data Centre parks throughout the country. The fact that the country is home to 1.15 billion mobile users, 661 million broadband users, 376 million social media users, 401 million smart phone users and 564 million internet users has translated into growth of data from 40,000 petabytes in the year 2010 to 2.3 million petabytes in 2020. Besides, India is world’s second largest base for mobility, internet and social media users. However, the country faces challenges in the form of continuous power supply and robust optical fiber connectivity across the country. While the Finance Minister’s announcement to connect 100,000 villages through optic fibre is welcome, it is imperative that the data center parks too are equipped with seamless connectivity and electricity – as most data parks are likely to host the most mission critical applications which cannot afford a downtime. Can we imagine an e-commerce site going down for an hour? It could perhaps lead to losses in millions. A financial institution could similarly experience losses in millions besides loss of customer trust, brand reputation loss, revenue losses, wasted man-hours etc. Hence, the intended Data Center Park Policy ought to be very industry friendly. Following are the broad recommendations to the Union Government to roll-out a robust policy. The Data Center policy could consider initiatives such as: • Subsidized land acquisition cost for data center parks • Dual-power grid network to ensure seamless electricity supply • Robust and highly redundant multi-path optic fibre connectivity • Ensure zero power cuts for data center parks • Subsidized power/fuel prices

• Internet Subsidy and reimbursements • Incentives for adoption of clean energy (solar/ wind power) • Permission for round-the-clock (24X7) operations • Women to be allowed to work in night shifts at data center parks • Data Center parks to be treated as essential services Government should also look at measures such as ensure sufficient power capacity for data center parks, build optical fiber connectivity, provide other necessary infrastructure around the data center parks, design special tax policies and guidelines aimed at sustaining the data center players, introduce clean energy incentives for utilization of renewable energy such as solar/wind power. Major Indian Data Center players such as CtrlS Data centers(who is now emerging as World’s largest Rated-4 Hyperscale Data Center player) is planning to operationalize 6 million square feet of hyperscale data center parks in India by 2023 including setting up 500+ edge data centers and establishing solar parks, followed by the Adani Group (who has indicated interest in setting up major data center facilities in AP), NTT Communications and the recently established Yotta Infrastructure Solutions (A subsidiary of Hiranandani Group) who has announced a major facility in Mumbai. Almost all the major players have indicated usage of solar (and alternate sources of energy) to power their data center facilities. Today, India’s data center footprint is estimated at 11 million square feet and likely to grow to 30 million square feet by 2030. It has the potential to cross 100 million by 2060 comprising of 5,000+ edge data centers across the length and breadth of the country. The growth requires to be augmented by a unique policy on data centre parks. The Indian Government should encourage private

sector to establish data center parks in major metros preferably or the secondary metros, while there should be a thrust on the creation of edge data centers in Tier-2 and Tier-3 cities to citizen technology inclusiveness in the country. India has 661 million broadband users, 376 million social media users, and 564 million internet users. This apart the per capita data consumption is estimated to grow from 2.4 GB in 2017 to 14 GB by 2022. The IoT device base which was estimated at 200 million in 2018 is likely to grow to 2 billion by 2020 and will perhaps cross 10 billion by 2035 leading to voluminous data across the cross section of the society and industry. The key drivers for growth in data in India include E-Commerce, Cloud adoption, Smart cities, IoT deployment, Autonomous vehicles, Digital payments, Rapid social media adoption, Availability of internet over smartphones, AI/ML, Big data analytics, Smart factories, Digital citizens, Growing social media usage, Anticipated data localization policy and 5G technology. The anticipated personal data protection policy will act as a trigger for major multinational companies operating in the country to store the data locally in India. They are likely to occupy at least 5 to 8 million square feet of data center space in India. This will leapfrog overall data center footprint to at least 30 million square feet by 2030. Players such as WhatsApp, Google, Facebook, LinkedIn, Twitter, Instagram, Snapchat, Overseas OTT players, CDN players, major e-commerce players, global manufacturing giants, etc are likely to consume the space in data center parks helping India emerge as the World’s Largest Data Center Hub. The anticipated Data Center Park (DCP) policy combined with the anticipated personal data protection (PDP) policy has the potential to propel the data center market size beyond $10 billion in revenues by 2030 and play a key role in employment and contribute to the growth of the country’s economy. FEBRUARY 2020    ENTERPRISE IT WORLD

21


GUEST ARTICLE  //  CYBERSECURITY

HOW CYBERSECURITY EVOLVES CISO/ SECURITY VENDOR RELATIONSHIP?

BY SANJAY@ACCENTINFOMEDIA.COM

With the change in the severity of threats and vulnerabilities, there is a need for evolution in cybersecurity, writes Jaideep Khanduja, Enterprise Technology Blogger, Global Mentor, Founder and Director in India. With any kind of evolution there is a need for realignment, re-examination, change from the existing, or discovery of new. Why is it so? Because a change seeks to change. With the change in the severity of threats and vulnerabilities, there is a need for evolution in cybersecurity. The same old methods or concepts hold no good in today’s environment of new threats and risks. The evolution of cybersecurity, in fact, automatically promises to remodel the CISO/Security Vendor relationship. As the corporate’s dependency on technology and information systems has increased tremendously to the core of business processes, IT 22 ENTERPRISE IT WORLD    FEBRUARY 2020

infrastructure and business applications security needs has taken a new shape. It needs a complete reassessment, recognition, and a new perspective of understanding of ongoing challenges of defending corporate infrastructure. Cynet, keeping all this in mind, is showcasing a new series of videos on the trials and tribulations of cybersecurity. The IT department of an enterprise needs to understand the wide gap between what vendors promise and what pains of the corporates remain unattended. The key focus of this video series stays on educating Technology experts in an organization how vendor solutions fall short of

actual deliverables at the time of crisis despite carefully drawn service level agreements. A new approach, thus, is very important. That new approach should combine technology and a team of security experts to cater to a highly effective defensive strategy. CISO being at the top of the ladder when it comes to cybersecurity in an organization must equip him or herself with all kinds of powerful tools and solutions to defend the organization against cybersecurity breaches. Because ultimately he or she will be responsible for failed efforts. There is always something more to what they are doing.


CYBERSECURITY   //  GUEST ARTICLE

JAIDEEP KHANDUJA

Enterprise Technology Blogger, Global Mentor, Founder and Director in India.

“As the corporate’s dependency on technology and information systems has increased tremendously to the core of business processes, IT infrastructure and business applications security needs has taken a new shape. It needs a complete reassessment, recognition, and a new perspective of understanding of ongoing challenges of defending corporate infrastructure.”

Despite deploying the best of the solutions, these top IT security experts can’t afford to just sit idle after the deployment. They continuously need to strive to enhance their IT security defenses with various actions like educating the workforce, upskilling security teams, and protective product selection to insulate their enterprise against some of the most notorious attacks. It is, actually, quite difficult for CISOs and their team of professionals to vet IT security solutions for the threats and vulnerabilities they are tackling regularly. Every solution has its sphere of coverage while catering to a variety of environments, applications, and risks to protect and resolute against cyber threats in a definitive manner. It is, thus important to get them out of that vicious circle. To tackle that, Cynet has launched a new video series to address the concerns of CISOs when managing cybersecurity vendors. Most of the CISOs are finding themselves helpless against the high-pressure sales tactics of cybersecurity vendors who come with overhyped claims of protection, extremely complex operations, and lack of automation. Each of these areas is the actual pain points of IT professionals working in the security industry. Cynet, through

these videos, asks CISOs to re-evaluate their approach to cyber defense. Dori Harpaz, VP, Marketing for Cynet says, “Our newest generation technology challenges the common misperception that cybersecurity solutions are ineffective or too complicated to leverage the benefits. Cynet’s radical approach simplifies and converges cyber defense so organizations can quickly and easily handle cyber-attacks and remain focused on what they do best – their business.” Enterprises need a more holistic cybersecurity solution in comparison to what is currently available in the market. Cynet has come out with an Automated Breach Protection Platform to safeguard and protect the complete IT environment in an organization with a simple yet powerfully integrated control dashboard that is backed by a top System & Organizational Control (SOC) Team. The company has built a unique combination of the most advanced technology and security support infrastructure. So, it is Cynet360 software empowered with Sensor Fusion technology that can collect all activity signals, analyzing them together in a real-time environment to conclude the true context of each

activity based on which it enforces precise breach prevention actions. Cynet 360 Sensor Fusion technology begins with a sensor array to monitor activities of a file, process, memory, network traffic, and user accounts to find out any kind of exceptional behavior or patterns, individually and after fusing the results in order to analyze the findings thereby delivering automated precise actions that provide complete protection than any comparable solutions of platforms. As an outcome of this, enterprises get precise monitoring and control, attack prevention, and detection, and an immediate response orchestration for the highest order of breach prevention. The Cynet 360 technology platform is supported by CyOps 24/7 Cyber SWAT Team at no additional cost. This provides customers with the crucial cybersecurity staff required to ensure customers do not fail in keeping up with a fast-moving threatscape. The CyOps team of professionals includes security analysts, researchers, and experts capable enough to provide incident responses, forensics, threat hunting, and malware analysis.

FEBRUARY 2020    ENTERPRISE IT WORLD 23


CIO TALK // TECHNOLOGY AND TRAVEL INDUSTRY

HARISH CHANDRA BY SANJAY@ACCENTINFOMEDIA.COM

CTO, Sarovar Hotels

“The change is constant and the technologies are evolving in a rapid pace. Companies should embrace the change and adapt themselves at the same pace to cater to the customers in line with their business objectives. They should invest in and equip themselves with latest technologies to sustain in this tech-savvy modern world.”

24 ENTERPRISE IT WORLD    FEBRUARY 2020


TECHNOLOGY AND TRAVEL INDUSTRY // CIO TALK

FUTURE OF TECH INFUSED TRAVEL INDUSTRY Companies leveraging on Internet, CRS, e-commerce and distribution are able to attract customers in better way. In the last two decades, more ‘B’s related to technology has transformed our hotel and travel business, viz., Big data, Block Chain, Business Intelligence, Bots/Robots etc., writes Harish Chandra, CTO, Sarovar Hotels.

B

ack in the older days, hospitality industry was just about finding a place for the people to rest their heads and meeting their basic needs. In time, the number of players in the industry grew and the game has moved to a whole new arena of structured business. Service offerings changed from just bed to bed-bath and then to bed-bath-breakfast. Invention of mobiles and internet has revolutionized the service industry further with the addition of fourth important ‘B’- Broadband (High Speed Internet Access). Companies leveraging on Internet, CRS, e-commerce and distribution are able to attract customers in better way. In the last two decades, more ‘B’s related to technology has transformed our hotel and travel business, viz., Big data, Block Chain, Business Intelligence, Bots/Robots etc. Millennials and Generation M, born with mobiles in their hand and who are growing in tandem with technology have volatile mindset. This young internet-savvy population is one of the major potential travelers in the country. Gone are those days when travelers scoured through magazines and newspapers to book hotels and plan a vacation. Due to the increased internet and mobile usage, travelers have become more informed and they prefer scanning through hotel reviews before selecting one. Players in travel and hospitality industries integrated their business model with newest technology and constantly updated the features to cope up and stay in the business. Social media is the powerful tech tool and word-of-mouth has evolved to text-on-screen. Any positive comment about a brand from any social media handle has the potential to reach masses and elevate the brand’s perception and at

the same time, a bad remark from any traveler has the power to jeopardize the brand image. In addition to the physical tangible aspects, inventories and distribution system, a digitally enabled e-commerce platform has become a significant asset of any hotel and travel company. Hoteliers are making efforts and investing resources to build a robust and sophisticated online booking platform integrated with various intelligent and analytical systems for themselves to reach out to their potential customers and ensuring that room inventories do not remain unsold as rooms are perishable. Further, rooms are also sold by yielding the best possible rate coping up with the competitors. Absence of timely investment in technologies from the existing players who were busy in attaining operational efficiency, led to the bloom of new era of OTAs and online room aggregators. They have leveraged their business by concentrating on technologies to increase their visibility and indulging in target marketing using the power of Internet and SMAC (Social Media Analytics and Cloud). Travel and hospitality industries have started using advantages of existing technologies like Big data, Business analytics, Business Intelligence, Block chain and next gen evolving technologies to take business lead. We are in the era of ‘Screen age’ where everyone is surrounded by and busy in screens of mobile, tabs, laptop, and TV. Customers mostly buy what they see and companies are taking advantage of the same fact. For Example, the data from the user who has searched flights for Goa is used andthe potential traveler’s social handles and emails are blasted with different marketing ads related to travel services like staying, dining, taxi bookings using target marketing technologies such as

SMAC. The OTA’s, online room aggregators like Airbnb and others ADS invest heavily in their initial market spends with various lucrative offers, discounts and minimal commission rates to penetrate into the market base. The pricing has also become transparent since this digital reform and more offers and discounts are worked out to boost sales. These aggregators also provide bundled services where people can book flights, hotels, restaurants under the same umbrella in lower rates. They are providing aggressive discounts and some companies even spend more than their net revenue growth to lead in the fierce competition. In the long run, they pose one of the biggest threats to the hospitality service players as eventually commission rates are increased and discounts are also reduced. To remain sustainable, the players in travel and hospitality industry are making all the possible efforts to cope up with OTA’s offerings by providing various offers for other hotel offered services like discount of F&B, spa, and others. The ticket booking scenario has changed completely after the invention and infusion of technology into the lives of the travelers. Instead of standing in a long line at booking stations, ticket bookings are being done just in a few clicks. WhatsApp messenger which devoured Blackberry messenger, has been very helpful in handling guest’s booking, service requests and complaints and also has enabled service customizations just by sending WhatsApp messages to the hotel’s prescribed number. Overall, the advancement in technology has been a win-win game for both customers and service providers as it has put customers at ease in selecting and booking any service and has helped the service provider with guest handling, planning, upselling, cross-selling, improving branding and PR and in effective ORM (Online Reputation Management). Service providers are even able to improve their quality of service by listening to the customers through online feedback and comments on travel blogs/ social media. The Social media also enables companies to host successful marketing campaigns to increase brand awareness and to build a customer base, uplift the business and reap the benefits. To access the complete article log on to: www.enterpriseitworld.com

FEBRUARY 2020    ENTERPRISE IT WORLD 25


CIO TALK // CYBER INSURANCE

CYBER INSURANCE At an age when cyber security is of utmost importance, Mansi Thapar, Head - Information Security, Jaquar Group writes about mitigating risk in an era of ever changing risk landscape, laws and regulations and uncertainties. MANSI THAPAR

BY SANJAY@ACCENTINFOMEDIA.COM

Head - Information Security, Jaquar Group

W

hat is Cyber Insurance? Insurance products designed to help businesses hedge against the potentially negative effects of cybercrimes such as malware, ransomware, DDoS attacks, or any other method/manner used to

26 ENTERPRISE IT WORLD    FEBRUARY 2020

compromise a network and sensitive data. Do we need it? The Answer to this question lies within your organisation. It depends on many factors like organisational risk appetite, size, budgets, threat model, potential liabilities etc. Sticking to our usual MO – its best to be on the side of caution. According to one study 66% of SMBs would not

survive a data breach on their own. Also, the cybercrime industry (yes, it’s an industry) has never been more profitable and impact of security breaches is not only monetary but involves reputation loss, legal issues, loss of IP etc What are the Key Drivers? • Increasing Digitalisation of businesses especially by movement towards Saas,Paas,Iaas cloud


CYBER INSURANCE // CIO TALK

models, IOT, social media, mobile thus increasing the threat landscape • Evolving threat landscape involving ransomware, malware etc • Increase in cyber security awareness • Demand from Board/Management • Apprehensions around implications of various data privacy laws like GDPR and India Data Privacy Law (when it will come into effect) • Third party requirement like customers, partners What are the Key Challenges? Challenges for Insurance Provider • Lack of actuarial data on cyber-attacks inhibits robust risk assessment • Damages owing to cyber extortion, reputational loss, and rapidly evolving data and privacy landscape makes it difficult to quantify comprehensiveness and adequacy of cover • Cut throat competition on premium amounts • Gap between buyer’s expectations for cover and what a carrier has to actually offer • Buyers’ reluctance on sharing data that can help carriers evaluate risks Challenges for Buyers • Lower awareness on cyber insurance • Enterprises finding buying and claim processes to be tedious • Lack of understanding on which insurance policy to purchase • Inadequate knowledge on how the pricing

works for cyber insurance as no or little expertise available in the market What Questions/Checklist to Ask as a Buyer • Engage with a third party(broker/tech provider) to self-evaluate, upgrade, identify the right set of carriers, and get better deals on premiums • Before buying policies, create a ‘Cyber Insurance Cross-Functional Committee’ that has representation from Insurance Purchase Group, O_ces of CFO, CEO, CIO/CISO, CRO and CMO for better decision making • What aspects are covered under ‘Cyber Insurance’? Is there any overlap with other traditional insurance? • Does the policy cover pre-breach cyber risk assessment? Are there provisions for annual premium adjustments? • Does the policy have a panel of suppliers for post breach cover – forensic companies, PR, legal etc.? • Does the policy cover full limits for all coverage? • Does the policy cover laws of foreign countries, where you have business, such as GDPR? • Does the policy have a single retention and not separate retentions for each coverage element? • What is the minimum waiting period for business interruption cover? • Does the policy mention inclusion of GDPR coverage with full policy limits, to the extent insurable by the law?

• Are voluntary notification costs included in event management language? • Does the policy include cover under rogue employees? • Is terrorism specified in the policy, and what does it cover? • Does the policy provide access to extortion advisors? • Do suppliers have to be listed on the policy for coverage to apply? • Is it possible to have firms added to the preagreed panel? • What are the exclusions?

FEBRUARY 2020    ENTERPRISE IT WORLD 27


BY SANJAY@ACCENTINFOMEDIA.COM

CIO TALK // CLOUD MIGRATION

NIKHIL TANEJA

Managing Director-India, SAARC & Middle East, Radware

28 ENTERPRISE IT WORLD    FEBRUARY 2020


CLOUD MIGRATION // CIO TALK

CLOUD MIGRATION The flexibility and the cost benefit that drives the shift to the cloud also presents many challenges, writes Nikhil Taneja, Managing Director-India, SAARC & Middle East, Radware.

A

s services and data migrate to the cloud, the world of applications is undergoing a major change. Many factors are responsible for organizations to migrate applications to the cloud namely, lowering IT costs due to economies of scale, scalability due to elastic consumption, operational instead of a capital expense, and the ability to test and provision a new application quickly and thus a faster time to market. Most organizations will use multiple cloud providers, some in addition to their private cloud and on-premise deployments. This fluidity creates unique challenges in terms of how to make advanced services simpler to consume and maintain, and to address the need for both quicker and consistent deployment across multiple environments, each of which may have different capabilities, configurations, monitoring, management and administration. The process of migrating applications to the cloud is not easy. The flexibility and the cost benefit that drives the shift to the cloud also presents many challenges – security, business continuity and application availability, latency reduction, issues with visibility and SLA guarantees and isolation of resources. Migrating applications to the cloud(s) present some interesting challenges that require careful thought: • Licensing – May quickly become a planning nightmare without cost predictability for their organizations, as scaling an application with a metered model may create cost spikes. Pay as you go models may also promote shadow IT initiatives that impact both security and cost controls. • Lock-in with a cloud service provider. • Lack of standardization across clouds may require value-added advisory services, such as technical and consulting to deploy. • Architecture to address hybrid deployment.

• Automation – Self-service tools to reduce resource requirements in order to automate and integrate across multiple environments. • Visibility- Solutions that span both private and public cloud infrastructure also drive the need for a single pane of glass for management, monitoring and root cause analysis. • Security – For organizations, applications in the cloud may not have the same level of physical controls as they have for on premise deployment in their own data center. In addition, as applications are accessible over the web, the attack surface increases. • Other security requirements such as user access, user privacy, and compliance needs. Moving to the Cloud: The Non-Negotiables Scalability and Availability: Auto scale capability is important for organizations looking to automate operations – that is, to add and remove services on demand without manual intervention for licensing and to reclaim capacity when no longer in-use. This directly affects and saves costs. Security: As hackers probe network and application vulnerabilities to gain access to sensitive data, the prevention of unauthorized access needs to be multi-pronged: • Routinely applying security patches • Preventing denial of service attacks • Preventing rogue application ports/applications from running in the enterprise or on their hosted container applications in the cloud • Routine vulnerability assessment scans on container applications • Preventing bots from targeting applications and systems while being able to differentiate between good bots and bad bots • Scanning application source code for vulnerabilities and fixing them or using preventive measure such as deploying application firewalls • Encrypting the data at rest and in motion; and • Preventing malicious access by validating

users before they can access an application Analytics and visibility: When deploying microservices that may affect many applications, proactive monitoring, analytics and troubleshooting are critical before they become business disruptions. Monitoring may include information about a micro service such as latency, security issues, service uptime, and problems of access. Not only is proactive monitoring and troubleshooting through actionable insights helpful in configuring the appropriate technical capability to address the issue at hand, this visibility into application performance is important in terms of cost savings (for example, to de-provision unused resources when not needed or to mitigate an attack in progress). Automation: Although there are many benefits to a container-based application, it is a challenge to quickly roll out, troubleshoot, and manage these microservices. Manually allocating resources for applications and reconfiguring the load balancer to incorporate newly instantiated services is inefficient and error prone. It becomes problematic at scale especially with those that have short lifetimes. In addition, cross-domain services that span networking, application and security require collaboration across teams, often creating conflicts and delays in the testing and provisioning. Even more difficult is the learning curve across these different domains. Rolling out new services that are secure and high-performance requires deep IT expertise and familiarity with quirks of various systems. Automating the deployment of services quickly becomes a necessity. Automation tools transform the traditional manual approach into simpler automated scripts and tasks that do not require deep familiarity or expertise. Cost Predictability: Flexible licensing is one of the critical non-negotiable elements to consider. As you move application delivery services and instances to the cloud when needed, you should be able to reuse existing licenses across a hybrid deployment. Many customers initially deploy on public cloud but cost unpredictability becomes an issue once the services scale with usage. Any journey from a physical data center to the cloud requires careful thought, education and investment in new capabilities to enable migration to the new environment. As applications change in how they are designed, built, deployed and consumed, so have the application delivery infrastructures that have evolved to address the non-negotiables for applications in a continuous delivery/integration, hybrid and multi-cloud deployment.

FEBRUARY 2020    ENTERPRISE IT WORLD 29


CIO TALK  //  CYBERSECURITY

DATA BREACHES ARE INEVITABLE

BY SANJAY@ACCENTINFOMEDIA.COM

Meetali Sharma, Head - Risk, Compliance & Information Security, SDG Software writes on how you can protect yourself from Data Breaches. Last couple of years have been the ones where data breaches and ransomware attacks forced the enterprises to relook at their security program and countermeasures that have been implemented. As much as protecting customer/sensitive information from being compromised is important, so is the need to protect one’s own data. Information Security is not only the responsibility of the compliance team, but, every individual is a custodian of information security policy and responsible for protecting sensitive information. For long, “humans” have been considered as

30 ENTERPRISE IT WORLD    FEBRUARY 2020

the weakest link in Information security chain and “Insider Threat” is considered to be one of the topmost challenges of CISOs across Organizations. However, as individuals, there are a few small measures that we can take to stay protected from data breaches – 1. Protect all Endpoints – Be it laptop, desktop or smart phones: all need to be protected. Ensure that you have all the latest versions of software installed and anti-virus is also installed. We, generally, tend to ignore our smart phones thinking that it is not needed, but that is the most critical device that needs to be protected. A lot of

financial losses at individual levels have happened in the past by compromising bank credentials through smartphones. Hackers can even have access to corporate networks using your smartphones as most of us now-a-days check official mails on smartphones. Therefore, it becomes very important to patch your systems with critical updates that are released by OEMs like Microsoft, Adobe etc from time to time. 2. Protection from Phishing Attacks – Remember when we were children, our parents used to tell us not to talk to strangers or take any gifts from them. Similarly, if you see any mails in


CYBERSECURITY   //  CIO TALK

MEETALI SHARMA

Head - Risk, Compliance & Information Security, SDG Software writes on how you can protect yourself from Data Breaches.

“Information Security is not only the responsibility of the compliance team, but, every individual is a custodian of information security policy and responsible for protecting sensitive information.”

your inbox where either the sender or the email address is unknown to you or seems fake, do not click on it as it may result in a potential system attack. This goes true for emails as well as browser links or ads which promise some freeware. 3. Password Protection – How many times have you kept a single password for all your accounts or used your date of birth or child’s name or spouse name in passwords? I am sure many of us will have a “Yes” as a reply. One thumb rule in protecting data is to ensure that the passwords that are used are complex, nonrepeatable and non-identifiable to an individual. An example would be “abc123”, “password12345” Vs “i5!sMyP@s4” or “t@136Jb45k”. In addition, ensure that you keep changing the passwords of your bank accounts, email accounts from time

to time. Just as you would keep money safely in a bank or jewellery in a locker, always keep your mobile password protected to avoid people from stealing sensitive information and its misuse. 4. Use Multi-Factor Authentication – Many sites and banks these days offer you extra layer of defense through multi-factor authentication. For eg, in Gmail, you can now have a password as well as an OTP for logging into the account. Similarly, while making funds transfer from one bank to another bank account, it may ask you for your Transaction password along with an OTP that is sent to your phone or authenticate using some digits of your card. Even in smartphones, you can enable a combination of PIN as well as fingerprint for authentication. This is called “multi-factor authentication” or the use of more than one

method for authentication. You should turn this on for your bank accounts, email accounts and smartphones to ensure that extra layer of defense. 5. Lock, Lock & Lock – As the name states, whether it is your phone, laptop, desktop or drawer – ensure that is not left unattended and when it is, it should always be locked. There is a proverb which says, “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards”. In reality, we cannot cage our systems or power them off, so, it is better that we be a bit more disciplined, implement some of the security measures at an individual level and prepare our defenses well to stay protected and cyber resilient.

FEBRUARY 2020    ENTERPRISE IT WORLD

31


CIO TALK // DIGITAL TRANSFORMATION

DIGITAL TRANSFORMATION: AN AGE OF DISRUPTION As Digital Transformation becomes exceedingly crucial, Anand Sinha, CIO & Director -IT India, OCS Group UK, writes about Digital Transformation as an age of Disruption.

ANAND SINHA

CIO & DIRECTOR -IT INDIA, OCS GROUP UK

“Digital Transformation represents the next stage of

business development. It will improve how companies work inside and out.”

BY SANJAY@ACCENTINFOMEDIA.COM

D

igital Transformation is vast and often misunderstood as a formal effort to renovate business vision, models and investment for a new digital economy. This isn’t a trend owned by a particular role, nor a discipline that belongs to single function alone. It is, however, a significant movement where true business leaders venture into tomorrow’s markets, today. While the word ‘digital’ is part of ‘Digital Transformation’, the essence of digital Transformation comes down to people and how their digital behaviors differ from that of the traditional customers before them. It’s also more than that. Digital Transformation is most effective when it is tied to an end goal or series of milestones related to a future state. E.g. some organizations 32 ENTERPRISE IT WORLD    FEBRUARY 2020

invest in digital Transformation from a technology standpoint as a way to improve efficiencies and scale around a specific area of business like Customer experience, improve products and services, and increase the effectiveness of business operations others look at digital Transformation as a series of channel investments to modernize and enhance customer and employee engagement. But it really means what your enterprise must do to adapt and thrive. Digital Transformation strategists drive social business evolution and digital Transformation based on insight from peers and market leaders. Digital Transformation is most effective when it is tied to an end goal or series of milestones related to a future state. Digital Transformation as a movement under a customer-centric lens: The realignment of, or new investment in, technology and business models to

more effectively engage digital customers at every touchpoint in the customer experience lifecycle. Digital Transformations are more likely to succeed when organization focus on critical dimensions of business process. The key to digital Transformation is that ‘it’s not all about technology’. Its behavior whether it’s related to customers, employees, values or expectations. Digital Transformation comes down to people and every people is a change agent and change agents must make the case to earn executive support , and that takes journey mapping to data “what’s best for customer is best for use”. Digital Transformation represents the next stage of business development. It will improve how companies work—inside and out. But, without knowing how the customers or employees are evolving, digital Transformation is just new technology operating under the guise of change. Customer and digital first approach help change agents to identify priorities and difference among customer to create a sense of urgency and a roadmap for business priorities to resolve and align companies to assess the real customer experience. Few Key Strategies for any Digital Transformation: Identify market evolution & pains; Asses yourself where you are; Develop road map to get where you need; Focus on long term goal; Focus on customer & data; Get clear leadership buy in; Design for innovation, optimization, agility and scale; Set goals & KPI’s; Build ecosystem; Pause & Reboot. The major challenges for Digital Transformation’ are changing company culture, cooperation between functions and team, resources & lack of data to justify digital Transformation. Culture is Key and Executive support is critical for digital Transformation to start and success. Digital Transformation carries expectations that its impact can be measured at both customer and business levels. Digital Transformation doesn’t mean Digital Investment only it means thinking ‘Digital’.


SERVER TRENDS   //  TECH PREDICTION

DELL TECHNOLOGIES LISTS TOP SERVER TRENDS FOR 2020 Amongst many factors that will dominate the server market, Dell Technologies lists down 3 key trends that for the year 2020.

The year 2020 holds great importance as it marks the beginning. of what we call the Next Data Decade. New opportunities lie ahead for the server industry as organisations look towards accelerating the adoption of emerging technologies and transforming their IT infrastructure. In this hyper-competitive world, businesses will need to deploy agile and modern IT solutions to stay relevant. At Dell Technologies, we have constantly tried to innovate and deliver innovations via a balanced IT ecosystem combined with our holistic server portfolio. This makes us the right digital partner for customers who want to derive better business results.

RUDRAMUNI B, Vice President & India R&D Head,

BY SANJAY@ACCENTINFOMEDIA.COM

Dell Technologies.

The emergence of new-age technologies such as AI, ML, and cloud analytics, has disrupted IT operations, business models, and markets – creating a need for organisations to revamp their traditional IT infrastructures. To gain a competitive edge and to overcome significant challenges such as managing numerous workloads, organisations are heavily investing in transforming their IT infrastructure. Therefore, for a seamless transition into the future of IT, they need to deploy advanced servers that form the foundation of modern age IT infrastructure - running a variety of workloads from database to software-defined storage. Amongst many factors that will dominate the server market, Dell Technologies lists down 3 key trends that for the year 2020:

Server Security: Built-in, not bolted on: Data protection is increasingly becoming the top of the mind recall for IT managers, however, their major focus is only around protecting critical applications & OS from malicious attacks. Since server infrastructure is also the key to data center security, it becomes necessary for these IT managers to protect their servers from external threats. Hence, in 2020, we will witness the rise of holistic server solutions which will have security in-built into the infrastructure design rather than adding as an extra layer. Re-skilling Workforce: A necessity, not an option: With new-age technologies driving the next data decade, organizations are rapidly moving towards IT transformation. However, to make most of these modern IT infrastructures,

an upskilled workforce becomes necessary. For instance, in the context of compute, organisations will need to invest in re-skilling their engineers to make them understand these emerging technologies and to help them deliver better results. Hence, in this year, we will see re-skilling and up-skilling transition from an option into a requirement. Data & Scalability to go hand in hand: Data is the key to the future as businesses will eventually turn to data-driven insights to cater to the changing demands of their customers. As dependency on these emerging technologies continue to grow, we will witness an unprecedented growth of data. Therefore, organizations while anticipating their future growth, will look out for compute solutions that are scalable in nature.

FEBRUARY 2020    ENTERPRISE IT WORLD 33


TECH PREDICTION  //  RPA TRENDS

The key RPA trends to watch out in the year ahead are: RPA will Emerge as a Complementary Technology – The key benefit of RPA is that it plays well with other existing technologies. RPA has the potential to adapt quickly to changing circumstances and learn accordingly, hence it enhances processes rather than replacing them. Since it’s not always feasible to redesign workflows from the ground up, automating inefficient processes with RPA can greatly improve productivity. RPA Would Shift From Being a Point Solution to Comprehensive Offering – In 2020, The Automation market will see a shift from point solutions to more comprehensive offerings that will address integration challenges and enable best-in-class features that enterprises require. Digital transformation is a journey. RPA implementation shouldn’t be treated as a short term project to gain cost efficiency. It must be integrated in the processes from the beginning to avail comprehensive benefits.

BY SANJAY@ACCENTINFOMEDIA.COM

RPA Driving Hyper Automation – Organizations across the globe are realizing the benefits of incorporating Artificial Intelligence (AI) and Machine Learning (ML) within RPA framework to result in intelligent automation. Understanding the range of automation mechanisms, how they relate to one another and how they can be combined and coordinated is a major focus for hyper automation. This allows software robots to mimic human behavior and handle complex use cases, which was earlier not possible without human intervention. Autonomous Things – The emergence of autonomous things is a major landmark in technological progress. Early examples of this include autonomous drones and self-driving vehicles. In 2020, we expect a shift from stand-alone intelligent things to a swarm of collaborative intelligent things, with multiple devices working together, either independent of people or with minimum human input. In the future, autonomous things will go beyond process automation and integrate Artificial Intelligence (AI) to deliver advanced behaviors that interact more naturally with the environment and people. RPA Transforming the Job Market – RPA taking away jobs is the most debated topic in the industry. It is anticipated that RPA will affect

34 ENTERPRISE IT WORLD    FEBRUARY 2020

ROBOTIC PROCESS AUTOMATION TRENDS 2020 RPA market is evolving at a tremendous pace and is expected to grow at a CAGR of 20.3% between 2019 and 2025. This growth can be majorly attributed to how RPA streamlines and enhances legacy processes and results in high returns on investment (ROI), writes Neelesh Kripalani, Sr. VP and Head Center of Excellence (CoE), Clover Infotech. employment and half of the jobs will be replaced by automation. Contrary to popular beliefs, future trends suggest that there will be a collaboration between machines and humans in many areas. As a result, more jobs will be created by enhancing the nature of jobs and there will be a need for RPA and process experts to augment user interfaces and solve business problems.

As per Forrester, the RPA market will reach 2.9 billion dollars by 2021, which means RPA market will continue to grow at an exponential rate. There will be a sharp rise in adoption and implementation of RPA. It will be used for multiple processes in the organization across departments and it is expected to largely manage customer-focused and external processes.


CYBERSECURITY TRENDS   //  TECH PREDICTION

CYBERSECURITY PREDICTIONS 2020 Forecpoint predicts that cybersecurity threats in 2020 will stem from Deepfakes, 5G and Adoption of Public Cloud Systems.

There is an urgency among businessese to safeguard their data and people, as attackers are increasingly harnessing new technologies and techniques to launch attacks on intellectual property and critical data. By shifting from the outside-in approach to inside-out approach and keeping users and data at the centre of their cybersecurity design thinking, it will help organizations mitigate threats in near-real time in today’s sophisticated threat landscape.

SURENDRA SINGH, Senior Director and Country

BY SANJAY@ACCENTINFOMEDIA.COM

Manager, India & SAARC, Forcepoint.

Cybersecurity Landscape Predictions 2020 (Fortinet) span across topics such as attacker techniques, communication platforms, infrastructure adoption, data protection legislation and cybersecurity strategies. 1. Deepfakes-As-A-Service increases ransomware effectiveness and election interference With the growing complexity and realism being brought in to Deepfakes, it is predicted that the media will move to the forefront in 2020 as it becomes widely adopted for both fun and malicious reasons. It is anticipated that deepfakes will be deployed to impersonate high-level targets at enterprises in order to scam employees to transfer money into fraudulent accounts. Additionally, we will observe Ransomware authors target recipients with realistic videos of themselves in compromising situations, using Deepfake technology. In the arena of politics, we expect deepfakes to be leveraged as a tool to discredit candidates and push inaccurate political messages to voters via social media. 2. Organizations will become “Cloud Smart” but remain “Cloud Dumb” As organisations increase their adoption of cloud infrastructure, we should expect to see greater and greater breaches of Public Cloud systems. When

it comes to securing the cloud infrastructures, some enterprises continue to remain “Cloud Dumb” due to the prevalent misconception that cloud providers will also secure the infrastructure. Attackers will have a renewed focus on Public Cloud accessible systems and data in 2020 and beyond due to the richness of the prize and ease of accessing it. While cloud service vendors are responsible for protecting the infrastructure, the onus of protecting business critical data lies on the enterprise by monitoring access, managing configurations, and analysing risky user behaviours. We expect to see more breaches both from external and internal parties as Cloud applications become more ubiquitous. 3. Businesses will mature in their approach to data/privacy protection legislation There is greater awareness on the need for data privacy amidst organizations and individuals, due to regulatory implementations following the European Union’s GDPR and the upcoming Indian cybersecurity policy. Organizations around the globe have observed that maintaining an individual’s (customer’s) privacy and protecting their data can be a differentiator of the business’s service. We expect this trend to continue into 2020 and beyond. Furthermore, in 2020 organiza-

tions will explore the non-breach non-compliance implications of data privacy and protection regulations. This will invoke a move from a breach prevention approach to a more holistic principles-based approach. Moreover, compared to the fines levied in 2019 we can expect 2020 to observe an exponential increase with regard to the size and quantity of fines that Supervisory Authorities will bring to bear on offenders. 4. Cybersecurity strategies will incorporate a move from Indicators of Compromise (IoC) to Indicators of Behaviour (IoB) In 2020, there will be a marked increase in the number of organizations recognising the need to enhance their IoC-based threat intelligence with the contextual insights of behavioural indicators. A shift to Indicators of Behaviour will better protect their data in the modern network environments that support anytime, anywhere working. As such business’s cybersecurity strategies will shift from an outside-in approach (looking at how external attackers are seeking to penetrate a perimeter) to one of an inside-out approach (understanding the risks that lie within and the importance of preventing data theft no matter the user, device, transfer medium or cloud application). FEBRUARY 2020    ENTERPRISE IT WORLD 35


TECH PREDICTION  //  DIGITAL BUSINESS TRENDS

PREPARING FOR THE FUTURE OF DIGITAL: PREDICTIONS FOR 2020 RSA Security has outlined top 20 predictions for the security and risk industry with a focus on the elements of digital risk that will shape the future of business. Business Predictions The Rise of the Cyber-Savvy Board Accountability for cyber risk will move up the org chart, with forward-thinking businesses appointing board members with experience in risk management and information security. Over time, investors will further elevate the need for clear digital risk management strategies, and such board expertise will become the new normal.

BY SANJAY@ACCENTINFOMEDIA.COM

Authentication Demands Adapt to Evolving Needs Despite a growing list of options, there is still no one-size-fits-all solution for identity and access management. Better buyer support and more decision-making guides will help businesses looking to strike a balance between security and user experience. A focus on Data Sovereignty in the Middle East As Turkish, Middle Eastern and North African businesses rush to the cloud, countries will demand that data centers be established within their borders. Major technology providers will feel the pressure, and invest more heavily in the region. Brexit Brings New Risk Assessments With the UK’s exit from the E.U. looming, 36 ENTERPRISE IT WORLD    FEBRUARY 2020

businesses must re-evaluate their risk assessment—including identifying and mitigating Brexit-associated cyber threats. Info Sec Predictions Security Shifts Left Increasing demand for cloud-native apps will force security teams to work more closely with DevOps. Moving pentesting and code analysis up in the development lifecycle will boost product security. But security teams will need to communicate with developers in a language they understand—for example, referencing delays and unplanned work instead of talking about vulnerabilities. Technology Helps Close the Skills Gap Even with the best tools, processes and budget, a lack of talent makes it hard to manage cyber risk—and more than half of companies surveyed report a “problematic shortage” of cybersecurity skills. Businesses will look to reduce dependency on talent via security orchestration and automation software, risk-based prioritization, and comprehensive threat analytics. Technology Predictions A.I.’s Black Box Opens a Crack

Artificial intelligence (AI) will evolve to a point where recommendations based on its analysis can be more readilyunderstood—even by those without technical skills. Legacy Systems Under the Microscope Many businesses operate on a fragile network of legacy systems, stitched together with API connections. The stage is set for a security incident that disrupts this patchwork, triggering major outages and serving as a wake-up call to evaluate legacy system security. Cyber Predictions Cybersecurity and Democracy Collide Have governments learned anything from 2016? This election cycle will prove pivotal in shaping the future of election security. Hacking Attacks Rise in the Cryptosphere The security of cryptocurrencies rests on safeguarding users’ private keys. Cybercriminals tend to follow the money, so expect cryptocurrency to be at the top of attackers’ wish lists in 2020. An Attack at the Edge Puts Businesses on Notice


DIGITAL BUSINESS TRENDS   //  TECH PREDICTION

The continued proliferation of IoT devices is making edge computing an essential component of IT infrastructure. But threat visibility becomes more critical as the number of endpoints in the network multiplies. A major security incident could see enterprises rushing to invest in monitored and controlled device gateways. Criminals Focus on Taking Over Accounts Savvy cybercriminals are shifting their focus from stealing credentials to infiltrating password recovery mechanisms, with a goal of harvesting and resetting user credentials en-masse. User identities will be re-established with new usernames and passwords as fast as you can say “cybercriminal”. A Target on the Infrastructure Backbone Too much of global infrastructure, including fundamentals like water and power, relies on aging technology vulnerable to exploitation. Expect to see nations bolster industrial control system (ICS) monitoring and defenses, in hopes of fending off increasingly commonplace—and devastating—attacks. A New Angle for Ransomware

The popular attack vector won’t just hold your data hostage—it will stop you from connecting to critical infrastructure. How much would you pay for access to your systems and accounts? Consumer Predictions Cybersecurity Gets Physical With global events such as the Summer Olympics and Dubai World Expo delivering experiences through a blend of infrastructure and connected systems, cybersecurity will move beyond data to encompass more and more of our physical well-being—or “cyber safety”. Companies Pass the BYOD Hot Potato Bring Your Own Data (BYOD) programs bring tremendous assets—and new cybersecurity liabilities. More and more businesses will use BYOD policies such as user-owned decentralized storage to limit liability—and leave it to employees. Meanwhile, organizations that don’t directly monetize data will make data security consumers’ problem. IoT Attacks Shake Consumer Confidence Motivated more by vast disruption than a big

payout, malicious actors will attack the unsecured IoT endpoint of a popular connected device. Consumers will question their security assumptions raising important questions about weaknesses in, and governance of, virtual assistants Spoofing Goes Mainstream A popular mobile app will offer consumers on-demand animated spoofing—and trigger widespread discussion of deepfakes, media integrity, and how to regulate and police false content Regulatory Predictions Breach Accountability Gets Even Murkier A high-profile organizational breach will be traced to an API integration. So, who pays the GDPR fine? The resulting controversy will spark debate about regulatory accountability in a growing third-party ecosystem The Feds Punt on Privacy Despite many states ratifying data privacy laws in 2019, the U.S. federal government won’t reach agreement on 2020 privacy legislation—leaving states to regulate the issue.

FEBRUARY 2020    ENTERPRISE IT WORLD 37


THE STUFF  //  PRODUCTS & SERVICES

CIO TOYS

POLY VIDEO CONFERENCING STUDIO X SERIES

Plantronics’ Studio X series’ newly launched purpose-built all-in-one video bars, the Poly Studio X30 and Poly Studio X50 does not require an external PC or Mac to drive the meeting room experience and are simple to use with support for leading cloud video services such as Zoom and Microsoft Teams built right in. The Studio X Series also features new Poly MeetingAI capabilities for breakthrough audio and video experiences built on machine learning and artificial intelligence. With Poly Studio X30 and Poly Studio X50, Poly is bringing greater choice and flexibility to address the needs of all meeting spaces for its customers. Poly’s line of video devices is designed to work seamlessly with modern collaboration applications to streamline the experience, completely reinvented with support for 4K Ultra high definition (UHD). When Poly Studio X30 is ideal for small offices or huddle rooms, Poly Studio X50 suits the needs of mid-size conference rooms.

B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

MATRIX OFFERS 5 MP IP SECURITY CAMERAS Matrix offers the 5 MP IP Security Cameras that are powered by Sony STARVIS sensor with Exmor technology to deliver exceptional performance under low light. Available in Dome and Bullet variants, Matrix 5MP IP Cameras are best suited for Enterprises and are ideal for both indoor and outdoor applications. The key feature of this security camera is that it is powered by Sony STARVIS sensor with Exmor technology. It delivers exceptional low light performance. The camera comes with True WDR. It delivers consistent image quality in poor light conditions. Another key feature is that the Matrix 5 MP IP Security Camera offers latest H.265 Compression technology. It also reduces storage costs. Other features include Adaptive Streaming; reduced frame rate based on motion; saves up to 50% of storage space; Vandal Proof – Comes

38 ENTERPRISE IT WORLD    FEBRUARY 2020

with unbreakable closure (IK10); Real-time Security – Offers Early detection, Instant Notifications, and Two-way Audio; and IP66 Certified

Project and Professional Series – Glitch-free performance under extreme conditions.


FOR THE CIOs. BY THE CIOs.

2020 UPCOMING EVENTS

CALENDAR APR

CIO 100 (Australia)

MAY CISO 200

JUN CISO 100 (Dubai) AUG CMO Awards

JUL CIO 100 (Dubai)

SEP HTPC DEC CIO 500

OCT Channel Partner Awards


Date of Publication: 28 of Every Month Date of Posting: 1 & 2 of Every Month

RNI NO: DEL ENG/ 2017/ 69906 Postal Reg. No.: DL-SW-01 / 4200 / 17-19

India’s Only and

Asia’s Largest Rated-4 Hyperscale Datacenter Service Provider

Our Upcoming Hyperscale Rated 4 Datacenter Facilities in India

Powering Most Mission Critical Applications (BFSI, Cloud, E-Commerce, Social Media, Healthcare, Retail etc)

Zero Downtime History Since Inception

Colocation Services

Services

Sustainability

Racks Cages/Private Suites Wholesale Space Customized Hyperscale Facilities

Lift and Shift Data Migration Services Managed Services Infrastructure as a Service Datacenter Design and Build

Solar Powered Facilities Low Energy Consumption Focus on Carbon reduction

Disaster Recovery

CtrlS Differentiators

Disaster Recovery Services

World’s 1st LEED Platinum Certified Datacenter Quake Proof and 100% Pollution Free Data Centers Industry best uptime SLA of 99.995% Industry lowest PUE 0f 1.38* Carrier Neutral Facilities

1000+ Work Area Recovery Seats Flexible, Customizable Plans

Write to us on marketing@ctrls.in for further details

www.ctrls.in


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.