Page 1


you to


Productivity Act now and watch D-Link’s secure wireless solutions empower your enterprise! D-Link PoE wireless APs give your enterprise and users more freedom to connect securely and productively indoors - especially in high-traffic areas. Plus, like all D-Link solutions, they deliver reliable performance in a self-healing environment that’s easy to deploy and manage.

Maximize your productivity and security with—

Don’t wait any longer!

• 2.4GHz 802.11n connectivity

Choose from these models

• Support for 802.3af Power over Ethernet (PoE) • The latest WPA security protocols + 64/128-bit WEP encryption • Plenum-rated chassis for broader placement options • A limited lifetime warranty

DWL-3600AP Wireless N PoE Access Point

DAP-2690 AirPremier® N Simultaneous Dual-Band PoE Access Point

As an authorized D-Link expert, let us help you select the right wireless solution for your specific requirements. We can also provide smart network configuration, complete product service and the support you need to keep your enterprise running smoothly and profitably.

Contact us today!


Aptec Distribution

Mr. Sachin Dawda phone: +971 4 3697111 Extn: 360 email:

Connect to more.

Cover feature - P18


The changing Business of Information Security

The recent cyber attack on computing infrastructure of two Oil & Gas companies in the region underlines that there is substance to the rhetoric that a well fortified security infrastructure is not an option, but mandatory for companies. And they need to look at what are the best options from next generation security products and solutions. Kaspersky’s ongoing development of a secure OS for critical industrial systems is no longer a rumor as Eugene Kaspersky confirmed it in his blog. It is fair to assume there might be a few concurrent initiatives from other vendors, not disclosed as yet, to build unconventional tools that will provide a better option of securing digital assets and critical infrastructure. In short, it is a rapid evolving landscape when it comes to development of information security tools and is likely to remain more so.


The shifts in the security paradigm

Security specialist distributors are now looking to diversify and strengthen their VAD profiles


News Bytes – P 4 Eyetech – P 32 Stats & Trends- P 34

News in detail - P 10

Cisco outlines Software Defined Networking Strategy at Gitex 2012 Feature - P 14

Video conferencing undergoes revolution

Balanced somewhere between AV and IT, video conferencing has managed to take advantage of advances in these two sectors to deliver a single innovative enterprise solution.

Techknow - P 12

Building momentum

Unnikrishnan Pisharody,Business Unit Manager - Servers & Desktop, Acer Middle East discusses trends in the server market and Acer’s outlook and focus.

In the past year or so, BYOD has become a cause for concern. According to a report from Juniper research, the number of employee owned smartphones and tablets that will be used in the enterprise will reach 350 million by 2017 compared to 150 million this year. Of course, we are still in the initial phase as more companies become aware of the need to be uncompromising when it comes to regulating the access of personal mobile devices inside corporate networks or applications by defined user profiles and making sure these devices have security software loaded as well.

Point 2point - P 24

The response by multiple vendors to the emerged threat from the popular BYOD wave has been varied. While some vendors are integrating these features into existing product lines, there are some who have been offering Mobile Device Management for some time now. There are also new vendors emerging as well. It will take a tough assessment to make a good choice and VADs can have a decisive role to play in consultancy before the sale.

Security is an attitude and a feature that must pervade the entire network through a series of consistent mechanisms write Sabhhauddin Khan, Regional Manager at Allied Telesis Middle East.

R. Narayan Managing Editor

Founder & CEO: Vivek Sharma Managing Editor: R. Narayan Assistant Editor: David Ndichu Art Director: Faiz Ahmed Sr. Sales Manager: R. Subramanyan Sales Coordinator: Smitha Jithesh

SonicWALL making all the right moves

Shahnawaz Sheikh, Regional Director MEA & Turkey discusses Dell SonicWALL’s regional ambitions

Case Study - P 22

Catalyst Spearheads STS Systems Makeover Insight - P 28

Factory Networks and Security

Better designed networks can leverage cloud benefits - P 30

Saad Khan, Regional Managing Director, Middle East, Ciena gives us top 10 reasons about why the cloud is only as good as the network

Published by: JNS Media International MFZE

P.O. Box: 121075, Montana Building 404, Zabeel Road, Near GPO, Karama, Dubai-UAE Tel: 04-3705022 Fax: 04-3706639

Disclaimer: While the publishers have made every attempt possible to get accurate information on published content in this handbook they cannot be held liable for any errors herein.

News Bytes

New Veeam Backup & Replication 6.5 Veeam Software announced the availability of Veeam Backup & Replication 6.5 in Q4 2012 at the Aptec booth in GITEX. The new release includes new restore capabilities for Microsoft Exchange, and HP StoreVirtual VSA and LeftHand snapshots. Another significant addition is support for VMware vSphere 5.1 and Windows Server 2012 Hyper-V, making Veeam the first vendor to support both new hypervisor platforms. The new and powerful features further extend Veeam’s leadership position with its agentless solution specifically built for virtualization which is powerful, easy-to-use and affordable. Key new features in Veeam Backup & Replication 6.5 include Veeam Explorer for Exchange wherein VM admins will be able to look inside Exchange backups to find and retrieve individual Exchange items, without an agent. Veeam Explorer for SAN Snapshots is a new feature that enables admins to quickly restore any or all of a VM directly from SAN snapshots.

Comguard adds German IT security specialist gateProtect to its portfolio Comguard has been appointed as the value-added distributor by German IT security specialist gateProtect for the Middle East region. The U.S. market research firm Gartner placed gateProtect solutions in the Magic Quadrant for UTM Firewall appliances for the SMB market, whereas, Frost & Sullivan awarded “Excellence Award” to gateProtect. gateProtect showcased its version 9.2 of its next-generation –firewall at the recently concluded GITEX edition. The award-winning next-generation firewall solution from gateProtect recently won the EAL4 certification. Ajay Singh Chauhan, CEO, Comguard and Spectrum Group said “We are delighted to partner with gateProtect for distributing gateProtect’s next generation products in Middle East region. It will provide us an opportunity to offer quality German IT network security products to our partners across the region.”

Backup Exec 3600 Appliances promise easy installation Following the successful launch of NetBackup 5220 appliance in the Middle East, Symantec is now bringing Backup Exec 3600 appliances to the region to provide an easy to install backup appliance. Backup Exec 3600 includes the latest Backup Exec 2012 software from Symantec and delivers on Symantec’s Better Backup for All initiative to advance what Gartner has called “The Broken State of Backup1.” Symantec’s backup appliances deliver an end-to-end integrated backup appliance for servers, storage, and software. Gone are the days of extreme systems engineering where it was the customer’s responsibility to make all of their backup solutions work together. “Earlier this year, we announced our new approach to delivering better backup to our customers, introducing ground-breaking new features to replace outdated and complicated approaches. Beyond features, we are changing the regional market with technologies like our purposebuilt appliances that combine backup software, servers, storage and deduplication in a single solution – a key part of our strategy to drive complexity and costs out of the backup market,” said Amer Chebaro Appliances Sales Manager for Emerging Region at Symantec.


The Integrator | November 2012

News Bytes

Aptec showcases as an Ingram Micro Company at Gitex Aptec, an Ingram Micro Company, announced at Gitex Technology exhibition about completion of the acquisition process which officially makes Aptec part of an Ingram Micro Group. The announcement took place at Aptec Ingram Micro stand at Gitex, where Aptec as a group participated for the 32nd time. Top management of Aptec, an Ingram Micro Company, headed by Dr. Ali Baghdadi, Vice President and CEO of Aptec, an Ingram Micro Company, welcomed invitees and was happy to announce completion of the acquisition process. The ceremony was attended by seniors in regional distribution from more than 20 vendor partners, among them HP, Microsoft, Dell, NetApp, VMWare, Cisco, IBM and other, regional IT channel media, Aptec employees, representatives of Aptec reseller partners.

FVC selects Microsoft as exclusive Cloud and UC partner in the Gulf FVC has selected Microsoft as its exclusive Cloud and Unified Communications partner in the region. After a steady growth in businesses migrating to the Cloud, the two announced their partnership to continue providing businesses in the region with enhanced access to Office 365 to enable greater productivity, collaboration and reduced costs. Since 2011, Microsoft has been working across the region to deliver Office 365 to the SME sector. Samer Abu Ltaif, Regional General Manager Microsoft Gulf. said, “We are very happy to be extending our partnership with FVC across the region to support and enable businesses to improve their productivity. As more businesses are using the Cloud to enhance their productivity, we are certain that greater need for tools like Microsoft Office, Microsoft Exchange and Microsoft Lync Online will enable seamless and continued collaboration among businesses while helping them reduce costs.”

StorIT and Moonwalk forge strategic distributor agreement at GITEX 2012 StorIT, a leading data storage specialist value added distributor entered a strategic distributor partnership agreement with Moonwalk Inc., a company that specializes in large-scale data management solutions. StorIT will exclusively distribute the diverse range of large-scale data solutions of Moonwalk Inc., which are now widely being used across various industry segments like banking, healthcare, government, research & development, education and resources. Mellanox and QLogic. “Entering into this strategic new alliance with Moonwalk Inc. gives us the advantage of offering a unique product that addresses the need to manage complex, data management through the tiers of storage and is comparatively economical as it is a software only solution,” said Bobby Joseph, CEO, StorIT.


The Integrator | November 2012

News Bytes

Iomega appoints NIT as Security VAD The storage specialist Iomega has signed NIT Network Information Technology as Security Value Added Distributor for UAE, Saudi, Bahrain, Oman, Kuwait, Lebanon and Jordan with the aim of increasing its reach into SMEs, SMB Security and Surveillance resellers and valueadded resellers. " With NIT, we are fulfilling another part of our B2B reach and expanding our support. NIT has been chosen because of its strength and reach to different channel segments within the Security and Surveillance segments," said Cizar Abughazaleh, regional director for the Middle East, Africa and Turkey at Iomega. Network Information Technology L.L.C. was established back in 1995 in Dubai, U.A.E. and is a Value Added Distributor of IP Video Surveillance and Physical Security solutions. NIT has more than 600 channels partners across the Greater Middle East.


The Integrator | November 2012

DVCOM Launches Matrix NAVAN CNX200 DVCOM Technology, a part of Al Mashka Group, a UAE based $150 million conglomerate and a leading solutions provider of Open Source VoIP Telephony, announced the launch of Matrix’s NAVAN CNX200, an Office-in-a-Box Solution for Small Businesses. “Matrix Comsec is a leading manufacturer of VoIP products such as IP-PBX, IP-Servers, VoIP Gateways and IP Phones. With the launch of NAVAN CNX200, Matrix has, yet again, proved that it has and it will continue to dominate the VoIP arena,” said Renjan George, Managing Partner at DVCOM Technology. “NAVAN combines the functionalities of IP-PBX, Data router, Wi-Fi access point, VoIP-GSM gateway, VPN and Firewall Security in a compact and converged platform enabling small businesses to communicate and manage infrastructure. This helps in increased productivity, lower costs and enhanced collaboration with customers and suppliers,” George added. NAVAN CNX200 combines VoIP Telephony, Data networking, Internet accessibility and Workspace mobility with 3G and GSM connectivity.

Network Sentry 6.0 to strengthen BYOD policy Bradford Networks launched the latest version of its Network Sentry 6.0 solution at GITEX 2012. A Network Access Control (NAC) solution, Network Sentry 6.0, provides organisations with a foundation for a strong and secure bring-your-own-device (BYOD) strategy with new key features that focus on automation, enhanced platform coverage, and integration with leading security solutions. “Implementing BYOD is now gaining popularity in the Middle East as it enables companies achieve greater productivity. The first step to a secure BYOD policy needs to be visibility and control over who and what is accessing corporate networks at all times,” said Ahmad Elkhatib, Managing Partner, Shifra, Bradford Networks’ channel partner for MENA. “With its automated workflows, broad network infrastructure and mobile device coverage, and out-of-band architecture, Network Sentry 6.0 can support existing corporate network equipment and enables companies to quickly and easily create a granular set of BYOD policies that are tailored to specific roles within any organisation.” .





































All right reserved StarLink Middle East. Copyright StarLink JLT.

Office 1403, Tiffany Towers, Jumeirah Lake Towers, Sheikh Zayed Road. P.O. Box 99580. Dubai - UAE

Phone: +971 4 4473552 | Fax: +971 4 4473551 | Email: | Web:

News In-Detail

adoption of SDN technologies (including OpenFlow) is still small because the technology is still in its infancy. Furthermore, SDN and OpenFlow technologies do not cover all switching functionality – only a small portion of the switch or router’s overall functionality. Cisco has been actively participating in OpenFlow and SDN’s development, collaborating in the leading industry groups and it will continue to support industry efforts to develop SDN technologies and related standards. Rabih Dabboussi, general manager, Cisco, UAE said, “Even in the Middle East we are finding that definitions of SDN are still very fragmented and vendor interpretations are also equally different. The general

networks more application-aware, applications more network-aware, and networks more conducive to developers and application hosting. This approach will not be an “either/ or” approach but will leverage the power of AND. This will provide the flexibility and the most tools in the toolkit. Through this approach, Cisco will aim to deliver consistency of operational experience between: physical and virtual, network and compute, intelligent ASICs and software. Cisco’s continued participation at the IETF, ITU-T, ONF and other standards bodies and forums will drive standards activity. Cisco on OpenFlow: Cisco embraced the market transition around server virtualization, delivering

Cisco outlines SDN Strategy at GITEX 2012 Rabih Dabboussi General Manager Cisco - UAE

Cisco unveiled ‘Cisco ONE’ its position on Software Defined Networking (SDN) at Gitex 2012. Cisco’s positioning and strategy involves making the network more programmable and virtualized, which requires more than SDN technology. The company’s strategy has three parts: SDN, network virtualization, and programmability via application programming interfaces (API’s) which are the specifications intended to be used as an interface by software components to communicate with each other. Cisco believe that despite the current noise in the market, the


The Integrator | November 2012

consensus is that SDN is bigger than OpenFlow, but it is still largely perceived as a controller and agent’s architecture with decoupling of control and data plane. A lot more can be achieved quickly with programmatic access as many customers just want quicker, multi-layer programmable access. Diverse customers have different motivations when it comes to SDN based on urgency of business drivers, in-house IT expertise, and requirement to customize applications. No one size fits all.”

innovations to customers like Cisco UCS and a broad portfolio of virtual networking technologies. They see network virtualization delivering similar benefits to IT organizations and offering similar opportunities for Cisco, because SDN and programmable networking will make it easier for customers to access the sophisticated capabilities of their Cisco infrastructure and help them to tackle emerging challenges like building large-scale public/private clouds.

Cisco’s Approach to SDN: Cisco ONE will deliver an open, programmable environment that will continue to deliver on the concept of the network-as-aplatform - in other words, making

Cisco’s SDN Offering: Cisco will continue talking to customers to learn their needs and plans to support industry efforts to develop SDN technologies, programmable networks, and related standards.

TechKnow | Acer

and AMD. From 1P to 4 P solutions, we have all the solutions for small to large scale organisation. On the portfolio, we have the Acer 100 series, both Rack and Tower; Acer 300 and 500 series, Rack and Tower with robust options, best in-class expandability as well as Acer Density Systems - Gemini and Blades offering ultimate performance, minimal floor space and best power per watt. Our tower servers are the AT series and Rack servers are the AR series. We also have in certain market tie ups with Hitachi storage solutions that offer high end storage solutions. In a nutshell, we have total x86 based solutions for almost all verticals. In short, our servers offer total value, as they are agile,

Unikrishnan Pisharody Business Unit Manager-Server & Desktop Acer Middle East

Has the demand for x86 servers in the region been growing? The demand for servers is on the path of growth. Firstly, because the region is an emerging market and there will be a growing demand for small and medium businesses. While large corporations and government institutions will eventually move on to virtualisation and new technologies, we see opportunity in the SMB segment. Please discuss Acer's server portfolio? We introduce the latest products well ahead of the competition in order to offer customers increased TCO and value for the investment. Acer Server portfolio includes Intel


The Integrator | November 2012

today. The major factors would be Brand loyalty, efficient partner, price and the product spread available with the vendor. Another criteria could be the application compatibility especially for large scale enterprises. Are x86 servers now used more for mission critical workloads? x86 servers have matured in hardware and they are now being used for mission critical applications. For London Olympics 2012, we had supplied over 950 x86 based servers for mission critical application. Our servers have been running mission critical and cloudbased apps on x86 servers. Certified solutions including Intel Cluster Ready and Intel Cloud Builder. Also, we have our servers included in the

Building momentum Servers on the X86 platform offered by major vendors like Acer, continue to make inroads even into areas of mission critical workloads. Unnikrishnan Pisharody, Business Unit Manager - Servers & Desktop, Acer Middle East discusses trends in the server market and Acer’s outlook and focus. cost-effective and relable end-toend solutions.

top 500 Green and top 500 super computers.

What factors are influencing the server purchasing decisions? Unlike other IT products, purchasing a server takes a longer time as there are various criteria to be considered. Brand loyalty is mostly seen in Server purchases. It would be difficult for an IT Manager to take a decision to change the Server brand (even if it’s at lower cost offered from competition ) unless there are serious technical or support issues. However, the IT supplier or partner can influence these decisions to some extent. Cost is also a factor in changing the decision for large-scale purchases

How is the trend for Rackmount servers vis-Ă -vis Towers? Rack servers are preferred in medium and large-scale deployment as we can accommodate more servers in the space. Secondly, the Rack servers today have almost the same storage capacity as that of the traditional tower model. However, there still is a market for Tower servers especially in small offices and satellite offices where the requirement does not exceed one or two servers. Tower servers are easy to service (hardware) as compared to a rack server.

For more information please contact,Meenu Raje at or Call us at +971 552281560, +97142379005

Feature | Video Conferencing

Video conferencing undergoes revolution Balanced somewhere between AV and IT, video conferencing has managed to take advantage of advances in these two sectors to deliver a single innovative enterprise solution. The video conferencing segment has come a long way from the days of grainy videos and barely decipherable audio. With HD, cloud services, and fast and secure transmission methods, the traveling businessperson and remote offices are capable of communicating with the main office and partners with almost seamless abandon. And with applications available for tablets and smartphones, video conferencing has truly come of age. Driving this impetus are companies like LifeSize, Avaya, Polycom and microphone manufacturer Revolabs. Innovation is at the very heart of video conference market trends. Telepresence from Avaya offers pre-packaged or fully turnkey services including monitoring, conference setup and real time support. Telepresence includes enterprise video conferencing, globally to provide a more


The Integrator | November 2012

efficient, effective and productive environment for collaboration among geographically dispersed employees, customers and suppliers, according to Claire Macland, Head of Avaya EMEA Go-To-Market and Marketing, Avaya EMEA. “The promise of on-demand video is now real,”Claire adds. LifeSize UVC Video Centre provides access to HD-quality video streaming, recording and playback. Live and on-demand videos are accessible through a range of devices including desktops, laptops, tablets or smartphones. LifeSize technology also supports various video resolutions, according to Andreas Wienold, Vice President EMEA for Lifesize. “Our aim is to make sure that people forget about technology. Previously people were nervous in video conference meetings due to communication hitches. Today people can forget about the devices and just

concentrate on the meeting,” said Wienold. Avaya also offers contact centre solutions. The Aura Contact Centre delivers solutions across web, social, mobile, voice, email, chat, and outbound. According to Claire, the Avaya Aura Contact Centre allows organizations to leverage realtime and historical information to deliver seamless, context-sensitive customer care. Being a specialized field, video conference solution vendors have to deal through strong VADs. Revolabs for instance has regional distributor Taxan Gulf as partner servicing more than have 50 active resale partners in the region, according to Roshan Gupta country manager Middle East and India for Revolabs. “We work directly with our partners as far as designing of solutions

Segments adopting video conferencing solutions are wide and varied. Revolabs microphones are specially geared for the enterprise, according to Gupta. “A crucial area for us is enterprise collaborations where video conferencing has become part and parcel of the large business operations,” said Gupta. Another growing segment for Revolabs is education, as lecturers need to address large classrooms. Distance learning is also becoming popular and with it unique communication challenges to reach students all over the world. Revolabsmics can be easily integrated with existing video infrastructure to transmit audio where needed, according to Gupta. Avaya solutions can be applied at, among other areas, to the banking sector. “For instance, customer support can be provided at the ATM to customers where they can communicate face to face with customer service reps in real time,” said Claire. Video conferencing is well suited for the region, with its expansive oil and gas installations, according to DharmendraParmar, general marketing manager at FVC, a leading VAD for Polycom. Parmar cites the example of an accident at a remote oil rig. Using the telemedicine capabilities of video conferencing, a medical professional off site can be able

to diagnose the injuries and recommend first aid before transport to a hospital. Or he could decide the injuries are not serious to warrant admission and can be taken care through first aid at the site. This kind of intervention saves money and time. “Technical personnel can also be able to carry out remote maintenance and troubleshooting of oil installations from anywhere in the world,” explained Parmar. Again this saves a lot of money and unnecessary travel, he added. With a lot business being carried outwhile on travel, video conferencing companies are adapting to this environment through solutions specifically adapted for the on-the-go executive. LifeSize offers the LifeSize Video Centres which are able tostream videos live on tablets or smartphones. Polycom also allows people using tablets and smartphones to join standard video conferencing meetings. Avaya’s one-X Mobile lets users access enterprise communications

Dharmendra Parmar, General Marketing Manager,FVC

is concerned, discussing the applications, working out the right kind of solutions are needed in the market,” said Gupta. “We help them in winning those projects, designing the projects and we support them in showing live demonstrations as well as support if and we help them in product evaluation and also POC (proof of concept) when this is required”

Andreas Wienold Vice President EMEA Lifesize

from a wide selection of mobile devices, including smartphones and tablets. Enterprises are today also actively adopting BYOD-friendly policies. Avaya supports BYOD with a combination of security, authentication, networking, and policies. Avaya solutions includes device authentication, access control for wired and wireless devices, secure remote access. As the BYOD movement continues to explode, LifeSizeis offering the UVC Multipoint designed to provide a multiparty video conferencing solution that is suited for mobile, low-bandwidth environments that includes video-enabled laptops, tablets and smartphones, according to Wienold. The rest of the IT industry is headed towards managed services due to its cost-cutting advantages. Avaya Telepresence solution is a managed service, consisting of a range of offerings which include managed UC, Managed Contact Centre andManaged Infrastructure.LifeSize also offers virtualized software that is adaptable and can be hosted on November 2012 | The Integrator


Feature | Video Conferencing

video conferencing systems. The combined solution is meant to combine thedelivery of HD LifeSize video systems and the centralized management and control capabilities of Avaya Aura. Polycom offers customers the capability of adding Polycom voice and video capabilities to Avaya communications platform.

Roshan Gupta Country Manager, ME Revolabs

the cloud, hosted on site or offered as a managed service. Avaya Collaborative Cloud is delivered over single, open and scalable communications architecture from the company. LifeSizeon the other hand is a member of the VMware Technology Alliance Partner (TAP) program. Organizations gain the efficiencies of virtualization backed by the technical expertise of VMware. Polycom offers unified communication cloud infrastructure to support managed services on a pay as you go model. This allows clients to have a feel of the system before they decide to buy the solution, according to Parmar. “This allows a great deal of flexibility,” he added. Rather than competing, the various video conference solutions providers are collaborating at different levels. Avaya is enabling its Aura platformto runLifeSize 16

The Integrator | November 2012

Manufacturers have tried to make video conferencing solutions easy to use.The LifeSize Video Centre offers one-button HD streaming, recording and auto-publishing solution. This single solution ensures that live and on-demand videos are easily accessible from any location and by hundreds, even thousands, of viewers, according to Wienold. Polycom offers end-to-end investment protection and provides software interoperability with older hardware. When customers are ready, they can upgrade their hardware systems when they need to. “At Polycom, we follow industry standards meaning that Polycom devices are compatible with other devices from partners and solutions within the same standard,” said Parmar. The Polycom CX series is also compatible with Microsoft Lync, helping users experience the simple and familiar Lync interface in environments throughout the enterprise. Revolabs microphones work within the DECT protocol,a spectrum is outside the congested UHF frequency and therefore minimising interference, according to Gupta. “We have smart microphones that can for instance identify noise in the background and can automatically reduce the noise from the source itself,” said Gupta Avaya Aura Conferencing, experienced through either

Clair Macland Head, EMEA, GTM & Marketing Avaya

the Avaya Flare Experience or the browser-based Avaya Aura Collaboration Agent interface, also gives users one-touch control over their devices, according to Claire. “Features include drag and drop contacts to start a conference with no need for dialing,” Claire said.“One can also switch between IM, voice, and emailin one window, in one app. Users can scroll and click on contacts and send invites that automatically contain conference info and links,” she added. Video conferencing offers a unique, if somehow contradictory, solution for businesses. It is a way for businesses to control costs by making constant travel unnecessary and yet encourages travel by making business collaboration possible through mobile communications. Either way, enterprises big and small will find their particular needs taken care of by this rapidly expanding technology field.

Cover Feature | Information Security

The changing Business of

Information Security Information security has been one of the areas of substantial growth in the industry. Securing critical data and infrastructure being a key concern for companies, the Business of Information security looks to be a boom segment for the foreseeable future. Security focused distributors have seen growth rates in the past few years, contrary to the decline in some other segments of the industry. This fact justified the continued specialist focus on security business. However, distributors are discovering that they need to broaden their range of solutions that are related to security . They are steadily growing and in some case diversifying their portfolios


The Integrator | November 2012

that will enable them to take advantage of emerging trends.

performance, adopt cloud computing services better etc. �

John Andrews, Director of Marketing at Computerlinks, MEA and APAC says, “We see our portfolio growing by the day and while historically, Computerlinks was known as a niche security solutions distributor, today it seems much more than that. We have partnerships with Extreme networks, Aerohive wireless, Exinda from the networking domain, a partnership with EMC etc. We are now more of infrastructure providers for networks that includes security. This demand is being driven by smart end users who are looking at what they need from the perspective of constructing their networking infrastructure and the need to improve their datacenter

The security domain is also beginning to look a bit crowded with an increase in the number of

John Andrews Marketing Director, Computerlinks, MEA & APAC

Security specialist distributors are now looking to diversify and strengthen their VAD profiles

distribution companies dealing with a similar set of brands. However, there is still room for growth as more new niche vendors are entering the market, opening up new opportunities.

14 brands addressing different challenges. We are covering the entire Middle East with a locally based resource in each of these markets to help the channel grow their market.”

Nidal Othman, MD at Starlink says, “It has been a challenging job being in the IT security domain. Every day I wake up, I start to believe that we have all solutions required to address the security challenges but there are newer zero attacks every other day which keeps us on our toes. Hackers are evolving their capabilities and Technologies to bypass traditional security infrastructure every day. Which is why, we keep pace with these evolving threats by adding products that can help address these threats. That has helped us gain the tag of being a trusted security advisor among high profile clients especially from Banking, Telecom, Oil and Gas sector as well as including those from the government agencies, who we help secure their critical data assets from possible external and internal threats.”

Security distributors are flexing their muscles and showing their intent to expand and diversify as larger sized value- add distributors. And, why not? After all, Broadline distributors are gate-crashing into what were the provinces of specialist distributors with their recently established value teams.

Starlink has local presence in 6 countries including some of the leading GCC countries. It has strong business in KSA and has Business partners in the Levant and Turkey as well.

Secureway, a leading security VAD had a larger stand at GITEX showcasing all its brands and flexing its muscle as a distributor with a fast growing portfolio of products. Its showcase at GITEX included Fortinet, F5, Infoblox, Vasco, Sourcefire, etc. The company highlighted Fortinet and F5, which were the first brands the company partnered with when it came into the region and continue to be the strongest performing brands for the company. Zafar Shabdiz, MD, Secureway says, “As the market has evolved, we are seeing new products and technologies developing. We consider ourselves as a leading VAD since we entered the market in 2005. We are investing in more areas that have not been categorically seen as IT security like application delivery, cloud computing, etc.”

Nidal Othman Managing Director Starlink

Shifra has seen an interesting evolution of their Business model. The company started out as an IT security consultancy and branched out into security valueadd distribution because that gave them the scale. Ahmad Elkhatib, Managing Partner, Shifra says, “We have been established since 2007 as a consulting company but we moved into value add distribution 2 years ago. The major reason was scalability. To increase your reach as a consulting company, you need to office across the region. Being a distributor, you could do that because you can have channel partners across the region that extends your reach with customers.”

He adds, “Starlink focuses on security products that can complement security infrastructure. Since we commenced operations in 2005, we have focused on niche products Hackers are evolving their capabilities and as a value add Technologies to bypass traditional security distributor. We have focused on infrastructure every day. Which is why, we keep next generation pace with these evolving threats by adding security products that can help address these threats. products and there are

Now they are looking at newer domains like BYOD that will again broaden their portfolio

November 2012 | The Integrator


Cover Feature | Information Security

departments in the Middle East lack the tools that they need to monitor the mobile devices that access their networks. Unlike most MDM vendors that just manage mobile devices, Zenprise focuses on next generation MDM, which includes keeping mobile content secure. After comprehensive evaluations, we have chosen to partner with Zenprise because we would like to provide customers in the region with an enterprise mobility solution, while providing them visibility through Mobile Security Intelligence, and secure access to business data with Mobile DLP. " Zafar Shabdiz Managing Director Secureway

outside what can be strictly classified as Information Security. That appears to be the general trend with security VADs who are now extending their presence into additional domains that can help guarantee them larger Business opportunities.

Focus on BYOD

BYOD is currently one of the strongest opportunities. Different security vendors are addressing this either integrating features into their existing products lines that will take care of BYOD or evolving new products specifically. There are also companies that are specifically focused on BYOD. Distributors are therefore either highlighting what existing solutions they have that can handle the BYOD concern or they are tying up with vendors offering solutions in that domain. Starlink has announced that they are partnering with Zenprise that offers solutions in Mobile Device Management. Othman adds, “Many IT 20

The Integrator | November 2012

Zenprise is in the Leaders Quadrant of Gartner, Inc.’s 2012 Mobile Device Magic Quadrant report and under this new partnership agreement, StarLink will distribute Zenprise’s solutions to resellers across the GCC as part of StarLink’s growing security and compliance practice.” The onus is on distributors to keep pace with emerging trends and make the right call, which is easier said than done. Some distributors choose to partner with established leaders in their spaces whereas other distributors may take a calculated risk to grow with an emerging vendor. Andrews adds, “It is a tough call because there are so many trends emerging. However, we are dynamic and review on a weekly and quarterly basis as to where we are headed. Based on market analysis, we come to our decisions. For instance, BYOD has been a strong trend coming through this year. People are learning to cope with this phenomenon in order to take care of their network infrastructure. We need to look at whether we have the right portfolio of products to take care of these emerging threats and then decide.”

Additionally, it also remains to be judged if they already have a mix of products that address these concerns to a large measure .He adds further, “We do have a pretty comprehensive range of products that take can care of these needs. For instance there is F5 which with its offerings provides the capability to manage network traffic, prioritizing who gets how much bandwidth, application security, which devices get access to which applications and so on. Further into the network infrastructure, there is switching and wireless security. Juniper’s new products address security for wireless security pretty strongly.” Meeting market expectations It is a tight rope walk for a VAD, when they make decisions based on emerging trends. The threat to critical verticals is likely to increase. An evidence of that was seen last month when about 30,000 workstations at Saudi Aramco were affected by a virus known as Shamoon in August and a similar attack affected systems at Qatari natural gas company RasGas. Ahmad Elkhatib of Shifra says, “Public and private sector companies are enhancing their security infrastructure as IT gains more critical significance in their business operations and desired growth. As IT applications within organisations grow in complexity and coverage, so does its security requirements. We expect deployment of integrated security solutions to have a massive growth in the next few years.” Large installations will have a lot at stake if they are not alert to the need for securing their infrastructure from such threats that can become more sophisticated by the day. It is likely that this will

influence a larger spending on next generation security infrastructure apparatus. Shabdiz of Secureway comments, “With recent attacks on critical IT infrastructure in the region, there has been a need for customers to seek solutions beyond the traditional elements in the IT security space. We represent solutions from our vendor Sourcefire offering anti-malware and IPS for critical infrastructure. We expect good opportunities within this space in the next year.” There is a level of expectation build up in the vendor-distributor partnership but that has also to match with what the market needs. It remains a tough balancing act. He adds, “We have to match what we offer from our vendors to what the market requires. While within IT network security, the protocols maybe the same, the market needs and environments are different. For vendors associated with us, we are co-managing to help create the fastest market opportunity for their products.” There are no shortcuts to winning over the channel unless you show the commitment to investments. Computerlinks has demonstrated so with the two training centers it has and with the hope to add more centers to ensure its channel is well trained.

“While some of the vendors have good presence in the channel, trained, skilled and active, some of the newer vendors are leaning on us to develop their channel and adding value to the 2000 odd reseller network that we have in the region. Some of the other more established vendors who may have a good presence in the enterprise segment, but not so in the SMB space may require us to strengthen their presence in that segment.” It is important to keep the channel interested in what you to offer. Introduction of new solutions is mandatory to bring in growth for the distributor and the partners. Starlink’s Othman says ,” We are always welcomed by the channel since we almost certainly bring new products to the market. We work with them hand in hand to make sure they get the business. We focus on security VARs and large Sis who also include security solutions as part of their overall solutions. We have business relationships with over 50 Business partners. Some of them adopt the entire portfolio while others may pick and choose what they require. We are doubling revenues year on year as demand for IT security solutions is growing by the year.” Aligning product lines towards the channel’s growing expectations should also be factor that the distributors need to weigh when they evaluate their possible directions. That can be a decisive

Ahmad Elkhatib Managing Partner Shifra

factor that will force distributors in days to come. Andrews adds, “We have diversified our offerings in line with expectations of the channel and the end customers and an instance would be our partnership with EMC and we cover pretty much their entire portfolio. We are aligned to vendor expectations as well as where the channel wants to take their Business. Whether the channel wants to be seen as a security VAR or as an infrastructure provider, we can help them do so.”

The trajectory that security VADs will unravel in days to come when they position more confidently The regional operations take an as VADs with independent plenty of decision on options in which vendor their arsenal to to tie-up with, "With recent attacks on critical IT infrastructure meet evolving and preferably threats that in the region, there has been a need for ensure that critical network there is no customers to seek solutions beyond the infrastructures overlap. traditional elements in the IT security space." face. That is a story to take Andrews says, stock of later. November 2012 | The Integrator


Case Study | Catalyst

Catalyst Spearheads STS Systems Makeover Special Technical Services (STS): An energetic forward thinking business with its head office in Sultanate of Oman operates a workforce exceeding 6000 personnel working in a premier Engineering, Procurement and Construction (EPC) company. STS specializes in fabrication, construction and maintenance services with their company’s solutions encompassing the entire range of services for Oil & Gas, Power and Petrochemical sectors. STS has varied capabilities and vast experience to execute Long Term Engineering, Procurement & Construction services or EPC Contracts. The company’s experience spans over three decades and they aim to serve their clients in the MENA region with their offices in Abu Dhabi and Bahrain. STS is also operating over nine fabrication shops in Oman. The company has benefitted significantly by having an integrated business management system and gaining wider recognition as one of the fastest growing businesses of Oman. Optimum functioning by STS required real-time visibility into projects, resources and financials, but this was limited by its disparate systems which made it realize their requirement for a flexible and scalable business management solution to make it progress more efficiently and addressing the company’s future plans of continued growth and success. 22

The Integrator | November 2012

efficiencies for STS. Till now, this has resulted with a better control on project planning which in turn reduced stock outs and improved inventory turns. The Catalyst Solution has also improved the Labor cost efficiencies, through automation by time sheet interface with HRMS system & this applies for the Machine deployment cost too. What STS needed? STS needed an efficient tool to monitor the costs for all the Projects-works, which includes Labor, Material and Machine. They also wanted to provide a single platform for Projects accounting, enable system-driven accounting and booking from sub-ledgers to general ledger globally and migrate to a cost-effective Linux Operating System platform. What solution did STS have already? STS had a bespoke product, addressing accounting and payroll only. Majority of the work was done outside the system (Excel). What solution did Catalyst get? STS partnered with Catalyst for implementing Oracle JDE 9.1 which includes the followings modules: • Project Management • Finance • Procurement • Inventory • BI (Reporting) The Catalyst Solution Catalyst approach to implement the Oracle JDE 9.1 has reduced process complexities and achieved process

Catalyst developed interfaces in Oracle JDE 9.1 system to seamlessly integrate with their legacy systems. Catalyst Solution Benefits STS: The Catalyst solution is helping STS in adhering to uniform practices for project management and has also enabled system-driven global accounting by setting up a multiorganization environment. Catalyst is doing this by streamlining the Project Management, Inventory, Procurement and Financial Accounting process for STS. Creating value for customers by continuously improving business processes to deliver on time - every time is critical to driving growth. This is a big challenge for the client considering the nature of the industry, which works on extremely short lifecycles and therefore an impeccable 'on-time delivery' record is a crucial success factor. There was a need to absorb the market fluctuations but the legacy system lacked the flexibility. This highlighted their need to implement a robust business process to keep ahead of competition, reduce overhead costs and improve cash flow.

HD Video Communications

Simplifying the World of Business At Taxan Gulf we believe all business deserve higher productivity, better engagement, reduced travel, more time to make decisions, and carbon emissions.. to name a few. Using the most advanced technology available today, LifeSize VC Systems are the ultimate in Quality, Flexibility, and price performance.

Do More. Travel Less. Be Present.

Key Features - Lifesize VC Systems Resolution: 1080p/720p. Single point & Multipoint (4, 6, 8 Party) connectivity options. Presentation sharing option. Dual display support.

Call our executives now and book a LifeSize Product Demo

Better Bandwidth efficiency. Camera: 4X, 10X and focus.

More information, visit :

Wireless Unified Communications

Audio Conferencing Systems

Revolabs, Inc. delivers innovative wireless audio products for both enterprise collaboration applications and professional audio applications. Revolabs products are used throughout the world and across a wide range of industries including houses of worship, corporations, financial services, education, medical, legal and more.

ClearOne has earned a reputation as the industry leader in high-end audio conferencing. ClearOne's installed audio conferencing products are the most sophisticated, feature-rich systems on the market. Unmatched audio performance has made ClearOne the undisputed best choice for most of the corporate houses.

Complete Range of Audio Video Solutions Distributors for Middle East, North Africa & Pakistan

Address : Jafza View, Tower 19, Office No. LB192404, Jebel Ali Free Zone, UAE | Telephone : + 971 4885 5002 / 006 Fax : + 971 4885 5009 | Email : |

Point2point | SonicWALL

Which products are you showcasing at GITEX? We have on displayed our next generation firewalls for small medium to large enterprises including include the SuperMassive firewalls. The SuperMassiveE10000 Series is Dell SonicWALL’s NextGeneration Firewall platform designed for large networks to deliver scalability, reliability and security at multi-gigabit speeds. Built to meet the needs of enterprise, government, university, and service provider deployments,

there’s need to ensure that they do not have a negative impact on business applications. This could in terms of bandwidth, availability or priority. With SonicWALL application control, the IT manager will be able to granularly manage these business and leisure applications based on content, the specific user who should have access, what applications they should have access to, what time of the day certain applications should be access and so on.

SonicWALLmaking all the right moves Shahnawaz Sheikh Regional Director, MEA & Turkey SonicWALL

SonicWALL made its debut as a Dell subsidiary at GITEX this year after its acquisition mid-year. We caught up with Shahnawaz Sheikh, Regional Director MEA & Turkey who discussed SonicWALL’s regional ambitions.


The Integrator | November 2012

the SuperMassive E10000 Series is ideal for securing enterprise networks, data centres and server farms. Discuss the benefits of NextGeneration Firewalls over existing security solutions With this, we are giving more control to the IT manager enabling them strike the right balance between user need and ensuring that corporate governance protocols are maintained in order to have optimum utilization of bandwidth. Users within an organization have access to business and leisure applications. It is thus important for the IT team to ensure that the business applications are available bandwidth-wise and also in terms of priorities. Although the leisure applications can be accessed,

UTM offers obvious benefits to SMBs. Discuss SonicWALL’s UTM solutions Network attackers have become more sophisticated, and their attacks more targeted. Many of today's attacks are blended attacks, which use multiple techniques to try to infiltrate a network. While organizations need an array of techniques to combat blended attacks, managing multiple, separate security tools can be expensive. SonicWALL's approach to UTM creates a security environment that delivers firewalling, content protection, anti-virus, intrusion prevention, Application Intelligence, anti-spam, content filtering and SSL VPN on a single hardware platform. Protection starts at the gateway and blocks both internal and external threats at multiple access points and at all network layers. The

Point2point | SonicWALL

branch officesbuilt-in gateway or multiple anti-virus, "SonicWALL's approach to UTM creates a security appliances anti-spyware environment that delivers firewalling, content in a single and intrusion protection, anti-virus, intrusion prevention, prevention network. The IT Application Intelligence, anti-spam, content offers real-time manager can security against filtering and SSL VPN on a single hardware manage a single a wide variety or multiple platform." of exploits, networks software through this new reality vulnerabilities and malicious code. SonicWALL appliances using a Mobile computing today has single interface and console. So become an integral part of SonicWALL promises real time the IT manager has one window the corporate network and control of bandwidth usage. to manage multiple appliances establishing secure remote access Please discuss making manageabilitysimpler has become a high priority. Dell In traditional UTM technology, the and easier. SonicWALL offers a SonicWALL Secure Remote Access IT team would receive a report comprehensive offering from (SRA) appliances extend secure say the next day identifying any perimeter security to desktop bandwidth abuse after the damage remote networking over SSL security, internal security to wireless, VPN to potentially thousands of has already been done. In the WAN optimization to secure remote locations, to provide anytime, next generation firewall scenario, access technology. We also have anywhere access.The modern the IT team is able to get this solutions for companies who wish mobile workforce also demands information in real time. This gives to manage their own email security secure access to more resources the power to the IT manager to if they have their own mail servers from more remote devices and take corrective measures on the as well as offering back-up and platforms than ever before. Our SRA fly. So we are able to give real time recovery solutions. solutions offer access to missionvisibility of applications to the IT critical resources from virtually any team managing the firewall. So at Discuss the integration of endpoint—including desktops, any time of the day, the IT team is SonicWALL’s own legacy channel laptops, smartphones and tablets. able to understand applications program with Dell’s partner These scalable remote access usage. They are able to know what program solutions fit organizations of every applications are consuming how Up now, we havebeen managing size, from small- to medium-sized much bandwidth and how many our channel through the legacy users are using these applications. If businesses (SMBs) to the largest Medallion Programme based global enterprise.We are able to there is bandwidth abuse, they will on a typical two tier model. This offer end point control over the be able to identify who is abusing partner programme is set to SRA platform to make the whole bandwidth, which applications are be merged with Dell’s Partner proposition more secure in terms consuming the most bandwidth Direct programme. All Medallion of the right users connecting and is it really a business need or is Programme members would be to the right applications in the it a productivity loss. So based on able to carry their benefits from organization. all this information, the IT team can SonicWALL and then be able to take corrective measures on the fly in order to ensure that bandwidth is How manageable are SonicWALL benefit from new benefits from solutions for the average SMB Dell. This process is in transition used for business purposes. unable to afford a lot of technical and by the end of Q4, we should have most partners in Dell’s Partner With connection through mobile resources? We offer management solutions devices becoming more and Direct programme. Partners will still for multi-location deployments-for more widespread, discuss how have the point of contact, benefits SonicWALL is prepared to handle example the head office as well as and support from SonicWALL. 26

The Integrator | November 2012

November 2012 | The Integrator


Insight | Allied Telesis

The use of IT technologies when constructing a fully automated factory is a primary consideration in order to be competitive in today’s global marketplace. In such a context, the corporate network plays a fundamental role because it is the nervous system of the entire company, hence it must be properly protected against any possible threat whether it is accidental or intentional. Everyone will understand that security cannot be limited to the installation of devices like firewalls or UTMs that only act as the

Sabhhauddin Khan Regional Manager Allied Telesis Middle East

Security is an attitude and a feature that must pervade the entire network through a series of consistent mechanisms that must be easy to implement, maintain, test and use, write Sabhhauddin Khan, regional manager at Allied Telesis Middle East.

The Integrator | November 2012

Simplicity, clarity, immediacy: these are the foundations of a network infrastructure that is really strong and safe over time. Let's start with resilience to failures.

Factory Networks and Security network’s protection at its external boundary. The network must be resilient to every intentional or accidental action performed by internal users too because of inattention, ignorance of operational procedures or, even worse, for “surviving” complex and muddled access control procedures. Consider passwords for instance. The more complicated access procedures and password policies are, the more likely users write them on stickers or store them in their mobile phone. It is like leaving the home keys under the carpet or in the flower-pot beside the door. It would not matter how robust and armored is the door might be. Therefore it's not possible to rely


only on a software or hardware product, or product-set, in order to achieve a decent level of security. It's not a matter of how sophisticated and evolved products are. Security is an attitude and a feature that must pervade the entire network through a series of consistent mechanisms that must be easy to implement, maintain, test and use.

Redundant network infrastructure that extensively uses a multilayer approach combining Ethernet and IP protocols such as Spanning Tree (in its various forms) and VRRP / HSRP in conjunction with any routing protocol (OSPF, RIP, ISIS, ...), requires coordinated planning and an extremely complex configuration of the various mechanisms. In such a complicated setup, troubleshooting is a complex and time consuming task too. The situation becomes almost impossible to sustain if VLANs or VPNs are implemented. On the contrary, an infrastructure able to operate at Layer 2 across the entire factory, with resiliency mechanisms based on Link Aggregation and EPSR , combines a clear and simple architecture

with ease of network until configuration the connected "The network must be resilient to every and fault equipment intentional or accidental action performed identification. successfully by internal users too because of inattention, There is no pass an ignorance of operational procedures or, even protocol to authentication worse, for “surviving� complex and muddled coordinate, process using access control procedures." traffic flow one out of three through two or authentication type router connected between more parallel methods: IEEE two ports would give rise to an paths across the network in a 802.1x, Web authentication or MAC accelerator of packets that could balanced way and virtualization address recognition. bring down the whole network. can be simply achieved by VLAN Similarly a consumer router (such that can then be aggregated at This mechanism has to be as an ADSL one) connected to the backbone level by activating VLAN integrated with the corporate corporate network through one of in VLAN mechanisms. security and access control its LAN ports can respond to DHCP infrastructure based either on requests from any PC with an IP Everything with fault recovery a RADIUS server or an industry address that is not compatible with standard Network Access Control time under 50 milliseconds, typical the network itself preventing the of EPSR, and the scalability of / Protection systems by Symantec communication across the network. or Microsoft. After passing the Link Aggregation that allows the increase of the available bandwidth All access switches must then authentication procedure the implement DHCP protection and IP equipment is automatically by simply adding more physical address verification, allowing only links. The impact on configuration associated to the relevant VLAN as the officially assigned IP address to is minimal: just add the additional soon as users perform their usual port ids to the existing aggregation be used on that port. login procedure. commands.

Complementing this feature with a pair of LAN switches connected in VCStack mode the network can even withstand fire if the two pieces of equipment are physically separated by a fire wall. This setup is not possible when deploying a chassis even if redundant.

The protection framework is completed by tri-authentication. This feature, active on every port, does not allow the access to the

Simple and resilient and at the same time scalable - this is the approach for an efficient and effective solution to a real problem.

A resilient architecture is not enough to ensure the operation of the network if basic critical protocols are not protected from simple voluntary or involuntary actions attempted by any user. First of all it is necessary that all access switches implement loop detection and protection features, without which a cable or a small switch or a consumerNovember 2012 | The Integrator


Insight | Ciena

Better designed networks can leverage cloud benefits Saad Khan, Regional Managing Director, Middle East, Ciena gives us top 10 reasons about why the cloud is only as good as the network. Saad Khan Regional Managing Director Ciena Middle East

The Middle East needs a better network to the cloud. Following are ten reasons why that is so.


Your cloud workload will evolve as applications change Today you are running SaaS or infrastructure applications that stay resident in the provider cloud, often locked behind semi-proprietary architectures. This is a logical first implementation that’s common to most technology rollouts. The next step is also predictable - a turn to a more open architecture with standards in place for APIs and management tools. By taking this step, you unlock the potential to federate your private data centers with multiple provider cloud data centers, enabling greater workload mobility and the ability to deploy entirely new applications that will require a better network to run effectively.


Management wants to see your cloud performance metrics


The Integrator | November 2012

As cloud implementations mature from trials to full deployments, management will demand to see tangible benefits of the cloud deployment. The way you design your network can be a deal breaker to success. The network is the strategic lever to achieve the cloud benefits of lower costs, reduced deployment time and new functionality. In short, the cloud is only as good as the network.

larger enterprises will also want to take advantage of lower cost cloud storage for large amounts of storage. They will want a network that can dynamically respond to moving terabytes when the data needs to move — without bottlenecks, security holes or dropped packets.


A more efficient network is critical for cloud data center connections Cloud storage is becoming an IT organizations in the Middle increasingly large percentage East are highly motivated to of corporate data drive efficiencies — first through Organizations in the region typically data center consolidation, then use cloud infrastructure for simple virtualization, with the next step storage backup to cloud data being to use cloud services. The centers over low speed IP networks, network is also a key enabler for cloud service providers to operate trickling the data asynchronously multiple data centers as a shared as the network permits. Typically this use case fits small businesses pool of virtual data centers, with relatively low amounts of which could enable a 35 percent storage. As the market evolves, reduction in total cloud data center


resources. The network is the key ingredient that ties everything together, serving as a backplane across the data centers for flexible delivery of applications and services.


Inter-data center networks are going virtual too A virtualized network partitions resources in many different ways, e.g., virtual circuits (EVPLs), virtual wavelengths (Optical Transport Network – OTN), virtual switches (VSIs) and virtual networks (VPNs, Optical Virtual Private Network – OVPNs). Virtualization of the network provides network efficiency, i.e. coordination of the bandwidth and topology to the specific application need at a point in time. This eliminates the need to size all data center network interconnection facilities for a peak capacity that is only rarely used, which lowers costs because you don’t need to make unnecessary network equipment investment.


You will want to automate cloud use cases using an intelligent network Workload orchestration between cloud data centers, and between enterprise and cloud data centers, will be driven by policy-based software automation tools. Ondemand change in performance parameters such as bandwidth scalability will be accomplished through high-level software interfaces into the network control planes, not by an operator using a command line interface to the equipment. This performance-ondemand will be triggered at the application level, ensuring that the adjustments to the network and to the cloud meet the business requirements.


The cloud network needs to scale dynamically A north-south traffic flow is userto-machine through a tiered IP network architecture. This reflects a client/server model and is exercised in the cloud for SaaS-type applications where the application is simply moved from the in-house data center to the cloud provider data center server. East-West (standardized, either capital w throughout or not) traffic flows are machine-to-machine within, and increasingly between, data centers. Such traffic has much more stringent quality-ofservice requirements. In the near future, we’ll see at least an order of magnitude more East-West data workloads driven by applications like storage synchronization, interdata center storage virtualization and virtual machine migrations. This means the cloud network needs to be designed for performance to meet the traffic flow change and intensity challenges of the future.


You need a network that can move a large amount of data in a short amount of time You need a flatter Layer 0/1/2 network architecture between data centers that delivers better scalability, latency and deterministic performance. With this architecture, the network won’t be a bottleneck when you need it the most, and it will deliver the lowest cost per bit throughput.


Stuff happens, so you need to plan for the worst Whether you use the cloud as a fail-safe to on-premises operations or as your primary IT resource, you need to be prepared for a worsecase scenario such as a natural

disaster or unexpected peaks in traffic. You or your cloud provider may need to move hundreds of your virtual machines and/or data stores from the current data center to another data center in the cloud — potentially alongside those of many other enterprises. To move these workloads in time to avoid or recover from disaster, without damaging your business, you’ll need a network that can rapidly add and reallocate capacity to your Business Continuity/Disaster Recovery data center.


A virtual data center architecture -a Data Center Without Walls -means cost savings and operational efficiency The ‘Data Center Without Walls’ concept describes an architecture that creates a multi-data center, hybrid cloud environment able to function as a set of virtual data centers from a common resource pool to address any magnitude of workload demand and offer seamless workflow movement. Enterprises will want to access cloud resources anywhere, anytime. Service Providers will want to offer cloud services differentiated by state-of-the-art, programmable network access, and economies of scale that leverage their data center footprints. Cloud Providers will handle uncertain demand requirements and failover by more efficiently allocating workloads across multiple data centers. The cloud backbone network is the critical link for providing costeffective scalability, security, and on-demand services that enable the virtual data center. November 2012 | The Integrator



Iomega StorCenter Network Video Recorder (NVR)

ATEN Cat 5 High Density LCD KVM Switch & KVM Switch

The new Iomega StorCenter NVR has all of the features of Iomega’s award-winning desktop network storage devices, including the EMC LifeLine operating system as well as local and cloud network storage capabilities that enhance the customized video surveillance functionality. The new Iomega StorCenter NVR will be available in three versions: a two-drive model loaded with a pair of 2TB Server Class hard drives for 4TB of total storage capacity; a partially-loaded four-drive model with a pair of 3TB Server Class drives for 6TB of total storage capacity; and a fully-loaded fourdrive model with four 3TB Server Class drives for a total of 12TB of storage capacity. The 4TB and 6TB models include four camera licenses each; the 12TB model includes eight camera licenses. Each device can support up to 16 cameras. Key features: • The integrated SecureMind Surveillance Manager video management software expands the Iomega StorCenter NVR into a feature-rich video surveillance appliance. •

The Iomega StorCenter NVR delivers multi- channel live monitoring, video recording, and fast video playback with multiple IP cameras (cameras not included).

• With built-in storage capacity, the archiving and retention capabilities are exceptional for surveillance video. •


The Iomega StorCenter NVR is scalable by adding incremental hard drives to the partially populate four-drive model, or additional Iomega network storage units to an infrastructure.

The Integrator | November 2012

With limited server room space and rising maintenance costs, network administrators are now more than ever looking for solutions that reduce both costs and space requirements. ATEN Cat 5 LCD KVM Switches and KVM switches offer a space saving, streamlined approach to KVM switching technology. KL1508A/KL1516A : 8/16-Port Cat 5 High Density LCD KVM Switches Key Features: • Dual Rail • Available in 17” and 19” Screen Sizes. • External Console Port. • Multiple Platform Support: PC, Mac, Sun, Serial. • Superior Video Quality: 1600 x 1200 @60 Hz. KH1508A/KH1516A: 8/16 Port Cat 5 High – Density KVM Switch Key features: • Dual Interface: supports computers and consoles with PS/2 and USB keyboards and mice. • Multiple Platform Support: PC, Mac, Sun, Serial. • Daisy Chain up to 31 additional KVM Switches- Control up to 512 Computers. • Superior Video Quality: 1600 x 1200 @60 Hz. • Simple Space Saving Cabling.

Allied Telesis SwitchBlade x8112

HID Global Expands FARGO Series HID Global has announced it has expanded its card personalization portfolio with the introduction of its FARGO HDP8500 Industrial Card Printer/Encoder and is being distributed in the region by Business Connection, HID Global’s authorised distributor. Featuring the company's fifth generation High Definition Printing (HDP) technology, the new Industrial Series printer/ encoder is a card personalization and issuance solution for extended-run, high throughput and high duty cycle requirements of government ID card programs, laborious service bureaus conditions, universities and large enterprises. Key features: • The FARGO HDP8500 printer/encoder includes a 400-card total input capacity. This combined with a graphical touch screen user interface, helps minimize operator intervention and maximize card yield per shift.

Allied Telesis has announced the new SwitchBlade x8112 in response to the market’s requirement for high availability networks. The SwitchBlade x8112 is the ideal device for large solutions. It represents an extension of the Allied Telesis Stairway to the Cloud resilient solution on a much larger scale, which perfectly fulfils Public, Private and Hybrid Cloud needs. Key features: •

The SwitchBlade x8112 is a 12 slot Layer 3 chassis switch designed to deliver high availability, wire-speed performance, high port count in a small physical size.

Allied Telesis easy resiliency features, based on VCStack and EPSRing technologies, make it the ideal solution for the modern enterprise network where resiliency, reliability and high performance are the key requirements.

• Delivers reduced CapEx and OpEx for customers, due to its Active-Active architecture. • This new product, along with Allied Telesis’ other Layer 3+ switches, is powered by AlliedWare Plus operating system.

The HDP8500 is built using solid metal cabinetry with precision-engineered interior components to provide greater resistance to parts fatigue, and is designed to work with the most durable consumables for long-life card provision in small and large government ID programs.

For operational and issuance security, the printer is the first personalization solution in the market that has been architected for use within the HID Global Trusted Identity Platform (TIP) ecosystem, allowing it to process and generate Secure Identity Objects for enhanced system security and authentication where citizen privacy in government ID card projects and heightened security in other card programs is a necessity.

• The printer includes a comprehensive set of additional security features such as operator •

PIN number access and multi-locking entry points for secure printing; AES 256 bit data encryption and resin ribbon data-erase functionality; secure holographic lamination for lasting protection from fraud.

• Lowest power consumption in its category November 2012 | The Integrator


Stats & Trends

Big Data Will Drive $28 Billion of IT Spending in 2012 Big data will drive $28 billion of worldwide IT spending in 2012, according to Gartner, Inc. In 2013, big data is forecast to drive $34 billion of IT spending. Most of the current spending is used in adapting traditional solutions to the big data demands -machine data, social data, widely varied data, unpredictable velocity, and so on - and only $4.3 billion in software sales will be driven directly by demands for new big data functionality in 2012. Big data currently has the most significant impact in social network analysis and content analytics with 45 percent of new spending each year. In traditional IT supplier markets, application infrastructure and middleware is

most affected (10 percent of new spending each year is influenced by big data in some way) when compared with storage software, database management system, data integration/quality, business intelligence or supply chain management (SCM). "Despite the hype, big data is not a distinct, stand-alone market, it but represents an industrywide market force which must be addressed in products, practices and solution delivery," said Mark Beyer, research vice president at Gartner. "In 2011, big data formed a new driver in almost every category of IT spending. However, through 2018, big data requirements will gradually evolve from differentiation to 'table stakes' in information management

practices and technology. By 2020, big data features and functionality will be non-differentiating and routinely expected from traditional enterprise vendors and part of their product offerings." Starting near the end of 2015, Gartner expects leading organizations to begin to use their big data experience in an almost embedded form in their architectures and practices. Beginning in 2018, big data solutions will be offering increasingly less of a distinct advantage over traditional solutions that have incorporated new features and functions to support greater agility when addressing volume, variety and velocity.

As BYOD takes over the Workplace, Device Security is Top Concern A survey conducted by Forrester Consulting and commissioned by Trend Micro shows that across the U.S. and Europe, the majority (78 percent) of enterprise IT decision makers say that employees are already using consumer devices to conduct company business. This is further supported by another survey, also commissioned by Trend Micro and conducted by Decisive Analytics, which shows how the “Bring Your Own Device� (BYOD) phenomenon is not only prevalent in enterprises, but device security is a top concern for these companies. The most telling result from the Key Strategies to Capture and Measure the Value of Consumerization of IT survey is the fact that 78 percent 34

The Integrator | November 2012

of enterprises are currently instituting BYOD programs. Breaking out the numbers from these programs, 60 percent of respondents include smartphones in BYOD strategies and 47 percent deploy tablets and laptops. When asked why BYOD has been instituted in a company’s workplace, 70 percent of survey respondents cite increasing worker productivity as the key driver of why such a high penetration of BYOD programs exists. However, the Mobile Consumerization Trends & Perceptions survey shows that nearly all (83 percent) companies that do permit BYOD have policies

in place that require employees to install security software as a precaution. Further underlining these security implications, Trend Micro found that 86 percent of IT decision makers from the U.S., U.K. and Germany state that smartphone data security is their number one concern when consumer devices are connected to corporate networks.

The Integrator - Nov 2012  

The Integrator

Read more
Read more
Similar to
Popular now
Just for you