SPECIAL SUPPLEMENT BY
ISSUE 01| MARCH 2018
EXPLORE VALUE-ADDED OFFERINGS Comprehensive solutions to solve business challenges should be a priority for channel partners
PUBLICATION LICENSED BY DUBAI PRODUCTION CITY, DCC
With more than 25 years of experience in IT Distribution, ASBIS SOLUTIONS (VAD division of ASBIS Group) is a trusted Solutions provider of innovative solutions for our partners
Solutions & Services
Phone: +971 4 8863850, Email: firstname.lastname@example.org, www.asbisme.ae
Server & Storage Solutions Networking & Wireless Solutions Cyber Security Solutions Unified Communication Solutions
VP NOTE Hesham Tantawi, VP, Middle East and North Africa, Asbis ME, reveals the firm’s growth strategies.
05 BLOG Praveen Singh, Sales
Director, Solutions, Asbis Middle East, maps out the company’s strategies and objectives for 2018.
SPECIAL SUPPLEMENT BY
07 UBIQUITI UniFi from Ubiquiti
Networks - The beginning of the enterprise WiFi market disruption
11 TP-LINK TP-Link reinforces SMB business through partners
13 GRANDSTREAM Phil Bowers, Senior Marketing Manager, Grandstream, explains how Internet of Things is driving the future of VoIP
16 ESET Dimitris Raekos, General Manager,
ESET Middle East, explains how securing personal and corporate data has evolved in the new age of technology
22 SEAGATE Seagate SkyHawk takes storage to
new heights with British Airways i360
Raring to go Dear Partners,
“PARTNERS CAN EXPECT EVEN MORE IN-DEPTH SUPPORT AND ENABLEMENT INITIATIVES FROM US, WHICH WILL HELP THEM TO STAY PROFITABLE.”
Over the years, Asbis ME has been a strong IT distributor in the region and has grown from strength to strength even during challenging market circumstances. As everything is moving towards digital and into the cloud; customers, resellers and dealers must focus on solutions. This is how they can serve the market efficiently and effectively. Partners need to identify the right solutions to focus on and then sell them. Today it is not about selling just a notebook but it is more about selling a complete solution, which includes servers, storage and a notebook. This is the approach that partners must adopt to be successful. We are now working towards becoming a one-stop-shop for enterprise, data centres, services, storage solutions and Internet of Things (IoT) during the course of 2018. We will continue our emphasis on volume within these areas. The volume we are seeing in PCs and notebooks have been declining year-over-year. The growth is largely going to be around solutions and consolidation. One of our focus areas is to develop vendors such as Logitech with whom we have a strong partnership to provide robust solutions for logistics, tier-1 partners and distributors. We are expecting to grow by 20 percent this year and are confident to attain this through strong channel partnerships. We encourage all our partners to be focused in their approach, identify and compile compelling solutions and sell them profitably. We are also looking to grow our portfolio in solutions this year. Partners can expect even more in-depth support and enablement initiatives from us, which will help them to stay profitable. Our channel strategy is simple – more ‘partnerships’ than just customer relationships. We depend on long-lasting relationships with our partners. Our aim is to continue serving them in the right areas and be the preferred partner of choice for years to come.
Hesham Tantawi Vice President, Middle East and North Africa, Asbis ME 4 //
The solutions play Praveen Singh, Sales Director, Solutions, Asbis Middle East, maps out the company’s strategies and objectives for 2018.
SBIS Solutions is the value-added distribution division of ASBIS Group. As the name suggests, we focus on combining different technologies and providing complete solutions rather than just products to our channel partners.
Our strategy is to identify the requirement, understand the challenge and subsequently offer bestsuited solutions to our partners. We offer best-in-class technology solutions for different industry sectors. We aim to Praveen Singh, Asbis ME develop innovative solutions, which can deliver value not only for IT, but also for their business needs. Our vision is to be the ‘Trusted Solutions Provider’ for our partners throughout the complete Solutions Cycle. The Solutions Cycle consists the following stages: Pre-sales enablement »Lead generation through marketing » Identify and Qualify need » Solution Design and Presentation » Implementation support and Consultancy.
Solutions: Data center, connectivity, data analytics, data protection, mobility Target Industries: Oil & Gas, Financial Services, Hospitality, Healthcare, Education, Government
We enable our partners on our offerings throughout the solution cycle in different ways such as • Solutions briefing on use cases of applications areas in different vertical segments • Solution center demo for use cases across different applications areas • Solutions focused training programs for partners • Technology workshops and seminars
What sets us apart from competition can be attributed to a number of factors. We boast a broad geographical coverage with central management team and strategic development plans. We follow a proactive marketing approach, which includes hosting seminars and workshops for target audiences.
We have a dedicated solutions team that includes sales, pre-sales and support engineers. We focus on partners’ development in our endeavor to be a trusted supplier. We support our partner ecosystem in project sales and offer them resources for design, demo and finance among other aspects.
Objectives for 2018
During the course of this year, the market will see us venturing into newer areas while simultaneously strengthening our existing offerings. We aim to expand our Solutions portfolio into technologies such as computing, storage, security and unified communications. We are looking to accelerate Solutions offerings to data centers and Cloud Solutions Providers. One of our objectives is also to increase partner breadth and depth across the spectrum of our solutions offerings while also enhancing geographical coverage in new territories. Our main business objective is to achieve aggressive growth and leadership position in solutions distribution across the region.
Our offerings are classified into the following• Technology: Computing, storage, networking, security, unified communications, software applications
Asbis Middle East’s success factors for Solutions distribution
Designed for the Future of the Internet The UniFi AC AP delivers the throughput needed for bandwidth-intensive applications, including HD video streaming, interactive online gaming, and cloud services.
UniFi AC Access Points:
UniFi AP AC SHD
UniFi AP AC HD
UniFi AP AC Pro
802.11ac Wave 2 AP with Dedicated Security Radio 2.4GHz- 5GHz-800MBPS-1733MBPS
802.11ac Wave 2 Enterprise Wi-Fi AP 2.4GHz-5GHz- 800MBPS-1733MBPS
802.11ac PRO Access Point 2.4GHz-5GHz-450MBPS-1300MBPS
UniFi AP AC LR 802.11ac Long Range Access Point 2.4GHz-5GHz-450MBPS-867MBPS
Breakthrough Wi-Fi Mesh Technology Expand the limits of wide-area Wi-Fi. UniFiÂ® Mesh technology simplifies Wi-Fi infrastructure deployments by enabling nearly unlimited application use including towns, stadiums, conference halls, and concert venues.
ASBIS Middle East FZE | Phone: +971-4-8863850 | Email: email@example.com | Web: www.asbisme.ae
UniFi AP AC Lite 802.11ac Dual Radio Access Point 2.4GHz-5GHz-300MBPS-867MBPS
UniFi from Ubiquiti Networks The beginning of the enterprise WiFi market disruption
biquiti Networks introduced UniFi, an Enterprise WiFi solution and believed its solution would find its way to disrupting the market and breaking the established IT sales dynamics due to its cost advantage, intrigue design, quality, combined with features set and some “Ubiquiti magic”. Here are a few examples of “Ubiquiti magic” inherent in the UniFi platform.
The “UniFi” marketing brand
“Uni” — which means to combine multiple pieces into one; paired with “WiFi” creates “UniFi” — the perfect name for a system that manages multiple WiFi AP’s within a single control plane. Even better, this word transcends languages nicely — this is important as non-native English speakers makeup a big part of our customer base.
A true enterprise WiFi AP today should be fast, resilient, and reliable. It should be near-ethernet speed under light load, provide solid performance and low-latency under heavy loads and interference, as well as maintain stability at all times — even when faced with possibly any of thousands of older quirky 802.11 legacy devices fighting for air time. The UniFi platform
was always effective in delivering elegant AP management, but it wasn’t until last year that we achieved true enterprise wireless performance — and we haven’t stopped there. In fact, by many accounts, UniFi has now quickly ascended to be the top performing WiFi Solution in the Industry. To get to this level of performance has been an exercise in persistently testing and optimizing of the wireless driver performance with rapid iteration. In fact, we have built teams to develop tools just to allow us to conduct testing more efficiently. These tools combined with the transparent feedback of our community, who have collectively deployed 10mm+ AP’s, have enabled us to make excellent progress in a short amount of time.
UniFi product breadth
UniFi offers a comprehensive family of Access Points covering various applications including Hospitality, Education, Financial services, Enterprises, Government- each with unique form-factors designed specifically for their application use. UniFi has five product categories that include- Wave 2 wireless AC product line, Standard wireless AC product line, Mesh wireless AC products, In-wall wireless AC products and Legacy wireless N products.
Second wave of disruption
Ubiquiti launched its Second wave of Disruption UniFi product line- Wave 2 ac High Density (HD) products and became from Value Leader to New Industry Performance Leader. The UniFi® AC HD is the first 802.11ac Wave 2 AP for use in high density deployments. It features simultaneous, dual-band, 4x4 MU MIMO (Multi User, Multiple
THESE TOOLS COMBINED WITH THE TRANSPARENT FEEDBACK OF OUR COMMUNITY, WHO HAVE COLLECTIVELY DEPLOYED 10MM+ AP’S, HAVE ENABLED US TO MAKE EXCELLENT PROGRESS IN A SHORT AMOUNT OF TIME.
analyzes all of available RF channels without affecting performance or disrupting client activity. airTime™ analyzes Wi Fi packets for real time visibility into channel utilization so the UniFi AC SHD AP can automatically select the best channel to optimize performance across your installation. The UniFi AC SHD AP acts as a Wireless Intrusion Prevention System (WIPS) and Wireless Intrusion Detection System (WIDS). Its dedicated dual band security radio constantly monitors all available Wi Fi channels and protects against threats.
While UniFi is known as a WiFi system, it is rapidly expanding to adjacent technologies. The UniFi switching portfolio is quickly gaining market share and we are focused on bringing higher-end gateways, application servers, and other technologies to market — all managed within the UniFi controller. Input, Multiple Output) technology and 802.3at PoE+ compatibility. 802.11ac Wave 2 MU MIMO technology allows a Wave 2 AP to communicate with multiple clients at the same time– significantly increasing multi user throughput and overall user experience. The second Wave 2 ac product is UniFi AC SHD which is the first UniFi 802.11ac Wave 2 AP with a radio dedicated to spectral security. It’s RF monitoring and analytics make it ideal for hospitals, banks, and universities – any place handling confidential yet high volume information. The airView® tool
Business Wi-Fi Solution
Easy and Scalable Business Wi-Fi
Captive Portal Service
Cloud Controller* App
Small and Medium Enterprises Business
Load Balance TP -Link MEA FZE
Rate Limit firstname.lastname@example.org
Radical strategies TP-Link reinforces SMB business through partners
Lucas Jiang, TP-Link MEA
SMB TAKES QUITE LONG TIME AND REQUIRES MORE SERVICES. A ONESIZE-FITS-ALL APPROACH DOESN’T WORK ANY LONGER. WE ARE GOING TO INTEGRATE RESOURCE TO PROMOTE OUR DEDICATED SOLUTION.
P-Link Technologies Co Ltd, a Global provider of SOHO, SMB networking products, wireless LAN solutions and mobile devices, has announced initiatives that will enable channel partners to expand its products and solutions in the Middle East and Africa (MEA) market. According to the vendor, the strategy to reinforce its SMB business comes at a time when the company has built a proper funnel and certified hundreds of TPNAs across the region. Lucas Jiang, General Manager, TP-Link MEA, said, last year was challenging for the regional IT market and this year, SMBs will still face pressure from limited budgets. With growing investment in infrastructure, the demand for affordable networking solution will go up. According to TP-Link, to raise awareness and educate their customers on the company’s SMB products and solutions that have been unveiled across 2017 and this year, they will approach end clients actively and maximize their reach. Jiang said the company spent a lot of time studying the SMB market, looking for qualified partners and educating the market with TP-Link solutions. We have accomplished phase one. It’s time to move to the next level. Jiang explained unlike FMCG, SMB takes quite long time and requires more services. A one-size-fits-all approach doesn’t work any longer. “We are going to integrate resources to promote our dedicated solution. Based on our understanding of the
market and the advantage of our solution, we are planning a series of campaigns with our selected partners in this vertical. We want to make our solution easy to use and add value to their business.” He added despite increasing market pressures, especially on smaller channel partners serving the SMB sector, TP-Link, along with its distributors, assist them to stay competitive by offering affordable products and solutions, margin, marketing, credit pre/after sales and so on.
TP-Link is a global provider of SOHO & SMB networking products and the World’s No.1 provider of WLAN products, with products available in over 120 countries to tens of millions customers. Committed to intensive R&D, efficient production and strict quality management, TP-Link continues to provide award-winning networking products in Wireless, ADSL, Routers, Switches, IP Cameras, Power line Adapters, Print Servers, Media Converters and Network Adapters for Global end-users. Based on the confidence of tens of millions of customers, TPLink is now growing to become one of the most competitive providers of networking products with aspirations to become one of the top 3 networking brands in the world and striving for a larger global market share, while further advancing in the world of networking to better serve our most valued customers with products that make their lives easier.
A secure and connected business is a successful business
Grandstream solutions are connecting businesses in more than 150 countries
Hailing the future Phil Bowers, Senior Marketing Manager, Grandstream, explains how Internet of Things is driving the future of VoIP
Phil Bowers, Grandstream
THESE SECURITY DEVICES AND PLATFORMS CAN BE SET TO AUTOMATICALLY CALL OR NOTIFY IP PHONES WHEN ANY SECURITY EVENT OCCURS.
ere at Grandstream, we have been designing SIP solutions since the dawn of the VoIP era in the early 2000s. Like any technology, VoIP requires constant innovation and adaptation in order to keep up with the always-changing ways we live. Over the past decade, VoIP has shifted from being a voice protocol to the powerful unified communications engine that is today. The future of VoIP, and more specifically VoIP endpoints, will require continued evolution and adaptation. With the ability to communicate from almost any device, how do manufacturers ensure VoIP endpoints continue to be relevant? The answer to that question may very well lie in the tenants of the Internet-of-things (IoT), a paradigm-shifting idea that is changing the way we look at technology. The IoT strives to interconnect every internetcapable device “to transfer and access data over a network without human-to-human or human-to-computer interaction.” (IoT Agenda, Tech Target). It offers a seamless way to connect all of the devices, applications and platforms we use every day, allowing them to work together and create smart, proactive, impactful technology solutions that make our lives easier. Every VoIP device can and should be able to serve multiple purposes beyond sending voice and video-packets. Most every SIP device has built-in computing power and at least a speaker and/or camera, giving these endpoints the ability to communicate with other
devices, platforms and sensors. This is where the IoT meets VoIP and why the future of VoIP may very well be based on the IoT. Manufacturers are now looking at VoIP endpoints as dynamic solutions that can proactively work together, share information and serve a variety of purposes. Recently, Grandstream has sought to expand the way our products work together, and the integration options they offer, in order to allow our customers to build smart offices that expand the flow of information and drive business results. Let’s take a look at some examples and popular VoIP trends.
Security and Facility Access
VoIP endpoints can play a proactive role in keeping any location secure while also controlling access to that facility. IP security cameras and door access systems can be called from any Internet-connected device to view live feeds. These security devices and platforms can be set to automatically call or notify IP phones when any security event occurs. IP phones can also work with door access systems, like our GDS3710, to allow users to be notified when visitors arrive and to allow or restrict building access.
The merging of VoIP platforms with popular mobile platforms has begun. Grandstream’s GXV series of IP Video Phones for Android™ are game-changing IP phones that run the Android operating system, allowing them to use any Android app and sync with any Google account. Integration with mobile platforms offers
or feed data, for example, mini bar status, into a PMS platform. That data can then be accessed on many other devices for hotel management and billing. At Grandstream, we have integrated our UCM series of IP PBXs, and therefore our IP Phones, with a variety of PMSâ€™ to allow hotels to deploy endpoints not only for calling, but also for real-time hotel management.
Customer Relationship Management platforms
IP phones can now be integrated with customer relationship management (CRM) platforms to allow them to provide detailed information about every caller and feed data from the call back into the CRM. Our UCM series of IP PBXs has been integrated with SalesForce and SugarCRM to allow our IP phones to be extensions of these CRM platforms. unlimited IoT possibilities for VoIP devices to do everything from control the office thermostat to redirect calls and messaging based on real-time presence.
VoIP endpoints now offer a variety of messaging options and applications that allow them to communicate with almost any other device. Many VoIP platforms are being integrated with messaging platforms, allowing use of Skype, Google Hangouts, Slack and more, from many IP phones. Grandstream IP phones, when integrated with our UCM series, also support SMS text messaging.
GRANDSTREAM HAS SOUGHT TO EXPAND THE WAY OUR PRODUCTS WORK TOGETHER, AND THE INTEGRATION OPTIONS THEY OFFER, IN ORDER TO ALLOW OUR CUSTOMERS TO BUILD SMART OFFICES THAT EXPAND THE FLOW OF INFORMATION AND DRIVE BUSINESS RESULTS.
Scheduling and Calendars
Many UC systems, like our UCM series of IP PBXs, and many video conferencing products, including our GVC series, can be automatically synced with Google Calendar. If you schedule a video conference with your GVC series device, or schedule a conference call through our UCM series, the devices can automatically add those events to any Google Calendar and call all participants when the event begins.
Property Management Systems
By integrating a property management system (PMS) with a VoIP system, VoIP endpoints can be used to manage critical operations and logistics within a hotel. Hotel staff can use any IP phone to access
Mobile device integration
All the features of your VoIP system can be accessed on any mobile device. Softphone apps, like our free Grandstream Wave app, allow users to use mobile devices to utilize all VoIP features. Many IP PBXs, including our UCM series, can forward calls to mobile phones as well as faxes and voicemails to email. This article has also touched on a variety of other ways that VoIP endpoints can share information with mobile devices.
This is just the beginningâ€Ś
Since every SIP device is connected to the Internet, includes built-in computing power, and offers voice and/or video functionality, the IoT possibilities for VoIP endpoints to control other devices or be controlled is almost unlimited. The potential is there for VoIP devices to automatically control and manage everything within any facility using real-time data, including lighting, HVAC, communication flows, presence, maintenance and more. We are just beginning to discover the true potential that the IoT offers to VoIP. Stay tuned.
All about data Dimitris Raekos, General Manager, ESET Middle East, explains how securing personal and corporate data has evolved in the new age of technology What are some of the major mistakes companies do related to data protection?
Dimitris Raekos, ESET Middle East
How important is it to keep sensitive data safe?
Keeping sensitive information secure from theft and vulnerability isn’t an easy task and even if you take every precaution and identify information, there are many ways that data can land into the wrong hands or even manipulated for ransom. Besides the fact that the reputation of an individual or a company can be seriously damaged by a data leakage, the
latest compliance requirements and especially the European General Data Protection Regulation (GDPR), has strict global ramifications. For example, companies found in breach of GDPR can be fined up to 4 percent of their annual global turnover or €20 million – whichever is greater. So, obviously the penalties for noncompliance can have a severe impact on a company’s viability.
As data is constantly increasing in organizations of all sizes, so do the security challenges. It is time for companies to locate and classify data, and take the appropriate measures to ensure security. Some of the biggest mistakes companies do is they fail to protect data from internal threats, rely too much on technology, underestimate the need of user education and they don’t test their procedures and systems. At ESET, one of our top priorities is helping our customers understand what is really going on inside their company, keep their sensitive data where it belongs and as secure as possible. This is done by offering consulting services and by having a big portfolio of technology solutions on top of Endpoint Security, such as Two-Factor Authentication, Endpoint Encryption and also via our technology alliances, such as Data Loss Prevention, Intelligent Network Traffic Analysis, Backup and Recovery.
Is free software and services risky?
Many times, end-users expect to enjoy software at no cost, or very low cost, without
“SOME OF THE BIGGEST MISTAKES COMPANIES DO IS THEY FAIL TO PROTECT DATA FROM INTERNAL THREATS, RELY TOO MUCH ON TECHNOLOGY, UNDERESTIMATE THE NEED OF USER EDUCATION AND THEY DON’T TEST THEIR PROCEDURES AND SYSTEMS.” ESET Technology—The multilayered approach and its effectiveness
Are there any concerns for free security software too?
In the past year, we have seen trusted security vendors MACHINE LEARNING deciding to offer free antivirus products. While they may not have openly declared their intentions as to how the monetization of their new, free products will work, we can expect to see some of them use indirect monetization methods such as data collection. The free or low-cost cybersecurity software will increase risks connected with data privacy, as free software usually lacks traditional monetization methods, and instead, introduces complex disclosure statements that are in part designed to obscure intent as to what data is being collected and whether it can be sold. This is evidenced by many companies offering lengthy and unreadable privacy policies that are comprehensible only to lawyers. It is very important that users understand how the company is making money, if it is not obvious then it is highly likely your data and privacy are to be used by third parties.
How is ESET complying with regulations?
Starting on May 2018, the European Commission’s General Data Protection Regulation will be in effect and will
BEHAVIORAL DETECTION AND BLOCKING - HIPS
SE Labs focused on detection of ransomware, ESET scored 100%. The word “reputable” is very important: NETWORK ATTACK REPUTATION IN-PRODUCT DNA UEFI SCANNER PROTECTION & CACHE SANDBOX DETECTION there are tests out there that provide no informational value whatsoever. ADVANCED RANSOMWARE EXPLOIT Some of these MEMORY SCANNER SHIELD BLOCKER are even misleading! Some vendors claim that just one layer of CLOUD MALWARE BOTNET PROTECTION SYSTEM PROTECTION protection is enough. Fig. 1: ESET layers of protection Apart from the give citizens more power on how their overhead of the IT department to information is collected and processed minimize false positives there are many regardless of where the company is problematic cases to be addressed located. ESET, as the No. 1 Endpoint such as Application Whitelisting, which Security company from the European is ransomware that injects itself into Union is already prepared by following a process belonging to a whitelisted the guidelines and transparency application or even legitimate required by the authorities. applications that are able to encrypt files for example an archiver to be misused One of the hottest topics of last directly to encrypt files. This is not to say year was Ransomware, how is ESET that application whitelisting is pointless. responding to such attacks? It contributes to the overall detection Crypto-ransomware has been on the capabilities of ESET products. However, rise since 2013, when the notorious without other layers of protection it CryptoLocker appeared. Since then, would be significantly weaker. cyber criminals have collected millions Another “silver bullet” is Shadow of US dollars by extorting money from Copy Technology that allows manual victims in return for unlocking their data. or automatic snapshots of computer Among several possible approaches files or volumes. However, there are to combating ransomware, we believe some concerns before trying to use that ESET’s multi-layered approach such a solution for roll back. Firstly, (figure 1) is the right one. And it’s not performance degradation and storage just our belief; its efficacy has been requirements. Secondly, shadow proven in countless independent tests copies can be deleted or encrypted by by reputable testing organizations. For a smart ransomware, for example Petya, instance, in a test by a reputable and a disk encrypting ransomware shadow independent third-party organization, copy is helpless. POST EXECUTION
For very minimal sizes—although ‘legal’ says we must always include the ® no matter how small it is—
seeing the trap. Certain vendors do offer free software, however they have limited methods to monetize their products, and the least intrusive, at least from the perspective of the end-user, could be the collection and sale of data to third parties.
EXOS X PRODUCT FLYER
Seagate SkyHawk takes storage to new heights with British Airways i360
ritish Airways i360 is a 162-metre (531 ft.) tall observation tower on the seafront of Brighton on the UK’s south coast, which opened in August 2016 on the site of the historic West Pier. Conceived and designed by Marks Barfield Architects, the creators of the London Eye, British Airways i360 is the world’s first vertical cable car and the world’s tallest moving observation tower. Just as the original pier welcomed Victorian society to ‘walk on water’, British Airways i360 invites visitors to ‘walk on air’ in the fully enclosed futuristic glass observation pod which gently lifts up to 200 passengers to a height of 138 metres (450 ft.), providing a new perspective on the city with totally unobstructed views.
“WE HAD WORKED WITH SEAGATE BEFORE ON A PREVIOUS PROJECT AND KNEW THE RELIABILITY ITS STORAGE PROVIDES,” SAID CHRISTOPHER DEAN, OWNER OF BRIGHTON CCTV.” The technology deployed in the development and daily operation of the observation tower set a new standard for innovation – including a high-tech video surveillance solution supplied by local firm Brighton CCTV, with Seagate’s storage solutions chosen as a key
component in the technology. A specialist in CCTV design, installation and maintenance for the commercial and residential market, Brighton. CCTV was selected as the preferred supplier for its experience and local expertise. British Airways i360 selected Brighton CCTV as its camera security and webcam partner and their system partner, Hikvision, produces industry leading equipment that enables smooth, clear video streaming. Brighton CCTV selected Seagate as an additional partner for the project to deliver the surveillance storage solution, providing 10TB of storage in total. High resolution images were a must for this high-profile site and with the IP CCTV system running over a huge network, a solid and reliable storage solution was a necessity. Each camera also had to be carefully selected for the right area of the structure, taking into consideration installation, service and maintenance, as well as being capable of dealing with bright scenes due to the observation tower’s beachside location. “We had worked with Seagate before on a previous project and knew the reliability its storage provides,” said Christopher Dean, Owner of Brighton CCTV. “The SkyHawk surveillance drives operate with an extreme workload rating, low power consumption, provide long-term drive reliability and can operate in harsh environments,
Company: British Airways Location: Brighton Contact: www. britishairwaysi360.com Industry: Video surveillance storage
withstanding a variety of temperature ranges – ideal for British Airways i360 being on the seafront.” “We were thrilled our technology was selected to be a part of this ambitious and innovative landmark,” commented Andrew Palmer, Sales Manager, Enterprise and Surveillance Group, Seagate Technology UK. “We were able to make this surveillance solution possible working alongside our trusted partners Brighton CCTV and Hikvision.” A British Airways i360 spokesperson said, “British Airways i360 is a spectacular observation attraction and is the cornerstone to funding the regeneration of Brighton’s seafront. With some 700,000 visitors expected at British Airways i360 annually, it was vital that we worked with the best team in order to deliver on our vision and that included using trusted suppliers providing innovative technology.” To Learn More: For more information on Seagate SkyHawk HDDs, visit www.seagate.com/skyhawk
DATA RECOVERY SERVICES IS OPTIONAL
BUILD YOUR BUSINESS WITH ASBIS SOLUTIONS
TRUSTED SOLUTIONS PROVIDER Server & Storage Solutions | Networking & Wireless Solutions | Cyber Security Solutions | Unified Communication Solutions "ASBIS Solutions" is Value-Added Distribution division of ASBIS Middle East, a leading IT Distributor in MEA, It has emerged as a Specialist and Trusted Solutions Distributor. ASBIS Middle East FZE, Jebel Ali South Zone 1, Dubai, UAE , Phone: +971-4-8863850, Email: email@example.com
Published on Mar 12, 2018