80

Bytes Magazine Spring_Summer 2013

Embed Size (px)

DESCRIPTION

Bytes of Software and Licensing news

Citation preview

Page 1: Bytes Magazine Spring_Summer 2013
Page 2: Bytes Magazine Spring_Summer 2013

Book a 45 minute online demonstration with Bytes and receive a FREE tailored Proof of Concept report for your business.Simply email [email protected] or book via your Bytes account manager on 020 8786 1500.

Page 3: Bytes Magazine Spring_Summer 2013

welcometo bytesspring/summer 2013

Welcome to the latest edition of the Bytes magazine.

Whether you are a customer of ours or not, one thing is

for sure; Technology is playing a larger role in commerce

and business growth, innovation and operational

performance than ever before. It’s almost all pervasive

(whether we like it or not!) Mobility, social media and

ever increasing data volumes mean that as procurement

or IT professionals we need to make sure we are making

the right decisions for now and for the future.

Information Technology is becoming much more a fabric of the business than ever and one of

our objectives is to make sure that you have all of the tools and information at your disposal to

make sure your organisation is making the right procurement decisions.

In this issue you will see relevant articles and information on the subject of “Bring Your Own

Device” as well as important information relating to Microsoft licensing changes, including

Microsoft XP end of support and Windows 8. Additionally, we feel Microsoft’s Azure platform will

become increasingly valuable to all sizes of organisation and you will fi nd useful views around

this topic. Other articles cover opinions from the world of virtualisation and storage and you will

also see updates on desktop and network security.

The Bytes Group in the UK has much to offer, including our Managed Print Services where

believe it or not our Xerox operation (Bytes Document Solutions) wants to help you reduce the

amount you print! Print management and print suppression can save signifi cant sums off your

operational and capital budgets, see “To print or not to print” article for further details.

I hope you enjoy reading this magazine and please pass it on to your colleagues too, or point

them to our website where we host an electronic copy (www.bytes.co.uk). Above all, please

remember we are here to help you and relish the chance to be your trusted advisors - so

contact us and see if we can help make your lives a little easier!

contact us Bytes Software Services,UK Head Offi ce, 15-17 Chessington Road, Ewell,Surrey, KT17 1TSphone - 020 8786 1500 fax - 020 8393 6622

Neil MurphyManaging Director

www.bytes.co.uk | 03

Mandi NicholsonSales Director

Neil Mandi

Page 4: Bytes Magazine Spring_Summer 2013

contentscontents cover story p08 Windows 8 An overview of Windows 8 and associated licensing considerations

p20 Flexible Working and BYOD The best BYOD solutions on offer from our strategic partners

p26 Virtual Vision Covering the latest trends in Virtualisation

p48 May the EnForcement Be With You Security lessons from Check Point and Star Wars

p70 Training a Global Workforce Linklaters Offi ce 2010 migration

04 | spring/summer 2013

licensing

p08 Windows 8 An overview of Windows 8 and associated licensing considerations

p12 A Microsoft Licensing Perspective on BYOD A look at the key Microsoft licensing considerations

p14 Microsoft ECI and EAP A look at Microsoft Enrollment for Core Infrastructure (ECI) and an overview of EAP

p16 Microsoft Windows XP End of support Steps to take to ensure you remain on supported versions of Windows and Offi ce

virtualisation

p26 Virtual Vision Covering the latest trends in Virtualisation

p28 Share, Store, Sync and Secure fi les on any device, Anywhere An overview of Citrix ShareFile Enterprise Edition

p30 Introducing VMware Horizon A review of VMware’s cross-platform management solution

storage

p32 Windows Azure A look at the Azure platform and how to best utilise it

p34 Microsoft Private Cloud Deliver IT Services with NetApp

p36 Power Up, Confi gure, Go An in-depth look at Symantec Backup Exec 3600 Appliance

p38 Extend The Reach of SharePoint Content Solution from BOX

security

p39 A Premium BYOD Security Solution Without the premium price tag from LetMobile

p42 Microsoft TMG End of Life David Rawle looks at the Non Cloud Alternative

p43 Spear-Phishing Advice from Websense

p44 Making Microsoft Apps Truly Global SharePoint & Exchange security from F5

p48 May the EnForcement Be With You Security lessons from Check Point and Star Wars

p50 Transforming How Mobile Work Gets Done The mobile apps platform from Good

p52 Threats for 2013 Research from McAfee

p54 Enterprise SaaS: Service Support Mimecast looks at the world of SaaS and customer satisfaction

Page 5: Bytes Magazine Spring_Summer 2013

news bytes p06 News Bytes A selection of the latest news from vendors

p19 Bytes Portal All your software estate available in one place

p40 News, Views and Events Recent and forthcoming Bytes events and venues

p75 Bytes Learning Services p76 Bytes Software Services p77 Bytes SAM Services

regular bytesp69 Meet The Manufacturers Meet our manufacturers at upcoming events

p72 In The Hotseat An interview with David Tweddle of Oracle

p74 Try Before You Buy Take the opportunity to trial before you make that important purchase

p78 Vendor Awards p79 Our Vendor Accreditations

James McNultyHead of Tesco Group IT Procurement

Bytes have helped Tesco make signifi cant savings by effective and intelligent management of our licensing entitlements. They manage our global requirements, are able to keep us abreast of new and relevant licensing changes and apply these to our requirements ensuring we are always licensed in the best way possible”.

case studiesp46 Long term security strategy reviewed and developed Natural Environment Research Council move to Bytes SP

p70 5000 staff trained in 27 offi ces in 19 countries An overview of a successful Offi ce 2010 migration and training roll out

www.bytes.co.uk | 05

applications, management & document solutions

p56 Adobe Creative Cloud An overview of Creative Cloud for teams

p58 10 Great Tips for Your Workday Use Adobe Acrobat XI pro to make your life easier

p60 The HP IT Performance Suite for Operations Gain the visibility you need to measure performance in detail

p62 To Print or Not to Print? The argument for moving away from print

our partner ecosystem

p64 The New Offi ce365 Additions & improvements from Parative

p66 Building Business Propositions For new technology from Risual

p67 Microsoft Lync Enterprise Voice The solution to cut costs from InterCall

p68 SQL Server 2012 Business Intelligence from Northdoor

Page 6: Bytes Magazine Spring_Summer 2013

news

Catch up on all the latest news from the IT world from

new product launches, latest software and licensing

updates to business acquisitions.

bytes

06 | spring/summer 2013

Citrix Acquires Zenprise Citrix announced that it has closed the acquisition of Zenprise, a leading innovator in mobile device management (MDM). Citrix will integrate the Zenprise offering for mobile device management, with its Citrix CloudGateway™ and Me@Work™ solutions for managing mobile apps and data.

As a result, IT will now have a comprehensive set of tools that make it easy to manage and secure devices, apps and data, while users will now be able to access any app from any device, giving them the freedom to work and play anywhere. Amit Pandey, former Zenprise president and CEO, will lead the new Mobile Platforms product group at Citrix. Citrix will continue to fully support and serve the Zenprise global customer base.

Oracle Buys EloquaOracle announced that it has agreed to acquire Eloqua, a leading provider of cloud-based modern marketing applications. Eloqua delivers marketing automation and revenue performance management software that ensures every component of marketing works harder and more effi ciently to drive revenue.

The combination of Oracle and Eloqua is expected to create a comprehensive Customer Experience Cloud offering to help companies transform the way they market, sell, support and serve their customers. The combined offering is expected to enable organisations to provide a highly personalised and unifi ed experience across channels, create brand loyalty through social and online interactions, and provide superior service at every touchpoint.

Bytes win again at Xerox Annual Awards CeremonyBytes Document Solutions are delighted to announce they have won the Xerox Premier Partner of the Year 2012 award. This award comes off the back of another growth year for Bytes which saw their market share increase by 12% - helping them retain their position as the UK’s largest Xerox Partner.

Darren Spence, Bytes Managing Director, says:“The team at Bytes have worked extremely hard over the past year to ensure we continue to put customers fi rst in everything we do. Our proposition has continued to evolve beyond recognition and our attention to detail and customer satisfaction remains a focal point for the Executive team. We have a clear fi ve year plan which is built around having sustainable customers, so picking up this award means a lot to us and makes the hard work worth it.”

Symantec Delivers Record Revenue in Fiscal Third Quarter 2013Symantec Corp. (Nasdaq: SYMC) reported the results of its third quarter of fi scal year 2013, ended Dec. 28, 2012. GAAP revenue for the fi scal third quarter was $1.79 billion, up 4 percent year-over-year and up 5 percent after adjusting for currency.

“We continue to deliver better than expected results,” said Steve Bennett, president and chief executive offi cer, Symantec. “I’m so proud of our employees. These types of results don’t happen by accident. The fact that we can deliver these results in a period of signifi cant transition and uncertainty is a testament to our employees, the strength of our brand, the quality of our products and the scope of our customer base.”

Check Point evolves their Endpoint Security Suite – Launches e80.4x seriesAs organisations adopt new technology, such as bring-your-own-device and cloud computing, they put themselves at greater risk of a costly data breach. Daily practices in the workplace and ever evolving malicious activity are constantly threatening the network and customers sensitive information.

Check Point have now released their e80.40 Endpoint Series to evolve in response. Key e80.40 series features are:• Unifi ed, simple to understand

security policy • Unifi ed Security Suite Across

Windows and MAC • Visibility to organisational security

picture • Security forensics & analysis with

Endpoint Smartevent • Full integration with Check Point

Management Architecture • Manage Endpoint policies with

Check Point Smart-1 • A new approach to “BYOD” -

separation of Private and Corporate Use Document Security

• Encryption – Set Access Rights – Classify

New Starting in E80.41 (released Jan 2013), Endpoint Security is also supported on Windows 8, including new Unifi ed Extensible Firmware Interface support. Check Point are also aligning the release of their Remote Access VPN clients for Mac and Windows with their Endpoint Security releases.

Page 7: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 07

World’s fastest fi rewall for Application Delivery launchedF5 Networks, Inc. (NASDAQ: FFIV), the global leader in Application Delivery Networking, have announced new security offerings designed to safeguard organisations’ network and application infrastructures. With the introduction of BIG-IP® Advanced Firewall Manager™ and enhancements to other security offerings, F5 provides the industry’s fastest and most scalable application delivery fi rewall solution. F5’s fi rewall solution is the fi rst in the industry to unify a network fi rewall with traffi c management, application security, user access management, and DNS security capabilities within an intelligent services framework.

When deployed with F5’s new VIPRION® 4800 hardware, the F5® application delivery fi rewall solution provides performance levels well beyond what other vendors can offer, including:

• 640 Gbps of fi rewall throughput• 288 million concurrent sessions• 8 million connections per second

Policy Management Market Leader AlgoSec Makes Bytes the Key Addition to its UK Line UpAlgoSec, the market leader for Network Security Policy Management, has made a key addition to its UK channel line-up with the appointment of Bytes Security Partnerships, a leading provider of IT security and risk management solutions as a Gold partner. With the appointment of Bytes Security Partnerships, AlgoSec has expanded its Gold partner count to fi ve, from a standing start in 2010.

Paul Clark, AlgoSec’s Regional Director for UK & Ireland said: “Partnering with Bytes Security Partnerships will be a big step for us in driving further growth in the UK and Europe. Its expertise in delivering enterprise security solutions and managed services will help us fulfi ll growing market demand and uncover new opportunities.

Bytes Security Partnerships (BSP) is the fi rst new Check Point Platinum Partner appointment in four years.The BSP team are delighted to be promoted to the highest accreditation for Check Point partners, achieved by only the top 1 per cent of the partner community in the UK. Just fi ve partners have this level of accreditation, and it is a refl ection of the growth and success achieved by Bytes Security Partnerships over the past period, growing their revenue by 20% year on year in 2012 to £10.5 million.

Terry Greer-King, UK Managing Director of Check Point, said Bytes Security Partnerships stood out based on the growth of its understanding of Check Point’s strategic focus:

Our top level of accreditation rewards those partners who are most closely aligned with Check Point in terms of understanding and communicating our solution strategy to their customers, as well as on account and revenue growth.

Bytes SP CTO is fi nalist for Information Security Person of the Year – SC Awards EuropeCongratulations to David Rawle, CTO of Bytes Security Partnerships (BSP) on being shortlisted as a fi nalist for the Information Security Person of the Year award in this year’s SC Awards Europe.

David, who heads up the technical division of Bytes Security Partnerships, was nominated by BSP colleagues due to the strategic focus he brings to clients, the high performance of the BSP technical department, the direction he provides the wider business product-wise and the work he conducts each month to raise the profi le of information security issues amongst our customers.

With over 15 years’ experience in the industry, a decade at BSP, David is an integral part of the technical excellence we provide our customers and we are delighted that his diligence and reputation amongst customers and with technology partners is being recognised with this high profi le nomination.

Bytes achieve Citrix Gold Solutions Advisor statusFollowing the successful achievement of additional technical and sales skills we are very pleased to announce our Gold Solutions Advisor Status with Citrix.

Our dedicated virtualisation team consists of specialists who work alongside our licensing experts to ensure the design and implementation of new solutions are delivered in the most cost effective way, taking into account existing current software contracts that our clients own.We have developed a strong relationship with Citrix and this enables a three-way engagement strategy which involves our clients, our licensing/vendor specialists and Citrix, to get our clients the best outcome possible. Commenting on our enhanced relationship Kevin Bland, Director, UK, I & SA, Citrix says: “Bytes’ continued commitment to Citrix solutions means that we are delighted to award gold solution advisor status. We very much hope that Bytes will continue to be an important part of our partner-ecosystem”.

Bytes Wins Again – Enterprise Reseller of the YearFor the second year in a row Bytes is delighted to be named ‘Enterprise Reseller of the Year’ at this year’s CRN Awards, in association with Computer Reseller News.

Bytes MD Neil Murphy (and a few excited colleagues) picked up the award from comedian Ed Byrne in front of over 1750 attendees at the glittering awards ceremony held at Battersea Park Events Arena in London.

Page 8: Bytes Magazine Spring_Summer 2013

licensing

08 | spring/summer 2013

performance or choice. It provides enhanced features that help to easily connect to company networks, access fi les on the go, encrypt data, and more. Windows 8 Pro is ready for business.

Windows 8 EnterpriseWindows 8 Enterprise edition is available through Software Assurance for Windows and includes all the capabilities of Windows 8 Pro, plus premium features designed to meet the mobility, productivity, security and manageability, and virtualisation needs of today’s large businesses.

The release of Windows 8 brings with it new offerings and user rights such as Virtual Desktop Access, Windows To Go, Enterprise Sideloading, Thin PC, and Roaming Use Rights.

This pages provide you with a summary of the new licensing rules for Windows so that you can assess their applicability within your organisation.

Windows 8 EditionsThis latest version of Windows is available in four editions:

Windows 8 ProWindows 8 Pro is for small and medium sized businesses and delivers new levels of productivity, security, and mobility, all without sacrifi cing

Whether you want to upgrade your PCs

to Windows 8, gain access to exclusive offerings

such as Windows 8 Enterprise edition and the

Microsoft Desktop Optimisation Pack, or use

Windows with greater fl exibility, there is a

Volume Licensing option that is right for your

organisation.

Windows 8This is the consumer version of Windows 8 that excludes a lot of the business-type features like drive encryption, group policy and virtualisation. However, you will have access to the Windows Store, Live Tiles, Remote Desktop Client, VPN Client and other features.

Windows RTDesigned for ARM-based devices like tablets, ARM-powered PCs and any other devices that support the ARM architecture and are designed to run Windows 8 RT.

John GortonMicrosoft Licensing Lead, Bytes

focuson

Windows 8 editions by channel

Whether you want to upgrade your PCs Whether you want to upgrade your PCs Whether you want to upgrade your PCs

to Windows 8, gain access to exclusive offerings

such as Windows 8 Enterprise edition and the

Microsoft Desktop Optimisation Pack, or use

Windows with greater fl exibility, there is a

Volume Licensing option that is right for your

organisation.

Page 9: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 09

cont...

OEM downgrade rights are limited to equivalent edition for the two prior versions.

Preinstalled on PC (OEM)

Downgrade RightsPCs purchased pre-installed with Windows 8 Pro will have the option to downgrade either to Windows 7 Professional or Windows Vista Business. For customers who require Windows XP or other prior versions, the rights to downgrade to these versions are available only through volume licensing.

• Downgrade rights are included in licenses obtained through OEM

Preinstall or Volume Licensing and do not apply to retail copies of

Windows.

• OEM downgrade rights apply to Windows 8 Pro and allow

downgrading for up to two prior versions (to Windows 7

Professional or Windows Vista Business).

• Adding Software Assurance provides the greatest fl exibility,

allowing for downgrades to additional prior versions and editions,

including Windows 7 Enterprise.

Windows 7 Enterprise

Windows 7 Professional

Windows Vista Enterprise

Windows Vista Business

Windows XP Pro

Windows 2000 Professional

Windows 95/98/NT

Version Downgrade to

OEM PreinstallWindows 8 Pro

Windows LicensingWindows 8 Pro Upgrade(without SA)

Windows 8 Enterprise(with SA)

Volume Licensing downgrade rights provide greatest fl exibility with downgrades to any version.

Volume Licensing

Download rights detail

Page 10: Bytes Magazine Spring_Summer 2013

focusonlicensing

10 | spring/summer 2013

With New Version Rights, you have access to new releases of Windows on any

licensed device as soon as they are released for no additional cost.

Windows 8 Enterprise edition is available through Software Assurance for

Windows and includes all the capabilities of Windows 8 Pro, plus premium

features designed to meet the mobility, productivity, security and manageability,

and virtualisation needs of today’s large businesses.

This is a suite of products that include technologies to aid the deployment

of technologies, provide compatibility with Windows XP and assist with the

management of devices. The table below describes what is included in MDOP.

Windows Thin PC is a smaller footprint version of Windows 7 that enables

organisations to repurpose existing PCs as thin clients, thereby reducing the need

for new thin client hardware.

The user of the PC can also use a corporate owned Windows RT Surface device

that is assigned to them to run Windows in a VDA session hosted on a central

server.

The PC can be used to run ‘Windows To Go’ which is a fully managed Windows 8

desktop which runs from a USB Stick. In addition, the primary user of a PC

which has Windows Enterprise Edition, can use Windows To Go on any

non-corporate PC.

Grants the user of the PC rights to run Windows in a VDA session from any PC

outside of the organisation’s domain.

The Windows CSL enables Bring Your Own Device (BYOD) scenarios and

provides businesses more fl exibility to run Windows across multiple devices

for employees.

New Version Rights

Windows 8 Enterprise

Microsoft Desktop

Optimisation Pack (MDOP)

Windows Thin PC

Windows Virtual Desktop

Access (VDA) Rights

Windows To Go

Roaming Use Rights

Windows Companion

Subscription License (CSL)

The Value of Software AssuranceSoftware Assurance, Microsoft’s maintenance programme, has traditionally been seen by customers as a route to new versions of their software, as well as technical support and training benefi ts. However, attaching Software Assurance to the Windows Operating System allows Microsoft Windows Enterprise Edition to be deployed. This version provides additional features, extended licensing rights and an entitlement to subscribe to additional software.

Benefi t Description

Software Assurance benefi ts

Page 11: Bytes Magazine Spring_Summer 2013

about your licensing requirements or how changes will effect your business please speak to your Bytes account manager on 020 8786 1500.

further info...

www.bytes.co.uk | 11

Windows 8 EnterpriseWindows 8 Enterprise features include all the capabilities that customers get with Windows 8 Pro, plus premium features designed to provide the mobile productivity, security, manageability, and virtualisation needs of today’s businesses. Windows 8 Enterprise is available to customers with Software Assurance for Windows or Windows VDA subscription.

Allows remote users to seamlessly access resources inside a corporate network without having to launch a separate VPN.

Allows users’ PCs to cache fi les, websites and other content from central servers, so content is not repeatebly downloaded across the wide area network (WAN).

Enables IT to specify what software is allowed to run on a user’s PC through centrally managed but fl exible Group Policies.

Enhancements in Microsoft RemoteFX and Windows Server 2012, provide users with a rich desktop experience with the ability to play 3D graphics, use USB peripherals and use touch-enabled devices across any type of network (LAN or WAN) for VDI scenarios.

As Enterprise Sideloading is enabled as a feature in Windows 8 Enterprise, customers running this edition on domain-joined PCs can easily manage the direct deployment of touch-centric Windows 8 apps to these devices without going through the Windows Store/

DirectAccess

BranchCache

AppLocker

Virtual desktop infrastructure (VDI) enhancements

Enterprise Sideloading for Windows 8 Apps

In SummaryWith the release of Windows 8, it is important that you understand the new licensing rules for Windows and their applicability within your organisation.

Many of the licensing rules will apply even if you continue to deploy Windows 7, and some of the new licensing rights address individuals wanting greater mobility and the ability to bring their own devices into work. Because so many licensing rights and additional product features rely on Software

Assurance, it is essential that you know where this applies. Do speak to your Bytes account manager to fully understand the licensing changes, how they may impact your organisation and the most cost effective way to license your Windows Environment.

Feature Description

Windows 8 features

Page 12: Bytes Magazine Spring_Summer 2013

focusonlicensing

12 | spring/summer 2013

As businesses start to permit their users

to Bring Their Own Devices onto the corporate

network there are a number of Microsoft

licensing considerations dependent on the type

of service the organisation wants to allow its

users access to.

Dave PageAccount Manager, Bytes

focus As businesses start to permit their users As businesses start to permit their users As businesses start to permit their users

to Bring Their Own Devices onto the corporate

network there are a number of Microsoft

licensing considerations dependent on the type

of service the organisation wants to allow its

users access to.

A Microsoft Licensing Perspective on BYODAn organisation’s “BYOD journey” usually begins with allowing users access to e-mail over their non-corporately owned device. The extension to this is for businesses to offer users access to corporate applications from their own devices. This staged approach to offering users IT as a service usually culminates in providing users access to a rich and familiar client Operating System Environment from whichever device they choose to login via.

After deciding the level of functionality their users require, organisations then need to consider their users’ primary work device and whether, as a progression of the organisation’s BYOD policy, users will not necessarily have a corporately owned primary device. It may be that users will have to provide their own device whilst the organisation merely provides a virtual desktop image.

Key Considerations to a Staged Approach• Does the organisation have the correct Microsoft Client

Access Licenses [CAL’s] to allow users access to Microsoft Exchange, SharePoint, Windows and SQL Servers from multiple devices?

• Microsoft applications are licensed per device; therefore, in order to present these applications to other devices; do the applications have Roaming Usage Rights that come with active Software Assurance?

• The Desktop Operating System is likely to be an OEM Operating System (ie lives and dies with the device it was pre-installed on) therefore, in order to present an OS instance to other devices; does the OEM have Virtual Desktop Access rights as part of Software Assurance or something called a VDA Subscription?

• Finally, important for Enterprise Agreement customers, will the users have a dedicated primary corporately owned device and will the user be bringing their own device onto the corporate network and using it as a primary work device?

Client Access LicensesClient Access Licenses [CAL’s] are required should a user or device need to connect into a Windows Server, Exchange Server, SharePoint Server, Lync Server or SQL Server (amongst others). The business can select either a per User or a per Device CAL; the former being selected when users have multiple devices and the latter for when numerous users access a single device (Thin Client, Call Centre workers etc.).

Page 13: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 13

In order to effectively plan for a Bring Your Own Device scenario, it’s important that an organisation selects “Per User” CAL’s allowing the user to access the servers from his primary network device and also any device they choose to bring onto the premises or access externally by other methods. User CAL’s increased in price by 15% on the 1st December 2012 (This excludes Government Organisations). This made them 15% more expensive than their Device CAL counterparts.

If an organisation has an Enterprise Wide Agreement (EA, EAS, OVS) then it is possible to switch from Device to User CAL’s upon renewal. If any per Device CAL’s had been purchased on an ad-hoc agreement without SA then unfortunately these would need to be re-purchased or “topped up” to cover the extra BYO Devices under a Per User CAL.

Remote Desktop Services CAL’sAn organisation needs to consider the Remote Desktop Services CAL, on top of the normal set of User CAL’s for Exchange, SharePoint, Lync etc., if it is delivering applications to users over Terminal Services (or presenting applications via such products as Citrix - XenApp/XenDesktop). As with the above, User CAL’s should be selected for the BYOD model. The RDS CAL gives the rights to App-V for RDS (streams applications to RDS/Citrix whilst the user is connected to the network only) and also the rights to deliver a generic Windows Server OS “Skin” to devices that would benefi t from accessing their applications in this way.

Offi ce and other Microsoft Application LicensingAn organisation needs to consider how Offi ce is licensed across the estate, should it be allowing users to either install Offi ce natively on their own devices or will it be allowing users to access their Offi ce applications over application presentation technologies (ie. Terminal Services etc.).

The key point to remember is that Offi ce, as with all Microsoft applications (excluding Offi ce 365), is licensed on a per device basis. Therefore if a users’ primary corporately owned device runs Offi ce, the user cannot simply access this application remotely from any other non-corporately owned devices without considering the licensing implications for the new device they’re accessing it from. For the most part, giving Offi ce Roaming Usage Rights by having SA attached to the desktopapplication will give users the ability to access their Offi ce applications remotely outside the corporate network on non-corporately owned devices.

If the organisation requires staff to install Offi ce locally to a non-corporately owned device, it should either utilise

the Home Use Program (A benefi t of Offi ce licenses, that are purchased with Software Assurance, which allows the primary user of the Offi ce license to purchase a copy of Offi ce to be installed on a home/personal device for £8.95) or purchase an Offi ce Work at Home License under either a Select Plus or Open License Agreement.

Windows Operating System LicensingAn organisation needs to consider the Operating System licensing when offering a truly agile working experience totheir user base; allowing their users to access the samedesktop OS from whichever device they require at any time. This is over and above using the Remote Desktop Services CAL “Server Skin” option to deliver a fully customisabledesktop experience potentially through Citrix XenDesktop or VMWare View. The three sides of this are:-

i) A User has a corporately owned fat client device with a Qualifying OEM Operating System – The OEM OS on this device lives and dies with the device it’s installed on. Therefore, to give the right to access a Virtual Desktop OS from the primary device or from multiple non-corporately owned devices outside the corporate network, the organisation would need to purchase the WindowsUpgrade with Software Assurance.

ii) A User does not have a corporately owned device and is bringing their own – The user requires an OS instance to be available to them, via a Virtual Desktop Solution. In this instance they would purchase the Virtual Desktop Access Subscription for the device.

iii) A User uses a Thin Client whilst in the offi ce and their own device when roaming. – As in (ii) above the user would need to purchase the Virtual Desktop Access Subscription.

An organisation’s individual Bring Your Own Device policies often mean that a tailored approach to Microsoft Licensing Agreements is the best route forward. Hopefully this article has given an insight into the licensing considerations that you may encounter when planning your own BYOD strategy.

information or advice on planning yourBYOD strategy please speak to your Bytes account manager on 020 8786 1500.

need more...

BYOD

Page 14: Bytes Magazine Spring_Summer 2013

focusonlicensing

14 | spring/summer 2013

for a discussion...

Microsoft ECI DatacenterComponents and Value Proposition

ECI Datacenter is strongly recommended for customers exploring Microsoft private cloud solutions.ECI Datacenter edition includes Windows Server Datacenter, which supports unlimited virtualisation rights. This means that customers license on a per processor basis, with ability to have unlimited Windows Server based virtual machines on a particular physical processor. Additionally, ECI Datacenter

also includes System Center 2012 Datacenter edition, which provides rights to manage an unlimited number of physical or virtual operating system environments. The components of ECI Datacenter are shown on the left.

Microsoft’s approach is focused on delivering the benefi ts of scale to you – through unlimited virtualisation rights and signifi cantly simplifi ed licensing for Windows Server and System Center.

Microsoft Private Cloud – Business Benefi tsThe Microsoft Private Cloud is a unique and comprehensive offering, built on four key “pillars”.• All About the App: Application centric cloud platform that helps you focus on

business value.• Cross-Platform From the Metal Up: Cross-platform support for multi-

hypervisor environments, operating systems, and application frameworks.• Foundation For the Future:

Microsoft Private Cloud lets you go beyond virtualisation to a true cloud platform.

• Cloud On Your Terms: Ability to consume cloud on your terms, providing you the choice and fl exibility of a hybrid cloud model through common management, virtualisation, identity and developer tools.

Microsoft offers a private cloud that delivers real value today AND positions a business to take advantage of greater public cloud benefi ts in the future.

Microsoft Enrollment for Core Infrastructure (ECI)

on the Functionality, Benefi ts and Economics of theMicrosoft Private Cloud or the ECI Licensing Agreement, please speak to your Bytes account manager on 020 8786 1500.

Page 15: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 15

information and to discuss your organisation’s suitability for the new Enrollment Application Platform please speak to your Bytes account manager on 020 8786 1500.

fi nd more...

What is the Microsoft ApplicationPlatform?The Microsoft Application Platform is a set of integrated tools and technologies that support innovation by helping organisations maximise the value of their existing applications. It supports the rapid development of new applications and can help you make signifi cant gains in productivity while decreasing total cost of ownership.

What is an EAP?The Enrollment for Application Platform (EAP) is a fl exible, cost-effective licensing program for customers standardising on the Microsoft Application Platform. With the EAP, customers get the latest Application Platform products across their organisation on new and existing deployments with lower up-front costs, and savings of up to 40% on new IT solutions. EAP is a Microsoft Enterprise Agreement (EA) enrollment for customers that want to simplify licensing, help reduce costs, and manage their core infrastructure more effi ciently.

Key AdvantagesEAP customers can manage their application platform server investments from a single enrollment and benefi t from:

Affordable standardisation• Low up-front costs to take advantage of the latest

products• Up to 40% savings on license costs for new deployments.

Rapid adoption of the latest technology• Helps increase employee productivity and return on

investment through Software Assurance benefi ts including 24x7 Problem Resolution Support and Training benefi ts

• Ability to deploy on your schedule with unlimited deployment rights for Application Platform products across the entire organisation

• Eligible customers with qualifying Software Assurance may also qualify for Unlimited Problem Resolution Support.

Flexible purchasing model• Licensing model with either an annual or three year True up• Predictable costs with fi xed payment for life of the term

with the three-year True up model.

An EAP Licensing Agreement will help you manage and save costs

Time to standardise on the Microsoft Application Platform?How the Program Works

Step 1.select the products you want•Oneormoreproductswithminimuminitialpurchaserequirement•Establishyourintialfootprintbasedonyourcurrentinstallbase•100%SoftwareAssurancecoverageonfootprintforincludedproducts.

Application Platform Products:

Step 2.Receive the latest version of products•Includeproductsonly•PriceoflicensedeferredindefinitelyonunitsnotcoveredbySoftwareAssurance

onyourintialfootprint,aslongasyouremainintheprogram.

Step 3.Deploy unlimited incremental units•Newincrementalunitsreceivepricesavingsonlicensecost•Trueupannuallyorattheendofyourthree-yearterm.

Step 4.Choose the best true up option•Newincrementalunitsreceivepricesavingsonlicensecost•Trueupannuallyorattheendofyourthree-yearterm.

13

One-Year True up•SimilartotheEnterpriseAgreement•Incrementallicensespurchasedannuallyreceivepricesavings•Pricesavingsonnewlicenses-40%onPremiumEdition;

15%onStandardEdition(Licenseonly).

Three-Year True up•FixedpaymentswithgrowthandPremiumEditionmixbuiltin•Attheendofthethree-yearterm,purchaselicensesatcost

savingsforunitsabovecommitment•Pricesavingsonnewlicenses-40%onPremiumEdition;

15%onStandardEdition(Licenseonly).

Up to 40% saving onlicense costs

Enrollment forCore Infrastructure

(ECI)

Microsoft Enrollment for Core Infrastructure (ECI)

Enrollment forApplication Platform

(EAP)

Page 16: Bytes Magazine Spring_Summer 2013

licensing

Microsoft

16 | spring/summer 2013

for Windows XP andOffi ce 2003In 2002 Microsoft

introduced its Support

Lifecycle policy based

on customer feedback to

have more transparency

and predictability of

support for Microsoft

products. As per this

policy, Microsoft Business

and Developer products,

including Windows and

Offi ce products, receive

a minimum of 10 years

of support (5 years

Mainstream Support and

5 years Extended Support),

at the supported service

pack level.

ending support

Page 17: Bytes Magazine Spring_Summer 2013

What does this mean to your business?After April 8, 2014, there will be no new security updates, non-security hotfi xes, free or paid assisted support options or online technical content updates.

Running Windows XP SP3 and Offi ce 2003 in your environment after their end of support date may expose your company to potential risks, such as:

• Security & Compliance Risks - Unsupported and unpatched environments are vulnerable to security risks. This may result in an offi cially recognised control failure by an internal or external audit body, leading to suspension of certifi cations, and/or public notifi cation of the organisation’s inability to maintain its systems and customer information.

• Lack of Independent Software Vendor (ISV) & Hardware Manufacturers support - A recent industry report from Gartner Research suggests “many independent software vendors (ISVs) are unlikely to support new versions of applications on Windows XP in 2011; in 2013, it will become common.” And it may stifl e access to hardware innovation: Gartner Research further notes that in 2012, most

PC hardware manufacturers will stop supporting Windows XP on the majority of their new PC models.

Get current with Windows 7 or 8 and Offi ce 2010 or 13. This option has upside well beyond keeping you supported. It offers more fl exibility to empower employees

to be more productive, while increasing operational effi ciency through improved PC security and management. It also enables your organisation to take advantage of latest technology trends such as virtualisation and the cloud.

How will Microsoft help customers?Enterprise Customers - Microsoft offers large organisations in-depth technical resources, tools, and expert guidance to ease the deployment and management of Windows 7 and 8, Internet Explorer 9, and Offi ce 2010 and Offi ce 2013. To learn more about migration and deployment programs, please speak to your Bytes Account Manager.

Small to Medium Business - There are many options for small and medium businesses considering moving to a modern PC with the latest productivity and collaboration tools. If your current PCs meet the system requirements for Windows 7 (listed below), you can buy Windows 7 Professional by contacting Bytes.

Windows 7 System Requirements

• 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor

• 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)

• 16GB available hard disk space (32-bit) or 20GB (64-bit)

• DirectX 9 graphics device with WDDM 1.0 or higher driver

If your PCs do not meet system requirements, consider purchasing a new business PC with Windows

Professional. If you’re ready to upgradeyour productivity software, consider Offi ce Professional 2010.

Get a customised IDC report on migrating from Windows XP to Windows 7: Mitigating Risk - Why Sticking with Windows XP is a Bad Idea. Enter this url http://bit.ly/XPreport into your browser, answer a few questions about your organisation and receive your tailored dynamic white paper.

To discuss your requirements in more detail, speak to your Bytes Account Manager to understand the best options to meet your business needs. Our specialists can assist you with everything from procuring the licensing, migration planning, project management and (if required) staff training on new software iterations.

www.bytes.co.uk | 17

information and best options to meet your business needs, please speak to your Bytes account manager on 020 8786 1500.

for more...

Windows XP SP3 and Offi ce 2003 will go out of support on April 8 2014. If your organisation

has not started the migration to a modern PC, you are late! Based on historical

customer deployment data, the average enterprise deployment can take 18 to

32 months from business case through full deployment. To ensure you remain on

supported versions of Windows and Offi ce, you should begin your planning and

application testing immediately to ensure you deploy before end of support.ending support

Page 18: Bytes Magazine Spring_Summer 2013

Software

Licensing

Bytes

Class of 1982

Since 1982bytes.co.uk

We,ve loved software licensing since the beginning

Bytes magazine adverts x3.indd 1 27/02/2013 11:50

Page 19: Bytes Magazine Spring_Summer 2013

portal

I fi nd the Bytes Portal extremely easy to use, I mainly create orders or convert quotes to an order and the process is faultless. When I request a quote for software the response is very quick and orders are always processed straightaway. I wish all portals were the same!

It enables you to manage and track the

entire life cycle of your software assets

from point of purchase to decommission.

It has a unique and customisable

intelligence, as well as real data/views

that will help simplify the administration

of your global software licensing estate.

Below are some of the key functions of

the Portal:

On line Ordering

The Bytes Portal gives you direct access

to your current agreement information

and pricing tailored to your specifi c

contract parameters. Our product

search facility helps you quickly fi nd the

items you need and create quotations,

email these quotations to other people

in your organisation and easily convert

them to orders. The Portal offers

customisable views and access rights

so that components, for example the

ability to place orders, can be included or

excluded for specifi c users.

Manage Contracts and Renewals

The Portal offers a full contract

management system which you can use

to manage all the contracts and software

licenses in your estate. You can upload

your own data and documentation

for any type of contract across your

organisation. The Portal fl ags contracts

and licenses at 90, 60 and 30 days

prior to renewal or expiry and can be

confi gured to send reminder emails at

these intervals.

Discover and Manage Assets

The Bytes asset management service

provides you with the ability to actively

manage your organisation’s software

license and compliance positions.

Bytes

This modular service is designed to

deliver cost reductions by rationalising

support and maintenance contracts and

ensure cost avoidance through license

re-harvesting and contract renewal

management.

Manage Learning

Our online learning portal offers services

ranging from simple online booking

of a wide range of popular training

courses from many training providers,

to bespoke solutions developed for

your organisation. You can publish and

manage your own in house training

programs and curriculums and monitor

course registration, budget approval and

attendance.

Service Desk

The Portal service desk helps you

manage all of your communications with

Bytes sales, technical and administration

teams. It enables you to log and monitor

requests online which go directly to the

relevant personal with Bytes. The Service

Desk can be used as an auditable

way of tracking how Bytes and your

organisation are interacting and how

we are delivering against Service Level

Agreements (SLA’s) and response times.

Portal Development Services

Our Portal development services enable

secure seamless communication and

navigation between your own back

offi ce systems and the Bytes Portal. Our

in-house team have the skills to develop

and support solutions

to integrate with

your systems.

Gayle Core - Specsavers

about the Bytes Portal or to set up a user account, please speak to your Bytes account manager who will arrange this for you.

learn more...

BytesportalThe Bytes Portal brings together all elements

of your software estate into one system.

Emma MagalhaesBytes Portal Manager

www.bytes.co.uk | 19

Page 20: Bytes Magazine Spring_Summer 2013

BYOD

20 | spring/summer 2013

&WORKING

Our Flexible Working and BYOD

Seminar at the National Theatre, South

Bank, London was a great opportunity

for many of our customers to hear from

industry presenters and speak

directly to key software vendors

on the hot issues surrounding

Bring Your Own Device.

BYODBYOD

Page 21: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 21

Our aim was simple: to identify the true benefi ts to be gained from the Consumersation of IT and how these could translate to the enterprise to provide greater innovation, a better work-life balance and real world improved productivity.

Here is a selection of the best solutions on offer from our strategic partners:

ZenpriseWith cloud-based and on-premise offerings, Zenprise lets you secure and manage the most comprehensive array of mobile devices, gain visibility into and control over mobile apps, and shield the corporate network from mobile threats. Zenprise makes BYOD management simple with:• Security for your mobile enterprise,

across devices, apps, the network, and data;

• The most intuitive and easiest-to-manage MDM solution in the market;

• An enterprise-grade architecture, with security built in and high availability at all tiers;

• The most comprehensive global services, support, and training among all MDM vendors; and

• Flexible deployment options: On-premise, cloud, or hybrid solutions.

In addition to helping you manage and secure personally-owned devices, Zenprise brings you a toolkit to help you along the way, featuring the following services, tools, and advice:• Zenprise Rogue Mobile Devices

Assessment. A no-cost, no-install assessment to identify unmanaged mobile devices on your corporate network

• Zenprise BYOD Policy Template. A free starter policy with all of the considerations for building a policy for employee-owned devices

CloudGatewayThis enterprise mobility management solution securely delivers mobile, web and Windows® apps and data to any device. It empowers employees with a self-service enterprise app store that provides access to business apps and data, leveraging the consistent, rich user experience of Citrix Receiver. CloudGateway also provides identity-based provisioning and control for

all apps, data and devices, including employee-owned devices.

Key Benefi ts• Embrace BYO to provide seamless

on-the-go productivity on any device• Provide instant

access to all apps and data from anywhere

Citrix CloudGateway

Here is a selection of the best solutions on offer

We discussed…• Transforming desktops to managed user workspaces • Mobile device management• Virtualising and securely delivering enterprise applications • Network security, data loss and employee privacy • Designing a BYOD policy that meets legal obligations • Licensing a multi-device environment.

• Deliver secure mobile email with a great user experience

• Mobilise any corporate app securely with full IT control.

• Zenprise Enterprise Mobility Executive Checklist. A checklist for technical and non-technical executives to help them guide their organizations to successfully roll-out a BYOD program

• Zenprise Security Framework and Whitepaper. A whitepaper that offers enterprise mobility professionals a framework for ensuring mobile security, as well as a “top 10” requirements list for mobile security evaluators

• Zenprise BYOD Service. Zenprise post-sale professional services help customers plan, design, and implement mobile programs, including BYOD, tailored to their needs and requirements.

BYOD

cont...

Page 22: Bytes Magazine Spring_Summer 2013

BYOD

22 | spring/summer 2013

RES Virtual Desktop Extender (VDX) gives you the unique ability to seamlessly enhance remote and virtual desktops with applications that run locally, making use of the underlying processing power, graphic capabilities and peripherals of the local computer. These applications are merged into remote or virtual desktops seamlessly - side-by-side remote applications in a single desktop experience. Using VDX, you can deliver a single workspace for end users, while optimising the local computing resource on an application-by-application basis. For your end users this means increased productivity, as they no longer need to switch between sessions on the remote and local desktop.

by-application basis. For your end

Good for Enterprise delivers an integrated, intuitive user experience that allows employees to access corporate email, documents, contacts, calendar, tasks and the Intranet from any device. Good for Enterprise delivers:

Exceptional user experienceGood for Enterprise lets employees take care of business when and where they want. Quickly compose emails, review documents, manage your contacts, schedule meetings, access the Intranet and much more. An optimal user interface ensures that little training or IT intervention are necessary.

End-to-end securityProtect corporate data in use and at rest on the device through a secure container that separates business

How Many of Your Applications Just Don’t Virtualise Well? Common examples include:• AutoCAD• Photoshop• Financial modelling applications• Trading desks• Diagnostic imaging• Multimedia (AVI) fi les• CD/DVD applications• VoIP• Video conferencing.

Key Benefi tsVDX is patented and proven technology with many benefi ts for your organisation:• Integrates local application in a

remote desktop (hosted/VDI)• Simply installs without confi guration• Automatically populates local start

menu and local desktop• Eliminates need to switch between

local and remote desktop• Creates new user experience by

using best of both worlds• Works with all types of remote

desktops.

Virtual Desktop Extender (VDX)

data from an employee’s personal information. Ensure consistent security policies across disparate mobile platforms and prevent data loss by disabling data sharing with other non-secure applications. It’s an easy way to secure your corporate network with a NOC-based architecture.

Integrated device and application managementTake control over your mobile deployment through a web-based console. Not only will you gain

tremendous visibility, you’ll be better equipped to enforce security policies (like password requirements and jailbreak/rooted device detection) and manage secure 3rd party and internally developed applications.

Good for Enterprise is designed to integrate with Good’s Secure Collaboration tools to deliver seamless, secure mobile workfl ows that drive employee collaboration and productivity.

Good for Enterprise

Page 23: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 23

App Center 4.0Symantec App Center (formerly Nukona) has been designed to make it easy for IT to manage app-centric mobile deployments. With functionality to address the complete lifecycle management of apps and content, from distribution to protection to management, Symantec App Center addresses the needs of all IT stakeholders - enterprise application architects, application developers, information security teams and operations teams.

Key Features• Application & Content

Management: App Center allows drag-and-drop app and content deployment, intuitive administrative web portal user interface, on-boarding with email invitations, notifi cation of updates, customised access with tiered privacy controls and integration with enterprise identity and access management systems.

• Application & Content Protection: App Center allows administrators to enforce policies like user authentication, re-authentication, data encryption (FIPS 140-2

certifi ed) as well as restrictions on local storage access, off-line access, document sharing and copy/paste. Administrators can also remote wipe specifi c applications and content from compromised devices using this mobile application management solution

• Mobile Device Management: From the central console, Administrators can perform and enforce MDM actions like lock / wipe / ping / dissociate device, limit device functionality and set/reset password complexity rules.

Key Benefi ts• Support BYOD without

compromising security: Gain all benefi ts of user satisfaction and capital cost reduction without sacrifi cing corporate security or end user privacy. Apply policies on corporate data without monitoring personal apps and data

• Mobile Enterprise Apps and Data: App Center allows effi cient distribution of apps to employees and other authorised users with appropriate corporate security and corporate branding wrappers.

Apps and data can be revoked quickly and securely when employees leave or devices are no longer active

• Security without source code changes: Enterprises can wrap a layer of security and policy management around any mobile app, without any source code changes or SDK embedding

• App developers don’t need to be profi cient in mobile security: Enterprise application development teams can focus now on what they do best without concerning themselves about security implementations like authentication, key management and data loss prevention. All the security features are added post-development in the App Center.

Symantec O3Is a cloud information protection platform that provides context-based access control, information security and information management “as a service” for users of cloud applications and services. It supports any endpoint, including mobile. It provides compliance information for access and information events that supports audits and forensics.

Key Features• A single point of control for identity

and access control, and related policies, for cloud apps for all endpoints

• Easy integration with existing identity stores, with various cloud app authentication and a simple cloud single-sign on for user

• A single source for the logging of access and security events to support compliance.

Key Benefi ts• Helps organisations embrace the

business agility and cost advantages of the cloud.

• Implementation and maintenance convenience for IT, cloud access convenience for users

• Enables effective response to the demands for cloud policy audits and forensics.

cont...

Page 24: Bytes Magazine Spring_Summer 2013

BYOD

24 | spring/summer 2013

The McAfee EMM solution simplifies mobile networking. Their approach blends mobile device management with policy-managed endpoint security, network access control, and compliance reporting in a seamless system. This platform integrates smartphones and tablets into enterprise networks and security management with the same level of security protection, convenience, and scale enjoyed by laptops and desktops.

Key Benefits• Provides device choice• Supports Apple iOS, Google

Android, Microsoft Windows Phone, and RIM BlackBerry smartphones and tablets

• Mobilises enterprise applications.

Reduces risk• Protects sensitive corporate data

with policy-based security, remote lock and wipe, and optional PKI and two-factor authentication

EMM

Xerox mobile printing capabilities make it easy to print email messages, presentations, images and any Microsoft Office documents virtually anytime, anywhere within your organisation. With Xerox Mobile Print Solution, the value added service supports both Xerox® and non- Xerox® print devices and is compatible with any email enabled mobile device. They leverage your established email infrastructure and the existing mobile device platforms, requiring very little time from your IT organisation to implement or support the solution.

Key Benefits• Makes printing from your mobile

device to the enterprise as easy as sending an email, helping to create a more productive virtual workforce

• Blocks unauthorised or modified devices like jailbroken Apple iPhones and rooted Android devices

• Allows administrators to tag and assign policy for user- and business-owned devices

• Enables regulatory compliance and IT audits and centralised reporting

• Supports one-time password functionality for iOS and Android devices.

Lowers total cost of ownership• McAfee® ePolicy Orchestrator®

(McAfee ePO™) software integration• Leverages existing IT infrastructure,

including Wi-Fi, VPN, directories, and PKI

• Simplifies and automates user support with an enterprise app store, user self-service, and help desk tools

• Automates help desk functions with REST web services implementation.

Mobile Print Solution• Enables fast and easy printing to

any Xerox® or non-Xerox® network printer

• Extends your organisation’s governance for print, supplies use and break/fix services

• Enables greater operating savings through increased visibility and management of your remote and mobile workers print spend

• Reduces IT incidents and support costs by providing the mobile workforce with automated tools and capabilities

• Incorporates your remote and mobile workers into your enterprise sustainability initiatives

• Gains insight, control and manageability of print across your virtual enterprise.

Page 25: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 25

In addition to solutions for encrypting data on mobile devices and removable media, Check Point has solutions to deliver advanced SSL VPN connectivity and encryption technology to protect against mobile security threats as users connect to the corporate network – anytime, anywhere.

your BYOD strategy? Let our specialist divisions across Software, Security and Document Solutions provide youwith the right answers for your mobile business – visit www.bytes.co.uk/contact to select the right team.

enhance...

Mobile Access Software Blade

Websense® TRITON™ Mobile Security (TMS) combines four key elements for a highly effective, unifi ed mobile security solution: content-aware data security, industry-leading web security, malicious app protection, and mobile device management (MDM).

Websense TMS enables the safe and secure use of mobile devices in your organisation. Its data-aware defences

The Check Point Mobile Access Software Blade brings customers an intuitive business portal that allows secure connectivity to their intranet, corporate email and web applications. With certifi cate-based authentication and smart user-device pairing, businesses can ensure each individual has access to their authorised applications, just as they would from their desktop. This helps IT administrators centrally manage security policies and applications,

while end-users benefi t from fast, secure access with single sign-on authorisation.

As part of the solution, users can download Check Point’s Mobile application for secure, one-touch access directly from mobile devices running on Apple, Android, Symbian and Windows PC platforms. The process of protecting user’s personal devices is as easy as downloading a game.

Triton Mobile Security (TMS)

View our BYOD customer event at www.bytes.co.uk/BytesTV

protect against data loss and the theft of intellectual property. MDM features let you control mobile devices to keep them secure, minimise risk and maintain compliance. It extends your web security policies to mobile devices when they are used outside your corporate network on 3G/4G and wireless networks you don’t own. And you get real-time contextual security provided by Websense Advanced

Classifi cation Engine, the technology that powers all TRITON security solutions.

Websense® TRITON™ Mobile Security is an ‘in-the-cloud’ solution that eliminates the need to invest in additional hardware or infrastructure, and it operates separately or as part of a unifi ed Websense TRITON web, email and data security deployment.

enhance...

Page 26: Bytes Magazine Spring_Summer 2013

virtualisation

Monitoring is an important function in any IT department to ensure that you keep your systems up and performing well at all times. Any outage or slow down in performance can have a fi nancial impact on the business, so it is key to proactively monitor the infrastructure for potential issues in order that you can act before the events occur. Unforeseen events will happen, but being able to pinpoint potential issues quickly and act in the appropriate way will lead to faster resolution times and minimised disruption to the business. We see our customers doing this in a variety of ways.

Being a large Microsoft partner we have many customers that have invested heavily in System Centre Operations Manager (SCOM) across their business to keep a consistent view of activity. SCOM is a large tool and requires a sizable investment, both on the fi nancial and integration side. To utilise this investment to the maximum, we have helped many customers by adding management packs to allow them to extend SCOM’s view in to other areas, such as VMware and Citrix.

We are also seeing a large uplift in adoption of other monitoring technologies including the likes of vCentre Operations Manager from VMware, Veeam One, VMTurbo and many others. As one customer’s needs are not always the same as the next and there are many variables to consider, we work with a host of vendors in this space to make sure

that we have a solution for all needs instead of pigeon holing customers based on what a particular vendor has to offer. We have found that this is well received by our customers and best practice in the virtualisation arena.

Capacity Management is becoming a growing driver that we see from the smallest to largest clients Bytes work with. There has, for a long time, been talk of VM Sprawl and this is something key to get under control but a problem that is often even larger is the need to right size VMs. We consistently see VMs being built for the peaks as was a necessity in a physical world, but with the dynamic ability and fl exibility of virtualisation this is no longer the case and the savings that our clients are realising just by carrying out a right sizing exercise on their estates is astonishing. Whether the savings are derived from servers, storage or licensing, they quickly add up fast and remain consistent.

Disaster Recovery (DR) for virtualised environments is becoming an increasingly talked about issue. Utilising existing and new tools within the virtualisation space can actually give you the fl exibility to put a working plan & infrastructure in place and ensure it works if and when required. Many companies that Bytes have worked with over the years had little or no DR strategy in place, a system that lacked constant testing due to

26 | spring/summer 2013

The hot topics and trends that we are seeing in our Virtualisation clients are pretty consistent when you look across the vertical markets and they all relate to control and effi ciency. The main areas are Monitoring, Capacity Management, Disaster Recovery, User Profi le Management and Self-serving / Automation.

Our expert, Matt Gallick talks

about the latest trends in Virtualisation

virtual

Monitoring is an important function in any IT department to that we

about the latest trends in Virtualisation

Page 27: Bytes Magazine Spring_Summer 2013

it may be. All of these allow you to give your users the fl exibility to work how they want to without compromising on how you wish to run your business and protect your data. Another key area we see here is being able to control applications that are licensed per device, to ensure that you remain compliant with vendors such as Microsoft, without having to license an entire estate on very costly software that may only be relevant to a select number of users.

Self-Serving and Automation is fast becoming the “must do” within organisations. Whether it be a small company with little or no IT team or a large company that has a growing multitude of responsibilities but not a growing team, again effi ciency can drive cost saving.

Linked in to the previous paragraph on users and the evolving ways they are working, a few of the larger vendors in this space have built self-service style portals, such as Citrix, VMware and RES. These allow users to have a central place to access their desktop and applications but also a place to request new resources and applications when they require them. This means that you can deploy a lean desktop image and then let the users pull in additional applications as they are required instead of giving all applications to all users as a standard. Cost savings can be found here on software as well as time saving driven by the self-serve style. You can set

policies that dictate what types of users are allowed specifi c application sets, and you can even have an automated approval process that will ask either a manger or member of IT before deploying the application, based on your preferred rules.

The fi nal talking point here is the automation of general IT tasks to save time and again, cut costs associated to this. One of the more popular examples here is the on-boarding and off-boarding of users. In most of our customers we fi nd that many departments and members of staff need to be involved in these processes and it can take a rather long time to complete. Using automation you can make this a seamless and fast process with little intervention needed. As an example you could give a simple form to human resources that asks for the user’s name, job title, offi ce and mobile number - the system can then set about creating an active directory account, mail box, add them to the relevant distribution groups and fi le shares, whatever it is that you require your users to have. All this is driven by the pre-defi ned rules that you put in place. The cherry on the top is linking back to the self-service that will allow the user to request any additional applications, printer access etc. that they feel they need to complete their job. These are brilliant tools that can work in any environment and speed up almost any task that is taking up time in your IT department.

www.bytes.co.uk | 27

We consistently see VMs being built for the peaks as was a necessity in a physical world, but with the dynamic ability and fl exibility of virtualisation this is no longer the case and the savings that our clients are realising just by carrying out a right sizing exercise on their estates is astonishing.

time and budget constraints or worst

of all, a plan that wasn’t believed in if DR was invoked.

We have seen a surge of virtualised customers looking to the likes of VMware Site Recovery Manager (SRM) and VirtualSharp to get a cost effective plan in place that they can actually test during the working day with no disruption to the systems and staff. The money that can be saved by not needing staff out of hours to test their DR plan actually can contribute massively to the cost of the new tools; not to mention the peace of mind knowing that systems will come back up if there was ever a need. Most of these tools are licensed on a per VM basis, which gives you the ability to cherry pick which VMs you cover and also works well if you want to look at a phased approach, starting with Tier 1 applications, and then rolling out further if required.

User Profi le Management is probably the main talking point within my customers on the desktop side at the moment. With ever evolving desktop strategies, BYOD policies and the “should we shouldn’t we?” question of VDI - being able to manage the environment and giving the users not just the experience that they are used to but also the experience relevant to what they are doing is key. Whether that be when moving from a PC to an iPad and making sure users have all their relevant applications, or making sure that they can only see and do what you want them to, based on the device they are using, location they are logged in form, or the time of day

your virtualised environment, please call your Bytes account manager on 020 8786 1500.

to discuss...

time and budget constraints or worst

of all, a plan that wasn’t believed in if DR was invoked.

We have seen a surge of virtualised customers looking to the likes of VMware Site Recovery Manager

Page 28: Bytes Magazine Spring_Summer 2013

virtualisation

Cloud-based services such as DropBox, Apple’s iCloud and Google’s Drive are changing the way data is stored and shared, but for enterprises they also mean a loss of control over how and where content is stored. Citrix is aiming to change that with the introduction of ShareFile with StorageZones, designed to allow enterprises to meet compliance requirements while optimising performance by storing data close to the user.

Understanding Citrix ShareFile architectureThe high-level architecture of ShareFile consists of three components: the client used to access the ShareFile service; the control plane; and the StorageZone, which can include customer-managed StorageZones,

Citrix-managed StorageZones, or both. Clients communicate with both the control plane and the storage plane, and the control plane and the storage plane communicate with each other, but customer files never travel from the storage plane to the control plane.

The ShareFile ClientsUsers access the ShareFile follow-me data service through a mobile app, native desktop client, virtual desktop, Citrix Receiver, a web or mobile browser, or directly through the ShareFile API. These clients communicate with both the control plane and the StorageZone.

The ShareFile Control PlaneHosted in Citrix datacenters and managed by Citrix as a service, the ShareFile control plane performs tasks such as web application management, pushing updates and reporting.

28 | spring/summer 2013

Citrix ShareFile is an

enterprise, follow-

me data solution that

enables IT to deliver

a secure and robust

service that meets

the mobility and

collaboration needs

of all users.

Citrix ShareFile, Enterprise Edition

sharestoresyncsecure&files on any

device,

anywhere

Page 29: Bytes Magazine Spring_Summer 2013

Customers can choose between the US control plane or the European control plane to address performance and compliance requirements.The control plane does not store user fi les, user data or corporate data. All traffi c from a client device, the web interface or a native tool connects to the control plane using 256-bit SSL encryption.

The StorageZonesStorageZones are where actual customer fi les are hosted. Citrix-managed StorageZones are hosted in Amazon Web Services (AWS) datacenters around the world. The actual storage servers run on Amazon EC2, while the backend storage resides in Amazon S3. Files are stored with AES 256-bit encryption at rest.

With on-premise, customer-managed StorageZones, IT can place data in the organisation’s own datacenter to help meet unique data sovereignty and compliance requirements while optimising performance by storing data in close proximity to the user. Designed to support any CIFS-based network share, customer-managed StorageZones can be easily integrated with your existing infrastructure. Client connectivity and communication are the same as with Citrix-managed StorageZones; no customer fi les travel through the control plane.

You can also choose a mix-and-match option where some fi les reside in your own datacenter and others are hosted in a Citrix-managed StorageZone.

User LicensingAvailable as Citrix-managed and Customer-managed licenses.

• Customer-managed StorageZones – Perpetual or annual licensing option that does not include Citrix-managed Cloud Storage.

• Citrix-managed StorageZones – Annual licensing option that includes off-premise, Citrix-managed Cloud Storage entitlement with options starting from 1 GB to meet your unique storage needs.

www.bytes.co.uk | 29

on Citrix solutions and licensing contact yourBytes account manager on 020 8786 1500.

further info...

Bytes is a Citrix

Gold SolutionsAdvisor

• Empower users with instant access to data in sync across all of their devices

• Improve collaboration and business productivity through secure fi le sharing with people inside and outside the organisation

• Meet corporate data security and compliance standards via a secure service that provides the fl exibility to store data on or off premises, or both

• Deliver an enterprise-class service that seamlessly integrates with the existing IT environment while delivering rich features and experience to support mobile workstyles

• Deliver a managed service that helps IT retain control over the way corporate data is accessed, stored and shared

anywherekey benefits

Page 30: Bytes Magazine Spring_Summer 2013

virtualisation

With Horizon Application Manager, IT gains fl exibility and reduces the cost and complexity of application management. End users gain easy, on-demand access to applications on their preferred devices whenever they need them, increasing their productivity and simplifying their overall experience.

Horizon Application Manager works by centralising and applying enterprise policies to application management.

You can standardise how, when and to whom you provide end-user applications. IT can unify management of SaaS, Web and Windows applications through the Horizon Application Catalog and securely deliver those applications to end users on their devices of choice.

Horizon Application Manager also provides a cloud identity service layer for securing managed access to Windows, SaaS and Web-based

applications. IT managers use a Web-based centralised management tool to provision applications to end users. The identity-and access-management (IAM) technology in Horizon Application Manager extends your enterprise directory user profi les securely into the cloud, unifying each user’s identities into a single cloud identity. This increases security for SaaS and Web-based application usage for the enterprise. In addition, managers control user-access policies and can track application-license activity centrally via usage reports.

Finally, Horizon Application Manager includes VMware ThinApp®, which simplifi es the management of

Windows applications and reduces the cost and complexity of delivery. This agentless application-virtualisation solution isolates applications from the underlying operating system and from other applications to eliminate

introducing

30 | spring/summer 2013

VMware® Horizon

Application Manager™

is a cross-platform

management solution

that unifi es, secures

and controls access to

software-as-a-service

(SaaS), Web and

Windows applications

for end-user devices.

Application Manager from VMware

Page 31: Bytes Magazine Spring_Summer 2013

you can provide access to Windows applications from

the Horizon Workspace. This makes it easier than ever to add

or remove end-user access. IT gains the control it needs to provide the right Windows applications to the right workforce.

Helping You Manage Usersand UsageAdministrators can enable access by users, groups and roles and can generate holistic reports to determine the who, what and where of application usage. This simplifi es management, improves the security of application access and helps the organisation optimise license purchases.

How to Manage an Increase in ApplicationsIts IAM technology applies a single federated cloud identity tied to your enterprise directory services to unify the silos of user identities used for each application. This increases the security of your SaaS and Web applications and simplifi es the user

login experience. Select from a predetermined list of certifi ed SaaS applications or upload your own SaaS or Web based application via the Horizon application-management tools.

Solving Security Issues When Working in Both Private and Public CloudsNow you can control which users have access to which applications in both the public and private cloud. For example, with the click of a button you can ensure that a user’s application access has been removed. This takes the guesswork out of the discovery process, security auditing and compliance.

Implement in DaysBecause you can deploy Horizon Application Manager on virtual appliances based on VMware vSphere®, you can implement it in days, compared to weeks or months for other solutions. For both onsite and private cloud confi gurations, Horizon Application Manager deployment is fast and simple.

www.bytes.co.uk | 31

you can provide access to Windows applications from

the Horizon Workspace. This makes it easier than ever to add

or remove end-user access. IT gains the control it needs to provide the right Windows applications to the right

on Horizons and other VMware solutions contact your Bytes account manager on 020 8786 1500.

further info...

Bytes is one of the

fastest growing VMware Premier

Partners

application confl icts. Through Horizon Application Manager, organisations can streamline the delivery and management of ThinApp applications.

Benefi ts To Your OrganisationFor companies of any size, Horizon Application Manager gives end users the convenience of a self-service workspace and access to a corporate application store. At the same time, it provides simplifi ed IT governance, visibility into end-user’s activity, life-cycle management and control. End users get a simple, secure login experience. This lowers security risks, reduces help-desk issues regarding lost and weak passwords, and dramatically lowers the cost of ownership of SaaS and Web-based applications.

Support for Windows ApplicationsA Horizon Application Manager includes VMware ThinApp. With integrated centralised management,

Page 32: Bytes Magazine Spring_Summer 2013

?storage

32 | spring/summer 2013

WindowsWhat is

Azure???The Windows Azure Platform is an open and

fl exible cloud platform that enables you to

quickly build, deploy and manage applications

across a global network of Microsoft-managed

datacenters. You can build applications using

any language, tool or framework. And you can

integrate your public cloud applications with

your existing IT environment.????e???e?

Page 33: Bytes Magazine Spring_Summer 2013

?www.bytes.co.uk | 33

with Integrated Cloud Storage solutions, please contact your Bytes Account Manager or the Bytes Cloud team on 020 8786 1500.

need help...

Bytes has helped over

30 customersimplement a

Windows AzurePlatform

Background:AlargeUKcouncilneededtostorelargequantitiesofdatawhichwouldbeaccessedfromtimetotime.Implementingde-duplicationanddisasterrecoverywhilstreducingoverallITspendhasprovidedafamiliarchallengethatmostorganisationsface.

experience with storsimple:AfterseeingthedemonstrationofStorSimple,thecustomerrealisedthattheycouldaccomplishalloftheirgoalswhilstreducingITcomplexity,allwithintheirbudget.ByimplementingaStorSimpledeviceateachoftheirdatacentres,theCouncilwillbearchivingsnapshotsandsystemimagestoMicrosoft’sAzureenvironment.Byeliminatingtheneedforbackuptapesandtapearchivalsolutions,theITteamwillbeutilisingCloudforsystembackupsandrestores.Thissolutionwillnotonlybesavingontimeandmoney,butwillbegreatlysimplifyingthebackupandrecoveryprocess.

Reasons for Choosing storsimple:TheITteamlookedattraditionalSANsolutionsbutrealisedthattheywouldneedtopurchase18traysofhardwareplustheadditionalsupportinfrastructure.Apartfromadditionalrackspace,theteamhadtofactorinthemaintenanceandsupportcostsoftheadditionalhardware.ThechosenStorSimplesolutionprovided10Tbofon-premisestoragewithanadditional125TbofCloudstoragewithina2RUformfactorforafractionoftheequivalentSANsolution.? Hosted AD Federation Services

How Does Azure and StorSimple Reduce Storage Costs by 60-80%?Growth in enterprise data and disconnected data management approaches are causing increased cost, risk and ineffi ciency. The StorSimple solution consolidates primary, archive, backup and disaster recovery data management using a single appliance that seamlessly integrates with Windows Azure and provides military grade encryption. The StorSimple solution consists of StorSimple software running on appliances built and distributed by Xyratex.

OFFICE365 Hosted AD Federation ServiceThis year will see many companies move into a hybrid cloud model as IT departments dip a toe into the cloud. What many people found in 2012 was that this hybrid deployment model introduced a new set of complexities to the on premise environment in the form of servers running Active Directory Federation Services (ADFS) for single sign on to cloud based applications like Offi ce365.

However, if the internet link to the datacentre was lost then while the cloud mailboxes were still running, without access to the ADFS server, users couldn’t login to their mailboxes to get access. Having cloud services depending on the on premise servers made very little sense to a company that was looking for a true cloud experience.

This problem led to the building of a platform we named ‘Aurora’. Aurora is built on the Windows Azure hosting platform and leverages encrypted VPN connections back to the on premise environment for data transfer. We put a read only Domain Controller in Azure along with the ADFS server and ADFS proxy.

What is Bytes doing with Azure?Bytes has developed a Cloud Platform that is based on Azure but with added services and confi gured for specifi c tasks such as Dev/Test, DR, Hosting, Single Sign On and other services to help customers adopt Cloud by utilising our extensive experience gained from over 30 customer implementations. Aurora forinstance, is one of those services hosted on the BytesCloud platform.

Bytes case study

Page 34: Bytes Magazine Spring_Summer 2013

storage

NetApp: The Foundation of Microsoft Private CloudThe scope, scale, and complexity of today’s data-driven world create new demands in the data center. NetApp infrastructure optimises storage management at scale and thus enables rapid response to business opportunity.

Our sophisticated storage and data management software integration with Microsoft provides a strong foundation for a Microsoft Private Cloud, built on Windows Server 2008 R2 Hyper-V and System Center 2012.

34 | spring/summer 2013

the Promise into

NetApp for Microsoft Private Cloud

RESULTS

enables rapid response to business opportunity.

Our sophisticated storage and data management software integration with Microsoft provides a strong foundation for a Microsoft Private Cloud, built on Windows Server 2008 R2 Hyper-V and System Center 2012.

management at scale and thus enables rapid response to business opportunity.

Our sophisticated storage and data management software integration with Microsoft provides a strong foundation for a Microsoft Private Cloud, built on Windows Server 2008 R2 Hyper-V and System Center 2012.

Cloud computing

has become a reality.

The cloud model

delivers on-demand

and secure access to

pools of IT resources,

empowering

companies to increase

fl exibility and

effi ciency while cutting

capex and opex.

the Promise into

Key Features

The combination of NetApp storage with Microsoft Private Cloud, featuring Microsoft Windows Server® 2008 R2 Hyper-V™ and Microsoft System Center 2012, facilitates the delivery of IT services and applications for your organsation.

By virtualising the underlying data storage environment for Windows Server Hyper-V™, NetApp can consolidate hardware and increase storage effi ciency by 50% or more.

Reduce the cost of delivering and managing IT services and applications using a private cloud infrastructure.

Respond faster to changing business needs while making sure of application availability with an IT infrastructure.

Automate data management tasks using Microsoft System Center integrated with NetApp OnCommand™ Plug-in for Microsoft and Data ONTAP® PowerShell Toolkit.

NetApp and Microsoft offer a robust set of tools, including solution, build, and operation guides plus validated reference architectures and best practices, to help you jump-start your NetApp for Microsoft Private Cloud deployment.

Reduce Costs

Increase Agility

Improve Effi ciency

Utilise Proven Platform

Page 35: Bytes Magazine Spring_Summer 2013

The Road to the Private Cloud You can move to the Microsoft Private Cloud incrementally, without ripping and replacing your current infrastructure.The path your company takes depends on your starting points and objectives, but in general there are four steps to consider:

1. StandardiseUnifying hardware and creating repeatable processes help to deliver predictable services that can result in shorter provisioning times and lower support costs.

2. Consolidate and virtualise Consolidating and virtualising servers and storage are prerequisites to the construction of private clouds. This step helps you increase asset utilisation by making it easier to move workloads and scale on demand; it also enhances availability by making it easier to implement high availability and disaster recovery for many applications.

3. Automate and orchestrateOnce you begin automating regular practices such as provisioning, activation, backup, and replication, your IT staff will be able to orchestrate and scale IT services using private clouds.

www.bytes.co.uk | 35

about NetApp for Microsoft Private Cloud by contacting your Bytes account manager on 020 8786 1500.

learn more...

4. Centralise management Centralised management is a necessary characteristic of private clouds because it gives you a complete picture of what resources are available and needed and a projection of future usage and expenditures. It also allows IT to measure usage and implement chargeback models, and it enables IT to implement self-service portals that empower users to perform common tasks, freeing up IT staff to focus on value-added services.

Take the Next Step Toward IT Flexibility and Effi ciencyInteroperability with Microsoft products, expertise in storage and cloud computing, and a strong partnership with Microsoft make NetApp a great partner of choice for transforming the promise of a Microsoft Private Cloud into real-world business results.

Key components of NetApp for Microsoft Private Cloud

Page 36: Bytes Magazine Spring_Summer 2013

storage

36 | spring/summer 2013

GOSymantec Backup Exec™ 3600 Appliance is

equipped with integrated data deduplication, granular

recovery and virtual machine protection. It manages

data growth and effectively reduces rising storage

costs while enabling faster backups - and has

patented V-Ray technology that restores entire

servers, critical Microsoft® applications and VMware®

or Microsoft Hyper-V® virtual guests in minutes.

Symantec Backup Exec™ 3600 Appliance

GOSymantec Backup Exec™ 3600 Appliance

confi gure

Page 37: Bytes Magazine Spring_Summer 2013

Essential Protection Edition Included •SymantecBackupExec™2012 •SymantecCriticalSystemProtection •DeduplicationOption •AgentforVMware®andMicrosoft

Hyper-V®

•AgentforWindows®Systems •AgentforApplicationsandDatabases •RemoteAgentforLinux®Systems •RemoteAgentforMac®SystemsOptional •EnterpriseServerOption(includesCentral

AdminServerOption) •RemoteMediaAgentforLinux®

•NDMPOption •LibraryExpansionOption •VirtualTapeLibraryUnlimitedDriveOption

Total Protection EditionIncluded •SymantecBackupExec™2012 •SymantecCriticalSystemProtection •DeduplicationOption •AgentforVMware®andMicrosoft

Hyper-V®

•AgentforWindows®Systems •AgentforApplicationsandDatabases •RemoteAgentforLinux®Systems •RemoteAgentforMac®Systems •EnterpriseServerOption(includesCentral

AdminServerOption) •RemoteMediaAgentforLinux®

•NDMPOption •LibraryExpansionOption(supportfor

10drivesincluded)Optional •VirtualTapeLibraryUnlimited

DriveOption

www.bytes.co.uk | 37

on the Backup Exec 3600 Appliance or Symantec in general please contact your Bytes account manager on 020 8786 1500.

further info...

Bytes hold over

75 Technical and Sales

Accreditations for SymantecGO

What level of security does the Backup Exec 3600 Appliance provide? It includes Critical System Protection which is intrusion detection software that protects against zero-day attacks, hardens systems, and helps maintain compliance by enforcing behavior-based security policies on clients and servers.

Is data deduplication technology included? Yes, support for source and target deduplication is included at no additional charge, making the appliance unique in offering a backup solution with highly flexible deduplication.

What are the technical specificationsOperating systemWindows®StorageServer2008R2x64securityOShardenedatfactorywithCriticalSystemProtectionMotherboard/chassis•Intel®S3420GPRX•1Uchassis:SR1695(FullDepth)ProcessorSingleIntel®XeonX3430,QuadCore,Intel®3420chipsetMemory16GBinstalledexpansionOne(1)PCI-E2.0x16(x8Throughput)connectorIO devices•5xGigabitEthernetports(3production,1

admin,1RMM)•1xSerialport•4xUSB2.0ports•6xSATAports•IntegratedRAIDmodulewithLSI1078

3GbpsSASControllerDrive bays•4xhot-swappable3.5”SASHDDs•2x2.5”SSDdrivesforOS/Applicationstorage capacity•2X80GB2.5”SSDDisksforOS(RAID1)•4X2TBhot-swappable3.5”HDD

(RAID5)-5.5TBusablecapacity•SAScardfortapeoutPower supplyTworedundant400WACpowersuppliessystem coolingTwoblowerfansandonerotatingfan

What is the storage capacity of the Backup Exec 3600 Appliance?As standard it comes with 5.5 TB of fixed usable disk storage. Because it includes data deduplication technology, the storage capacity scales to protect much more than 5.5 TB of front-end data.

Is the storage capacity expandable? The disk storage capacity for Backup Exec 3600 Appliance is not expandable at this time. However, the Backup Exec Appliance does include a SAS port for tape out to meet requirements of data archiving and data off-site for disaster recovery.

How is the appliance licensed? The Backup Exec 3600 Appliance is licensed per appliance. There are two Backup Exec 3600 Appliance Editions: Essential Protection Edition and Total Protection Edition. Each edition comes with either one or three years of bundled maintenance (Advanced System Replacement and 24 hours a day, seven days a week hardware and software support). With a single license, users can utilise the full disk capacity of the appliance for protecting an unlimited number of source systems. The appliance licensing bundle also includes an unlimited number of selected Backup Exec Agents and Options that will optimise backup and recovery for all of the appliances’ supported systems.

Does the appliance come with a hardware warranty? Yes, the Backup Exec 3600 Appliance comes with a one or three year advance system replacement in addition to a 36 month hardware warranty.

Can I upgrade the Backup Exec software when newer versions are available? It is shipped with Backup Exec 2012 software and will be fully upgradable to newer versions of Backup Exec software, as long as your maintenance/support contract is active.

Will the appliance backup protect my virtual infrastructure? Host level backup, powered by V-Ray technology and integrated with VMware Data Protection APIs (application programming interfaces) and Microsoft Volume Shadow Copy Service (VSS), enables host-level backup of entire virtual guests and recovery at the virtual machine, virtual disk, application, file, folder, and granular application data level. Advanced hypervisor features are also supported with both VMware and Hyper-V.

Here are the answers to those frequently asked questions

configure

Page 38: Bytes Magazine Spring_Summer 2013

about the mobility benefi ts Box can offeryour Sharepoint environment by contacting your Bytes account manager on 020 8786 1500.

learn more...

the reachFor businesses with content platforms like SharePoint or

Documentum, the ECM Cloud Connect solution makes

it easy to synchronise or transfer data to and from Box.

This means that your content systems will be instantly

cloud-enabled, letting you collaborate through Box, access

enterprise content from iPads and other mobile devices, as

well as get to your content through any one of Box’s dozens

of cloud partners like Salesforce or NetSuite.

Box ECM Cloud Connect is intended to solve three main

goals for customers:

1. Content Synchronisation: Data automatically

synchronises between any ECM system (like SharePoint)

and Box.

2. Content Archiving: Archive content automatically or

on-demand from Box to your existing ECM solution.

3. Content Migration: Push content from your current

ECM system to Box on-demand.

The volume of information inside enterprises today –

whether on desktops, in fi le servers, or within SharePoint –

has produced tremendous data sprawl for enterprises.

At Box, the goal is to connect seamlessly to these

on-premise data sources, empowering you to use

your business information in new ways.

Cloud-enable your on-premise content solutionHow ECM Cloud Connect workss

Why use Box with SharePoint?

of SharePoint to new, external and mobile users

storage

38 | spring/summer 2013

Page 39: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 39

How do you secure your mobile devices?LetMobile is for companies that want to secure corporate email on personal devices and keep sensitive information secure. With LetMobile, Corporate email is never stored on mobile devices, it has support for all popular smartphones and tablets and is cost effective to deploy and manage; up and running on a new device in minutes.

• EASY TO USE• NO DEVICE “TAKE OVER”• NATIVE EMAIL – “NO SUB PAR EMAIL APP”• SUPERIOR DATA SECURITY• NO DATA STORED ON THE DEVICE• NO PASSWORDS ON THE DEVICE• FULL CONTROL• LOW TCO

“In 2012, a full 51% of the UK’s secure IT networks were breached due to employees using personal devices*.”

Secure your mobile devices today ensuring corporate data is not breached.

A premium BYOD Security Solution without the premium price tag

For a demonstration of LetMobile and a quote you’ll be pleasantly surprised with, contact your Bytes account manager on 020 8786 1500.

*source:http://www.virginmediabusiness.co.uk/News-and-events/News/News-archives/2013/Half-of-business-networks-compromised-by-personal-devices/

security

Page 40: Bytes Magazine Spring_Summer 2013

We have had a full

calendar of events and

webinars across the

Bytes Group recently.

We’ve brought news

and information

on all aspects of

Software Licensing,

IT Security, Software

Asset Management

and Managed Print

Services.

Where possible we have hosted our events in landmark buildings so that we can add an extra dimension of interest to our guests.

Recent venues have included Wembley and Ethiad football

stadiums, Andaz and The May Fair Hotel and Microsoft’s

Cardinal Place, London. Industry experts from many of our leading vendors as well as our own Bytes specialists have

delivered informative presentations on a broad range of topics to ensure you are kept up to date with all the important industry developments. A small selection of some of our

events is listed opposite. Please visit the events page of our website www bytes.co.uk/events regularly for news of forthcoming events.

register now...to secure your place at one of our current technology events: www.bytes.co.uk/events

viewsand events

events

40 | spring/summer 2013

Bytes “Webinar Wednesdays”On the 2nd and 3rd Wednesday of each month we host free one hour webinars covering a broad range of hot topics in the industry, chosen by our specialists or requested by our customers. To view these sessions instantly visit: www.bytes.co.uk/webinars

Windows 8 & What’s New for 2013Cardinal Place, London, November

Check Point Best PracticesSeminarWembley & Ethiad Stadiums, London& Manchester, November

BYOD & Mobile Print SolutionsEthiad Stadium, Manchester, November

Oracle - Optimising the NextGeneration of IT ArchitectureThe May Fair Hotel, London, January

Windows Azure BreakfastBriefi ngAndaz Hotel, London, February

The New Microsoft Offi ce 365 Cardinal Place, London, February

Microsoft Roadmap - 2013& BeyondCardinal Place, London, March

Sarah FolleyMarketing Executive, Bytes

Recent venues have included Recent venues have included Wembley and Ethiad football Wembley and Ethiad football

stadiums, Andaz and The May Fair Hotel and Microsoft’s

Cardinal Place, London. Industry experts from many Industry experts from many of our leading vendors of our leading vendors as well as our own as well as our own Bytes specialists have

delivered informative

Page 41: Bytes Magazine Spring_Summer 2013

viewsWindows 8 & What’s New for 2013Cardinal Place, London, November

Check Point Best PracticesSeminarWembley & Ethiad Stadiums, London& Manchester, November

BYOD & Mobile Print SolutionsEthiad Stadium, Manchester, November

Oracle - Optimising the NextGeneration of IT ArchitectureThe May Fair Hotel, London, January

Windows Azure BreakfastBriefi ngAndaz Hotel, London, February

The New Microsoft Offi ce 365 Cardinal Place, London, February

Microsoft Roadmap - 2013& BeyondCardinal Place, London, March

...together, we rock!!

Since 1982bytes.co.uk

Bytes & Software Licensing . . .

Bytes magazine adverts x3.indd 2 27/02/2013 11:50

Page 42: Bytes Magazine Spring_Summer 2013

security

42 | spring/summer 2013

On 12th September 2012, Microsoft announced that they were ending support for their Forefront TMG 2010 solution. By ending support for this product, and not announcing a successor, Microsoft are effectively saying that they don’t think end-users require any kind of on-premise protection for hosting web based services such as SharePoint or Outlook Web Access. This strategy aligns perfectly with Microsoft’s current alignment to Cloud-based offerings, spearheaded by Offi ce 365 and their Azure hosting product. However, this alignment is at odds with what Bytes Security Partnerships are seeing within our customer base.

With one or two notable exceptions our customer base is still very much running on-premise based systems, and hosting private clouds for their users. Cloud-based systems are currently primarily being reserved for backup and recovery services, in addition to certain Software As A Service (SAAS) solutions such as Websense’s hybrid cloud solution for Web Filtering and Mobile Device Management.

This decision has to be put into the context of why utilising a product such as TMG 2010 is important from a security point of view? I believe that all networks should be tiered. As such, untrusted networks such as the Internet should not be allowed to directly connect to trusted networks. Most companies are familiar with the concept of a “DMZ” network to achieve this but it has become such a common part of network design it has almost become a cliché. Very few people actually think about the “why” behind it when they implement such a network.

Microsoft’s announcement therefore poses a dilemma for the many companies who have no immediate plans to move to an external cloud-based infrastructure and who require a layer of fi ltering between themselves and the internet for their public facing services. For this reason Bytes Security Partnerships have been investigating varied options to fi ll this gap.

Replicating the Benefi ts of TMGOne of the key benefi ts of utilising TMG 2010 to protect public facing Microsoft solutions such as SharePoint was its ease of integration, and this, as well as security, was one of the concerns Bytes had when identifying a replacement solution offering. Having taken a detailed look at the market place, Bytes have chosen the F5 range of solutions to offer to those customers who are pro-actively looking to replace their now-defunct TMG 2010 installations.

F5 have introduced their iApps feature set which provides a solid solution based foundation for their BIG-IP range of products to allow companies to quickly and easily deploy, amongst others, Microsoft solutions with minimum hassle.

Additional Functionality for the Web 2.0 WorldWhat’s more, in addition to the basic reverse Proxy and SSL off-load functionality that TMG 2010 provided,

F5 has a whole raft of other features that improve both the functionality and security of a private cloud solution.

By combining conventional reverse Proxy and SSL off-load functionality with their Application Security Manager (ASM) software, F5 have a solution that is uniquely equipped to deal with the challenges of hosting a private cloud in the Web 2.0 world. ASM is not only capable of dealing with the “normal” threats posed by the web but is also capable of dealing with attacks such as Layer 7 distributed denial of service attacks and Web scraping attacks, that are used to acquire legitimate public information to create Phishing attacks.

F5 is available as either a Hardware appliance-based solution or a Software virtual appliance in order to provide customers with total fl exibility of deployment and to ensure seamless integration with their current infrastructure.

Talk to Bytes about F5Bytes Security Partnerships is a certifi ed F5 silver partner and as such offers a suite of support and consultancy services around F5 products. In addition, our close and developing partnership ensures our clients are able to leverage maximum benefi t from F5’s wide range of security offerings.

Microsoft Announce

contact the BSP team with any F5 related enquiries or advice around your security approach to this discontinuation of service on [email protected] or call the team direct on 0845 075 0560

learn more...

What is the Non Cloud Alternative?

Viewpoint by:David RawleCTO, Bytes Security Partnerships

TMG End of Life

What is the Non Cloud

Viewpoint by:David RawleCTO, Bytes Security Partnerships

TMG End of Life

Page 43: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 43

Phishing is nothing new, but it’s far from old news. Phishing emails are designed to look like they come from a trusted source and extort personal information, which gets used in a criminal or fraudulent way. Phishing is mass volume, small pockets of money, adding up to a handsome gain for the bad guys. At fi rst, success rates were high, but as most of us have become better at identifying a phish, success rates have greatly reduced.

So, what’s different about spear-phishing? It’s highly targeted, and increasingly being used as the initial wave in more sophisticated malware attacks that are designed to steal confi dential data. For example, spear-phishing has been widely attributed as being the original infection point in the widely publicised RSA security breach.

Typically, spear-phishing emails have four common factors:1. The email is pretending to be from a trusted

source, often a fi gure of authority, making it even more pressing for the recipient to open the email.

2. The information in the email is relevant to both the alleged source and the recipient, making it highly targeted.

3. It contains a seemingly valid request for the user to take action e.g., to open an attachment or click on a link. This request is in context with the content of the email.

4. The email is targeted, so is sent out in much lower volumes compared to traditional phishing attacks, making it harder to detect.

And let’s be clear, no security solution can guarantee to stop 100 percent of these threats. While targeted attacks have evolved in frequency and sophistication, many security defences have failed to adapt. Old techniques don’t address the intertwined correlation of attacks across web and email to protect against data theft and cybercrime call-home communications. The growing prevalence of cloud apps, along with increases in SSL traffi c, mobility and remote users are also adding more blind spots to traditional defences.

Will your security defences stop your organisation from being the next ‘Catch of the Day’?

Spear-phishing:

‘Catchbeing thehow to avoid

of the Day’Spear-phishing Advice:Security:Adoptaunifiedsecuritystrategythatintegratesweb,email,anddatasecurity.Thinkabouthomeusersandmobiledevices.Layerdefencestooptimiseprotectionandmostimportantly,ensureconfidentialdataisprotectedregardlessofwhereitisorwhatdeviceit’son.

Protection:Communicatebestpracticestouserstoprotecttheironlineidentities,lock-downtheirFacebookprofilesandmakesurepasswordsarestrong,changedfrequentlyandnotbeingusedformultipleonlineaccounts.EncourageuserstoGooglethemselvesandseewhatpersonalinformationoftheirsisunwittinglybeingsharedonline.

Education:Educateusersonhowtospotaspearphish.Testemployeestoseewherepeoplearestillfallingforaphishandre-educatethemtodeveloptheirknowledgeandkeepthemvigilant.

Acceptance:Acceptthatyouareapotentialtargetnomatterwhatyourroleorlevelisintheorganization.Youareapotentialsecurityholeandanopportunityforacriminaltogainentryintoyourorganisation’snetwork.

Reputation:Questionthereputationofalinkanddon’tassumeit’ssafetoclickon.Andjustbecauseanemaillookslikeitcomesfromareputablesource,don’trelyonitbeingfromwhoitsaysit’sfrom.Ifindoubt,don’topenattachmentsandinsteadofclickinglinksthatcouldre-directyouacompromisedwebsite,typetheURLintothebrowser.

Jonathan WilkinsonDirector, Product Management,Websense

See if you spot a phish atwww.websense.com/operationspearphish

Page 44: Bytes Magazine Spring_Summer 2013

security

The mobile workforce is expected toincrease from 919 million in 2008 to 1.2 billion in 2013 (IDC) - a fi gure that will represent 34.9% of the worldwide workforce. Workers are dispersed all over the globe, and they use a variety of trusted and un-trusted devices to request access to corporate resources from different types of networks.

Users need fast, secure, and reliable access to the corporate infrastructure, but IT departments are struggling with multi-vendor access solutions and systems, policy enforcement, access regulation, security threats and vulnerabilities, and ensuring that the right user is connecting to the right applications based on context.

If all that weren’t enough, IT departments must also keep management and maintenance costs in line. Enterprises need unifi ed and converged access and policy management in a globally distributed environment, so they can connect any user on any device from any location to the application, wherever it lives, securing and optimising content delivery.

In the fl ow of anything, be it traffi c, water, electricity, or commerce, there are specifi c points that can provide intelligent processing and control. The purpose of these points is to provide critical fl ow control, redirection, intelligent management, and security.

In a Microsoft Unifi ed Communications environment, the strategic point of control would be about securing and optimising the delivery of SharePoint, Lync and Exchange applications globally to remote, mobile and offi ce users by connecting them with the least amount of latency and as close to the application as possible.

Application and access security solutions that provide these centralised, strategic points of control are known as Application Delivery Controllers (ADCs). They are often located at the edge of the network, whether it’s in-house or in the data centre.

These ADCs, these strategic points of control, positioned between users and the resources they need, can make intelligent decisions about how to handle access traffi c. They provide the security, scalability, and optimisation required for unifi ed global access to corporate resources in all types of deployment environments.

Making Microsoft(any) Apps

44 | spring/summer 2013

Global access to

corporate applications

– think Microsoft

SharePoint and

Exchange - is critical

to an organisation.

The range of users,

devices, and their

locations requires

stringent application

access control to

securely connect any

user on any device

from any location

to wherever the

application lives.

more about ADCs and F5, speak to your Bytes Security Partnerships account manager on 0845 075 0560.

fi nd out...

TrulyGlobal

Page 45: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 45

MS ExchangeSecurityDepend on F5’s BIG-IP® Platform to replace discontinued Microsoft TMGHas Microsoft’s recent announcement to discontinue Microsoft ISA Server, Forefront Threat Management Gateway (TMG) left you looking for an alternative fi rewall for authentication and reverse proxy in publishing Microsoft Exchange, Lync and SharePoint?

To learn how F5’s industry leading BIG-IP® platform can be used instead of TMG for reverse proxy, pre-authentication, protecting web-based services and security of employee owned and corporate mobile devices, contact Bytes Security Partnerships security solutions team on 0845 075 0560 or email [email protected]

F5’s Big-IP® is an ICSA Labs certifi ed network and application fi rewall solution that prevents potentially malicious traffi c from ever reaching Exchange. With intelligent monitoring of traffi c, pre-authentication, and access control for mobile devices, F5 helps you deploy highly available and secure email services.

And F5’s iApp template for Exchange will enable you to accurately and quickly deploy Exchange in hours not days!

Ensure your Microsoft Exchange is Secure, Fast, and Highly Available with F5’s BIG-IP®.

Bytes and F5Bytes SP delivers F5 security solutions that address the challenges caused by the evolution enterprise networks.

We enable our customers to visualise and manage their security risks whilst enabling robust application and data delivery solutions to internal, mobile and virtual environments.

Working with F5, Bytes provide solutions for:

• Advanced Security Protection• Activity Monitoring and Analysis• Enterprise Mobility

Contact the Bytes Security Partnerships team to fi nd out more about Securing Exchange with F5 Networks by calling our security solutions team on 0845 075 0560 or emailing any questions or enquiries to [email protected]

DEPEND ONF5’S BIG-IP®

PLATFORM TOREPLACEDISCONTINUEDMICROSOFTTMG

Page 46: Bytes Magazine Spring_Summer 2013

Faced with revised pricing policies from Check Point, world class research funding body Natural Environment Research Council (NERC) needed to review its licensing strategy and implement a robust plan going forward.

NERC was founded by Royal Charter in the 1960s and funds world-class science in universities and its own research centres which increase knowledge and understanding of the natural world.

Following a Government decision to review the costs of the research councils, NERC looks after the Check Point fi rewalls not only for its own research centres but also for a number of other Government funded research centres spread across the whole of the UK. The sites range in size from “1 man and his dog” in the Shetlands to the largest site in Swindon employing 1000 staff. There are around 30 gateways in support, many of which are required to facilitate large bandwidth. Bytes Security Partnerships (BSP) now provides both Check Point software licencing management and technical support to NERC.

The ChallengeNERC invited BSP to review their software licencing when Check Point changed their pricing structure and they were

John TaitTechnical Consultant, Bytes

46 | spring/summer 2013

casecasecasecasestudyBytes’ ongoinglicence consultancyand account management

gives NERC the insightthey require to continually understand and

develop theirinfrastructure.

case study

Page 47: Bytes Magazine Spring_Summer 2013

fi nding it diffi cult to understand the implications of a fi rewall upgrade. At that time their incumbent supplier was also under threat of a takeover which was a potential issue to NERC as they were unsure how this would affect the service provided.

BSP audited NERC’s software licencing and found that NERC had licences that they didn’t need and that there were better ways to perform upgrades and renewals which would provide cost savings in the process.

Following the audit, it made sense for NERC to move from the incumbent provider to BSP which they decided to do when the software subscriptions came up for renewal. By using their extensive knowledge of Check Point’s licencing, BSP manage all the Check Point trade-in schemes to maximise the discounts available.

This ongoing licence management and account management gives NERC the updates and insight they require to continually understand their infrastructure.

This insight provides NERC with the options available and gives them the confi dence to make correct and informed decisions whilst saving them time; time previously spent trying to make sense of Check Point.

Peter Lucas, NERCs Technical/Scientifi c Services Team Leader, who is responsible for their network and fi rewalls said, “By consolidating and bringing everything together we have a better understanding of what we had previously and are now getting a better match of what we are paying for in direct relation to what we actually need. We are also getting more value out of the current licences which will meet our needs for the future.”

The ResultFor a number of years NERC had used a token based support system. The incumbent provider was under a threat of a takeover and as a result NERC had noticed a decline in the quality of support.

“When the incumbent lost the software subscription contract we didn’t feel that the quality of service we were

getting was good and on occasion we were unsatisfi ed,” commented Peter Lucas.

NERC decided to review their software support but faced a number of challenges from the Token Based Support Model when they were looking to benchmark the service at renewal time.

At renewal time for subscriptions there was always a surplus of tokens which made any decision to benchmark diffi cult and pointless. As there were mid term purchases of tokens, there was a challenge in analysing the annual cost of support. This also added a dis-incentive to log support calls as each call created a cost without a limit.

BSP proved that by switching to an annual support contract cost savings would be achieved. As well as the fi nancial advantage gained from moving to an annual unlimited support contract, NERC have also realised a number of other signifi cant advantages over the token based approach.Previously NERC had tried to resolve as many of their own support calls in-house to avoid using costly tokens. They now enjoy unlimited access to experienced engineers who can resolve any support issue. Now NERC are encouraged to raise support tickets.

We are much happier to log calls now. Previously we were dis-incentivised to log calls as they would burn though our tokens.In the fi rst couple of weeks of BSP’s support we resolved a number of issues that were open with our previous provider for over three months. The amount of time and help we have had in this period with BSP would have constituted 10 tokens if we were still with our previous partner. BSP has also managed to resolve issues on top of that.

Peter LucasTechnical/Scientifi c Services Team Leader, NERC

Company: NERCIndustry: Science/ResearchCountry: UKRevenues: £429.6m (Funding)Employees: 2,521

Bytes Solutions Provided:• Improved support offering meaning

increased SLAs• Review and rationalisation of licencing

saving customer money• Continual updates on new technologies

to ensure best use & development of IT estate• Expertise in implementing systems• Dedicated account management and

support 24/7

Key Benefi ts:• Vastly improved service levels and IT support

satisfaction• Long-term security strategy reviewed and

developed• Optimised licencing and bespoke renewals

tailored to customer needs• Signifi cant up-front cost saving and ongoing cost

savings

customer profile

www.bytes.co.uk | 47

hear what our customers think about uswww.bytes.co.uk/bytestv

TVBYTES

Page 48: Bytes Magazine Spring_Summer 2013

security

From applying security policies to DLP

and effective user authentication,

there are many infosecurity lessons

to be learned from the classic space

opera. Terry Greer-King, Check

Point’s UK managing director

shows how companies can avoid

the Empire’s mistakes.Star Wars: A New Hope is more than just an epictale of the galaxy-wide struggle between the GalacticEmpire and the Rebellion, and the triumph of goodover evil. It’s also a great example of how a series ofbasic infosecurity mistakes can cost even a massive,powerful (but evil) organisation like the Empire dearly.

As the Empire’s executive leader, Darth Vader certainlydidn’t lack resources. He had huge teams of trained,highly-motivated personnel at his command, not tomention some state-of-the-art security hardware. Healso knew what assets needed protecting – all of whichare fundamental to an effective security strategy.

But ultimately, the Empire was compromised by afatal combination of weak security policies and poor

practice. It’s a classic example of investing ina seemingly powerful security technology

or product, then building policies basedaround that technology – rather than

starting with a policy thatcovers what’s critical to theirbusiness, then acquiringand deploying solutionsthat map to it.

MAY THEEnForcement

you SecurityLessonsfromStar Wars

From applying security policies to DLP

and effective user authentication,

there are many infosecurity lessons

to be learned from the classic space

opera. Terry Greer-King, Check

Point’s UK managing director

shows how companies can avoid

the Empire’s mistakes.Star Wars: A New Hope is more than just an epictale of the galaxy-wide struggle between the GalacticEmpire and the Rebellion, and the triumph of goodover evil. It’s also a great example of how a series ofbasic infosecurity mistakes can cost even a massive,powerful (but evil) organisation like the Empire dearly.

As the Empire’s executive leader, Darth Vader certainlydidn’t lack resources. He had huge teams of trained,highly-motivated personnel at his command, not tomention some state-of-the-art security hardware. Healso knew what assets needed protecting – all of whichare fundamental to an effective security strategy.

But ultimately, the Empire was compromised by afatal combination of weak security policies and poor

practice. It’s a classic example of investing ina seemingly powerful security technology

or product, then building policies basedaround that technology – rather than

starting with a policy thatcovers what’s critical to theirbusiness, then acquiringand deploying solutionsthat map to it.

you Star Wars

BE WITH

48 | spring/summer 2013

Page 49: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 49

the BSP team with any Check Point related enquiriesor for information around supporting Check PointProducts on [email protected] orcall the team direct on 0845 075 0560.

contact...

Let’s take a look at some of the key securitymistakes made by the Empire in Star Wars:A New Hope; how those mistakes were exploited;and how you can learn from them.

Locating leaksIn the opening sequence of the fi lm, Darth Vader and hisStormtroopers board a Rebellion vessel to recover interceptedblueprints of the Empire’s new terror weapon, the DeathStar. So far, so good: the Empire had detected a potentiallydangerous data leak, and acted swiftly to contain it.

However, the Empire’s good intentions were let down inthe execution: their search of the ship was too focused.The stolen data was loaded onto a consumerised device(the droid, R2D2) which escaped the captured ship in alifepod. Even though Imperial forces detected the lifepod’slaunch, they let it go: at that time, it wasn’t a droid theywere looking for.

The lesson is that there are multiple vectors for data loss– USB fl ash drives, consumerised devices, email, IM –whether the data is Death Star schematics or customerfi nancial data. So organisations can’t afford to focus on onepossible data loss vector while ignoring another. All possiblevectors should be considered, in addition to the securitypolicies developed to cover them and the solutions thatenforce those policies.

No product is infallible: not even a Death StarThe intercepted blueprints were put to use by the Rebellionto create a highly targeted attack on the Empire’s mainsecurity appliance, the Death Star. However, at the Imperialboard meeting convened to discuss the ramifi cations ofthe data breach, imperial executives were more concernedwith point-scoring and squabbling with each other,instead of working together to fi nd and close off possiblevulnerabilities.

Darth Vader warned Admiral Motti not to be too proudof the technology the Death Star represented; and Mottiretorted that Vader’s knowledge and use of The Force hadnot revealed the location of the stolen data. Vader foundMotti’s lack of faith disturbing, but he should have beenmore concerned that the meeting failed to fi nd a way toresolve the problem and fi x the vulnerability.

Neither had grasped the fact that it doesn’t matter howstrong you believe your security infrastructure to be; thereare always vulnerabilities introduced through simple humanerrors or poor planning. Keeping networks and data securerequires both a clear, business-led policy and coordinatedeffort across IT and security teams. The product alone is notenough.

Poor authentication gives access all areasWhen the Millennium Falcon is captured in a tractor beamand brought into the Death Star, the Empire fails to properlyinspect the vessel for payloads that could present a risk.Then the rebel crew exploit the Empire’s weak visualauthentication test by stealing Stormtrooper uniforms, whichgives them unchallenged access to the Death Star’s interior,networks and defence systems.

These scenes highlight two very common security issues:fi rst, without strong user authentication, it’s easy for apotential attacker to appear familiar and trustworthy. Simplevisual checks (are you wearing an Imperial Stormtrooperuniform? Permission granted) are not enough. Securitypolicies should take account of users’ credentials, and onlygrant access to users who can authenticate their identity,ideally with a 2-factor method.

Second, it’s not appropriate to give all members of staff,contractors and third parties full access to all your network

resources and data. Organisations should assess whatinformation is business-critical, and ensure that data is onlyaccessible by those authorised to use it.

The dangers of BYODHaving passed the Empire’s weak authentication systems onboard the Death Star, R2D2 is able access confi dential dataon the Death Star itself, simply by plugging into an easilyaccessed wall port. What’s more, R2D2 isn’t just a portablestorage device, but a self-propelled, intelligent robot thatcould not only take data anywhere, but then use that dataselectively. This creates a real BYOD (Bring Your Own Droid)problem for the Empire.

Consumerisation can offer benefi ts, but once again needsa coherent policy to control it within an organisation. Thepolicy needs to be supported by technologies including portor device management, data encryption, and remote lockand wipe capabilities.

In conclusion, while the Empire had clear strategic goals(i.e. ruling the Galaxy), and enormous technological andmanpower resources at its disposal, it failed to applyproper policies to help manage and utilise those resourceseffectively. In fact, the exposed exhaust port on the DeathStar was the least of the Empire’s worries.

The security lessons we can take from this are simple:focus on creating security policies that will help youreach your strategic goals, then deploy the appropriatetechnologies to support and enforce that policy. Do, or donot, there is no try. And may the enforcement be with you.

About Check Point Software TechnologiesCheck Point Software Technologies Ltd. the worldwideleader in securing the Internet, provides customers withuncompromised protection against all types of threats,reduces security complexity and lowers total cost ofownership. Check Point fi rst pioneered the industry withFireWall-1 and its patented stateful inspection technology.Today, Check Point continues to develop new innovationsbased on the Software Blade Architecture, providingcustomers with fl exible and simple solutions that can befully customised to meet the exact security needs of anyorganisation. Check Point is the only vendor to go beyondtechnology and defi ne security as a business process.Check Point 3D Security uniquely combines policy, peopleand enforcement for greater protection of information assetsand helps organisations implement a blueprint for securitythat aligns with business needs. Customers include tens ofthousands of organisations of all sizes, including all Fortuneand Global 100 companies.

Bytes and Check PointBytes Security Partnerships (BSP) is a Check PointPlatinum partner and as such has the proven level ofvalue-added sales, technical and support expertiserequired for this top tier, awarded to just 1% of all UKresellers. In 2011 BSP won the Check Point Resellerof the Year award for delivering excellent support anddemonstrating an unrivalled knowledge of the CheckPoint software blade architecture. This ensures ourclients are able to leverage maximum benefi t fromCheck Point’s wide range of security offerings.

Page 50: Bytes Magazine Spring_Summer 2013

security

Good for EnterpriseGood for Enterprise is a securemobile email and collaboration suite It delivers an integrated, intuitive user experience that allows employees to access corporate email, documents, contacts, calendar, tasks and the Intranet from any device.

Good VaultStrong Two-Factor Authentication and S/MIME email signing and encryptionIt secures mail access, ensures message privacy and integrity, and enhances data protection. It leverages a Secure Element to store user keys and credentials on microSD and smart cards.

Good ConnectSecure presence-enabled enterprise instant messaging (IM) appIt extends corporate IM platforms (like Microsoft Lync and OCS) to mobile devices without requiring a VPN, fi rewall holes, or servers in the DMZ. It delivers instant messaging, presence, and corporate directory lookup, all from an easy-to-use interface.

Good ShareAccess, sync, and share fi les from SharePoint and other fi le servers behind the corporate fi rewallIt enables workers to access, sync, and share corporate documents instantly with no VPN, no fi rewall re-confi guration, and no need for extra fi le stores.

50 | spring/summer 2013

transformingGood Technology is

how mobile work gets done

Page 51: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 51

or to join the weekly webinar for a live demonstration, contact our Bytes specialist [email protected]

more info...

Good

Good

Goodmore info...

Goodmore info...

Good

Good

Accellio-iOS-Native Box

Breezy DTE Axiom for iOS

Good Connect Good Share

Good Reader iAnnotate

iBabs Good mobilEcho

MobileForce Offi ce2 Pro

Pitchboard Roambi

Social Sites

MobileForce

Smart Offi ce

MobileForce

Good DynamicsThe Mobile Apps PlatformIt’s the perfect platform to grow and transform your business. Unique inter-app communication technology enables app-to-app secure workfl ows and sharing of services. With Good Dynamics, enterprises can focus on managing their apps and data, without having to manage devices they don’t own.

• Containerise any app. Embed policy controls in your in-house custom apps, even when source code is unavailable.

• Share information safely. Enable access to confi dential business information from any device without risking data loss.

• Collaborate securely. Ensure constant information protection in collaborative workfl ows with app-to-app secure data exchange.

• Assure user privacy. Protect business information without touching personal apps and data.

• Provide wipe/lock capability. Wipe or lock potentially compromised application data.

• Enable policy controls. Enforce app-level security controls for jailbreak and root detection, password, OS requirement, app-specifi c custom policies and data leak prevention (DLP).

• Change policy dynamically. Modify policy over the air at any time without requiring an app update.

• Cross platform security. Control apps for iPhones, iPads, Android phones, tablets, and even HTML5 apps.

• Prevent security exploits. Block rogue app and malware access via jailbreak detection and app/device authentication validation.

• Secure infrastructure. Encrypt app data in motion and provide app-level authentication outside the fi rewall.

• Ensure fault tolerance. Prevent loss of operation and improve performance with high-availability and disaster recovery (HA/DR) support.

• Extensive app library. Off-the-shelf apps to address any business need, all built on the Good Dynamics mobile app security platform.

Page 52: Bytes Magazine Spring_Summer 2013

security

McAfee Security Connected is an open framework for integrating potentially disparate security technologies. Not only does it enable technologies to work together through collective intelligence, it also enhances each solution’s individual security capabilities, efficiencies, and effectiveness. This integrated framework delivers real-time visibility into the security and risk management profile of your business. At the same time, it automates your security solutions through policy-based deployment of counter measures. And your security is always up to date thanks to the world’s most comprehensive threat intelligence.

The resultant visibility and control over all information flowing into or

out of the enterprise through any communications channel, supports and simplifies internal governance and regulatory compliance, helping enterprises avoid fines and other sanctions for data breaches. This enables enterprises to see how data moves anywhere in the business and deploy and manage security policies that can be applied to personally-owned consumer devices as well as corporate assets.

McAfee Security Connected empowers you to protect your business everywhere - wherever your employees and digital assets go. In addition, you’re able to optimise your security each and every day, while reducing risk, driving compliance, and improving operational efficiencies across your IT infrastructure.

52 | spring/summer 2013

Information is now becoming

the real currency of

competition. Enterprises that

use the information they have

intelligently gain a competitive

advantage. The challenge is no

longer about where to store it -

it’s how to access it differently.

Integrating Your Security Technologies with McAfeeSecurityConnected

Page 53: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 53

on Security Connected contact your Bytes account manager on 020 8786 1500.

further info...

McAfee Labs collects an immense amount of data on malware, vulnerabilities, and threats to endpoints, networks, email, and the web. Using their Global Threat Intelligence, they analyse this data to block these intrusions and reduce the danger to their customers. Their researchers are forecasting the introduction and increase of the following threats this year:

Mobile worms on victims’ machines that buy malicious apps and steal via tap-and-pay NFCMalware that blocks security updates to mobile phonesMobile phone ransomware “kits” that allow criminals without programming skills to extort paymentsCovert and persistent attacks deep within and beneath WindowsRapid development of ways to attack Windows 8 and HTML5Large-scale attacks like Stuxnet that attempt to destroy infrastructure, rather than make money A further narrowing of Zeus-like targeted attacks using the Citadel Trojan, making it very diffi cult for security products to counter

Malware that renews a connection even after a botnet has been taken down, allowing infections to grow againThe “snowshoe” spamming of legitimate products from many IP addresses, spreading out the sources and keeping the unwelcome messages fl owing SMS spam from infected phones. What’s your mother trying to sell you now?“Hacking as a Service”: Anonymous sellers and buyers in underground forums exchange malware kits and development services for money The decline of online hacktivists Anonymous, to be replaced by more politically committed or extremist groupsNation states and armies will be more frequent sources and victims of cyber threats

The leading security threats for 2013

Page 54: Bytes Magazine Spring_Summer 2013

security

54 | spring/summer 2013

Too many Enterprise SaaS

and Cloud vendors focus

their efforts on marketing

and spinning a good story to

attract new customers, rather

than spending time or money

looking after those customers

once they have signed on.

Once the ink is dry on the

contract, ongoing service

and support seems to be an

afterthought.

&Enterprise SaaS:

Page 55: Bytes Magazine Spring_Summer 2013

According to newly released global research from The Enterprise Strategy Group (ESG), Enterprises value SaaS applications, particularly for email-management, but customers are facing significant service and support challenges plus a lack of ongoing aftercare from their SaaS vendors.

The “SaaS with a Face” report, which asked 248 global companies currently using SaaS-based e-mail management about their usage and service satisfaction, indicates the problem is so bad that of non-Mimecast SaaS customers 22% are looking for a new SaaS email management vendor.

Given some of the largest and most aggressively marketed vendors in the Cloud email management space are publicly listed companies, it’s quite clear their drive to attract new customers is part of a shareholder-pleasing business plan. Ongoing aftercare and customer satisfaction seem not to be a concern to them.

If these vendors want to grow, they need to wise up about their customers’ expectations. Service and support is a vital addition to an Enterprise SaaS product offering; simply delivering a fancy Web 2.0 interface, or expecting your customers to fend for themselves on support forums is not enough. The ESG SaaS with a Face report identified that 66% of customers cited vendor support as an important vendor selection

criteria, only 34% noted that they had actually achieved improved service and support compared to traditional software vendors. It would seem that well-known cloud vendors are letting their customers down.

The impact of bad service and support by SaaS email management vendors are wide and have a significant impact on their customers. When asked

what service and support challenges customers faced with their SaaS email management vendor the list of problems indicates a severe lack of aftercare; for example 27% of non-Mimecast customers were not able to find the right person to solve their problem. A further 15% reported inexperienced support staff, while missed SLAs and long support wait times were reported by 18% and 17%

respectively. Worryingly 12% of non-Mimecast customers cited that some problems were never resolved.

For a true Enterprise SaaS vendor, offering industry leading service and support is an essential part of the relationship we have with our customers. Unlike other SaaS and Cloud email management vendors who build their solutions by cobbling together a collection of acquired and OEMd products, Mimecast’s infrastructure is purpose built by our own team. This means we are not tied to 3rd parties for customer service and importantly can support our own customers in the high standards they expect.

This personal level of involvement by all our service, support, development and customer facing teams means the Mimecast difference, or our “SaaS with a face”, really shows; our customers rate our award-winning customer support highly and, as a result, report satisfaction well above the industry average – 85% of Mimecast customers have no plans to move to a different vendor.

www.bytes.co.uk | 55

on Enterprise SaaS contact your Bytes account manager on 020 8786 1500.

further info...

Bytes are so

confident in Mimecast that

we use it ourselves

&

Page 56: Bytes Magazine Spring_Summer 2013

applications

56 | spring/summer 2013

Adobe® Creative Cloud

NOW built forBUSINESS

Page 57: Bytes Magazine Spring_Summer 2013

Top benefi ts• Get the world’s best tools - Access

all the new Adobe Creative Suite 6* desktop applications you want, plus a host of additional tools and services - Adobe Muse,™ Acrobat® XI, Photoshop® Lightroom® 4, and Adobe Edge tools and services, and more. Creative Cloud gives your team the right creative tool the moment they need it. Use our expert support services to make team members even more successful.

• Collaborate with your team - Share widely, collaborate privately. Share fi les with colleagues both inside and outside your organisation. Use up to 100GB of cloud-based storage and device syncing capabilities to share projects anywhere, anytime.

• Publish apps and websites - Explore new outlets for your content with the publishing services included with Creative Cloud for teams. Create and host websites, deliver stunning digital apps to the iPad, and more.

• Centralise administration - Easily manage and scale your team’s software with centralised purchasing and license management tools. You and your designated administrators can quickly add, assign, or transfer seats and track usage by team members.

• Stay up to date - Get upgrades upon release, as well as new features and services as they become available.

Available through the Value Incentive PlanCreative Cloud for teams is sold through the Value Incentive Plan (VIP). VIP is a subscription-based licensing program designed for companies of all sizes. With a VIP membership, no minimum license purchase is required. Management is easy. Deployment is immediate. And compliance is automatic. Ask your reseller for details on signing up.

www.bytes.co.uk | 57

on Adobe Creative Cloud contact your Bytes account manager on 020 8786 1500.

further info...

Creative Cloud for teams delivers the ultimate set of creative tools with the business-sized features that you

need. You get the entire collection of Adobe Creative Suite® 6 software tools and exclusive updates, along

with lots of team-specifi c features that make working together - and managing licenses - easier than ever.

All at one affordable price.

CreativeCloud for

teams

Cs6 Design and Web Premium

Cs6 Design

standard

Cs6 Production Premium

Cs6 Master

Collection

x x x x

x x x x x

x

x x x x

x x x

x x x x

x x

x x

x x x

x x stD x x

x x x

x x x

x x x

x x x

x

x x x

x

x

x

x

x

x

x

Editandcompositeimages,use3Dtools,editvideo,andperformadvancedimageanalysis

Createvector-basedgraphicsforprint,web,video,andmobile

Designprofessionallayoutsforprintanddigitalpublishing

Create,protect,sign,collaborateon,andprintPDFdocuments

Create,protect,sign,collaborateon,andprintPDFdocuments

Design,develop,andmaintainstandards-basedwebsitesandapplications

Createrichinteractivecontentacrossvariedplatformsanddevices

BuildexceptionalapplicationsforiOS,Android,™andBlackBerry®usingasinglecodebase

Rapidlyprototypewebsitesandapplications,andoptimisewebgraphics

Editvideowithhigh-performance,industry-leadingeditingsuite

Createindustry-standardmotiongraphicsandvisualeffects

Create,edit,andenhanceaudioforbroadcast,video,andfilm

Manipulatelightandcolourinvideofootage

Streamlinetheimportandloggingofvideo,fromanyvideoformat

AuthorDVDs,Blu-raydiscs,andwebDVDs

Organise,edit,andproducedigitalphotography

DesignandpublishHTMLwebsiteswithoutwritingcode

Optimisethelookandperformanceofwebsites

Collaboratewithcolleaguesinsideoroutsideyourorganisation,keepingfilesprivateorsharingatwill

AccesstoBusinessCatalyst®andTypekit®andDigitalPublishingSuiteSingleEdition

Centralisedpurchaseandlicensemanagementtoolstomanageandscaleyoursoftwareinvestment

100GBcloud-basedstorageperuser

DirectaccesstoAdobeproductexperts-twoone-on-onesessionsperuserperyear

Adobe PhotoshopCs6 extended

Adobe Illustrator® Cs6

Adobe InDesign® Cs6

Adobe Acrobat XI Pro

Adobe Acrobat X Pro

Adobe Dreamweaver® Cs6

Adobe Flash® Professional Cs6

Adobe Flash® Builder® 4.6 Premium edition

Adobe Fireworks® Cs6

Adobe Premiere® Pro Cs6

Adobe After effects® Cs6

Adobe Audition® Cs6

Adobe speedGrade™ Cs6

Adobe Prelude™ Cs6

Adobe encore® Cs6

Adobe Photoshop Lightroom 4

Adobe Muse

Adobe edge

Collaboration tools

services

Centralised administration

storage

expert services

CReA

tIVe

CLO

UDVI

DeO

AND

AUDI

O tO

OLs

WeB

tOO

LsDe

sIGN

tOO

Ls

PRODUCt Use

What is in Creative Cloud for teams?

Page 58: Bytes Magazine Spring_Summer 2013

applications

1. Create PDF fi les with 100% Adobe qualityGenerate original Adobe PDF documents with reference quality. The structure and integrity of the originals remain fully intact. Adobe PDF fi les can be created from Microsoft® Offi ce with just one click – and that includes the conversion of e-mails in Outlook into PDF fi les.

Your advantage:low error ratio thanksto 100% Adobe PDF.

2. Easily export PDF fi les into Offi ce formatsCreating PDF fi les from Microsoft Offi ce is easy. And it’s just as easy to export Word, Excel and PowerPoint fi les back from Acrobat, and then edit them as you see fi t.

Your advantage: you can use content from PDF fi les right away with no complications.

3. Edit text and images directlyAt last you can edit text and images directly in PDF fi les just like you can with other documents. Intelligent tools ensure that the original layout and formatting are retained.

Your advantage:you don’t need the original to make alterations.

4. Permanently remove confi dential informationPermanently delete information – in specifi c text or illustrations – which is not intended for publication.

Your advantage: sensitive information is deleted with 100% certainty.

5. Convert scanned content reliablyPaper documents are easy to scan and convert into Adobe PDF fi les. Thanks to enhanced optical character recognition, content is converted into searchable text and can be exported into Microsoft Word or Excel.

Your advantage:quick transfer of content from paper documents.

58 | spring/summer 2013

Adobe Acrobat XI Pro

for your workday10 Great tips

Page 59: Bytes Magazine Spring_Summer 2013

www.bytes.co.uk | 59

on Adobe Acrobat XI Pro contact your Bytes account manager on 020 8786 1500.

further info...

Bytes has won 3

Adobe ChannelPartner Awards

in the last2 years

10 Great tips

6. Create interactive PDF and HTML formsWith the help of the integrated Adobe FormsCentral Desktop, you can create individual forms from scratch with just a few clicks or use ready-made professional templates to design them. As these can be saved as writeable PDF fi les or exported as web forms – a web browser and an internet connection are all that’s required to fi ll them out.

Your advantage: it’s easy to create professional surveys of all kinds.

7. Speed up document reviewsStreamline your internal communication with Acrobat’s commenting tools. All the people involved can see the comments made by others. This eliminates uncertainties and makes additional phone calls and meetings unnecessary, speeding up document reviews as a result.

Your advantage: review and approval processes are far more effective.

8. Archive emails as PDF fi lesIndividual emails and entire email folders from Outlook and Lotus Notes, together with their attachments, can be converted into searchable PDF fi les. Entire email correspondence sequences with all their associated project documents can be archived as PDF documents and handed over smoothly to othercolleagues as required.

Your advantage: easy archiving of all your e-mail correspondence including all relevant information and attachments.

9. Automate recurring tasksAutomate time-consuming and constantly recurring tasks using the Action Wizard. The standardised workfl ows are easy to manage, execute and deliver. They can be applied to one or more Adobe PDF fi les simultaneously.

Your advantage: you can deal with routine procedures in a single step.

10. Review web pages easily, view them offl ine, and archive themWeb pages can be converted into PDF documents, saved and archived using Acrobat – with all their links and subpages preserved. As PDF fi les, web pages can be altered quite simply during the creation phase by using Acrobat’s commenting functions. They can also be created directly from Internet Explorer or Firefox.

Your advantage: up-to-the-minute content can be archived simply, and online projects can be reviewed far more easily than before.

*HTML forms can only be used with the optional fee-based service Adobe FormCentral

Page 60: Bytes Magazine Spring_Summer 2013

management

the HP IT

60 | spring/summer 2013

Gain the visibility you need to

measure performance in detail and

manage IT operations effectively.

PerformanceSuitefor

Operations

Page 61: Bytes Magazine Spring_Summer 2013

HP ITPS for Operations is part of a suite of software solutions designed to help IT and business leaders focus on supporting business strategy and delivering business value - while reducing costs and improving IT effi ciency-in a very transparent manner. It gives these leaders an automated, dashboard-driven, comprehensive technology solution which is customisable at the CIO and departmental level and provides detailed visibility into every aspect of IT performance. HP ITPS gives them a method for systematically managing IT overall, while providing a means to better demonstrate to the business IT’s effectiveness, effi ciency, and value. The performance - management approach embodied in HP ITPS is based on more than two years of intensive research, drawing on the experience of HP customers and HP deployment specialists. This research has given HP a deep understanding of unique IT performance management challenges, which they used to develop a sophisticated data model that simplifi es data collection from a broad array of resources. That data model translates into best practices and key performance indicators (KPIs), which in turn translate into performance.

HP IT Performance Suite is the industry’s fi rst systematic approach to digitising the sensing, measuring, and instrumentation of the entire IT-controlled landscape into a

single consolidated view for IT leaders and practitioners. It is the foundation for customised IT performance systems that can:

• Deliver the industry’s deepest and broadest coverage of IT-controlled assets and investments

• Make it possible to build a secure and comprehensive operational environment for hybrid service delivery

• Give executives the industry’s fi rst cascaded optimisation system for mastering the business of IT

In today’s complex world of data-center consolidation, virtualisation, cloud delivery, and hybrid environments, HP ITPS can give IT operations teams the means to measure what they are responsible for managing.

www.bytes.co.uk | 61

about the HP IT Performance Suite for Operations from your Bytes account manager on 020 8786 1500.

learn more...

HP ITPS for Operations is a suite within a suite that automates and orchestrates the integration and creation of new business processes for faster introduction and better management of business services. It concentrates thousands of real-time operational and security metrics into actionable insights across IT service levels including:• User satisfaction• End-user experience management• Service dependencies• Change management• Production performance management• Network management and optimisation• Transaction management across composite applications• Service performance and vendor comparison• Incident and bottleneck identifi cation across networks,

data-centers, and clouds via topology-based event correlation.

ITPS for Operations is made up of four proven, industry-leading IT operations management solutions; HP Business Service Management (BSM), Data Center Automation (DCA), IT Service Management (ITSM), and Cloud Services Automation (CSA). These are augmented by the HP Universal Confi guration Management Database (UCMDB) with Discovery and Dependency Mapping (DDM) and the HP Executive Scorecard.

PerformanceThe big picture: HP IT Performance Suite

Turn insight into action into IT excellence

Figure 1. HP ITPS for operations is part of an overall performance system that spans every essential IT management functions.

Figure 2. The HP VP of Operations dashboard gives IT operations the visibility they need to effectively measure what they are responsible for managing.

Page 62: Bytes Magazine Spring_Summer 2013

BDS has been at the forefront of providing Managed Print Services (MPS) to mid-market and corporate organisations for many years (its MPS brand, Inspire 360, is highly regarded throughout the industry). However, in order to stay ahead, and in response to the factors outlined above that are driving a decline in print, BDS has been working with a number of specialist technology partners to help them innovate a brand new value proposition and brand - designed specifically to make its customers more competitive, agile and efficient.

The latest evolution of the BDS MPS proposition enables customers to understand for the first time which of their business processes are the most paper-polluting. This is done via a document analytics service which maps print output to relevant pre-determined business processes. The deliverable of this service is a report that highlights which processes are capable of being automated most

62 | spring/summer 2013

Global print volumes are declining. There

are many reasons for this, the main ones being:

• The Downturn in the Global Economy

• The Explosion in Mobile Devices • Big Data Initiatives

In response to the decline some printer manufactures, such as Xerox, and some managed print specialists, such as Bytes Document Solutions (BDS), have consciously decided that rather than try and stem the decline they will instead help accelerate it by helping organisations move away from print-dependent processes to automated ones.

The first stage of this transformational process, named “Business Document Automation” (BDA) involves helping organisations to understand which of their employees are printing what and why. Much work has taken place in this area, however the advancements have tended to result in products and solutions that help organisations understand which employees and departments are printing the most. Products like Nuance Equitrac are leaders in this field.

As good and as effective as Equitrac is, it does not help organisations understand fully what business processes are generating the most amount of print. For this, a new technological solution is needed.

toprint

an effective “Managed Print Service” PLUS a “Business Document Automation” solution can help your organisation contact your Bytes account manager or contact Bytes Document Solutions on 01293 543434.

learn how...

Darren Spence Managing Director,

Bytes Document Solutions

or not toPRINT?

easily, thereby eliminating the “bad paper” from the organisation.

Due to the global decline in print; the maturing of the BDA marketplace; and the rapid advancement of technologies capable of mapping processes to printed output; BDS has established a specialist team to help organisations act on the results of the document analytics phase by transforming their core business processes to be less print-dependant. The team, who trade under the Twenty20 brand, has one objective: To eliminate “bad paper”.

Together, Inspire360 and Twenty20 deliver a turnkey document efficiency and transformational solution that minimises cost, maximises efficiency, and provides mobile workforces with an enhanced business toolset.

document solutions

Page 63: Bytes Magazine Spring_Summer 2013

or not to

Page 64: Bytes Magazine Spring_Summer 2013

partners

“Lack of control”, “no auditing”, “security”, “less features than on premise”, “not reliable”. These are all reasons, both real and perceived, that clients gave in 2012 for not considering cloud based services. And while most on premise systems suffer from the same issues, people expect all of this to be fi xed by moving to a new system, even if they admit they probably wouldn’t ‘have the time’ to do it properly if they upgraded internally themselves. But the gap between expectation and what was actually available in the cloud was big, until now.

Q1 2013 will see the upgrade of Exchange, SharePoint and Lync in the Offi ce 365 platform to the 2013 releases that have just come out for on premise systems. And for the fi rst time the feature list for the cloud is no different to on premise.

the New Offi ce 365

64 | spring/summer 2013

Maggie PerryMicrosoft & Partner Business Manager, Bytes

Tim Eichmann Chief Information Offi cer, Parative

the on premise

DIVIDEto help our customers fully utilise the technology locked in

their software licensing agreements, we have developed our Partner eco-system - designed to complete the legwork of short-listing high quality, suitably accredited suppliers from someone you trust.

From Cloud and Virtualisation strategies through to the implementation of Microsoft sharePoint, Unifi ed Communications, security and Data Back-Up services, we’ve found and recruited system Integrators and It solution Providers that share our standards and complement our software services. We call it our Partner eco-system.

today with a plethora of successful deployments and even more satisfi ed customers under our belts, Bytes is building a strong reputation as an organisation that can not only bring sense, clarity and cost control to software licensing but also excellence in the delivery of solutions that will drive true benefi t to Customers.

If you’d like to know more about how our Partner eco-system can help you unlock the true value in your licensing agreements, please read the following four articles written by our Partners or ask your Account Manager for more information about the spectrum of technologies that we can deliver and the Partners we engage with.

BRIDGING

Page 65: Bytes Magazine Spring_Summer 2013

What’s New?There are some features that are new for 2013, and some that we already had on premise that are now ‘new’ to the cloud. Some of these were reasons people weren’t moving to the cloud last year. And some of these will be reasons people will want to jump from old 2003/2007 on premise systems straight to 2013 in the cloud.

Exchange Online 2013:Public Folders. Yes this still is one of the biggest reasons people wouldn’t consider Exchange Online, because they just couldn’t get rid of their public folders. Well, Exchange Online 2013 gives you full support for them and you get all the shiny new features that come with them.

Team Mailboxes. This one is a combination of Exchange and SharePoint online and is a fantastic new development to bridge the gap between the two systems. Ever wanted a document library from your team site in Outlook, or email from your project mailbox to show in SharePoint? Now it’s possible!

Outlook Web App (OWA). Offl ine and it’s got Apps. That’s right, what used to be the lightweight web based email access for those people without the ‘full fat’ Outlook is now a fully featured, Lync chat integrated, App extended, pumped up mail client that rivals the desktop version. With HTML5 caching technology you can now take your OWA session offl ine to read emails on the plane, compose

new emails, and then have it all sync and send when you have internet access again. Just like the real thing.

Compliance & Reporting. A long time weakness of cloud systems, now Offi ce 365 has full audit reports so you can see what your admins (and Microsoft’s admins) are doing in Exchange Online. Brand new features for Data Loss Prevention can stop emails containing credit cards or sensitive information from being sent and allow you to popup messages telling the user why you disabled their Send button.

SharePoint Online 2013:Sky Drive Pro. Up from 500Mb to 7Gb for each user My Site, you can ditch your on premise ‘Home Drives’ for users and push that content to the cloud. Each user’s 7GB doesn’t count towards your overall SharePoint Online pooled storage.

Real Collaboration. You can now invite people outside your company, such as vendors, business partners and customers to view, share and work with content in your SharePoint sites. This can be from whole sites, to individual documents. For security

reasons this level of sharing needs an Offi ce365 or Windows Account, the User SkyDrive Pro area can allow ‘guests’ to collaborate.

Apps. Want a new fancy ‘something’ for your SharePoint Online? Well there is a store for that. Microsoft’s or your own lack of ability to run custom applications in SharePoint online was a massive gap between the on premise version. Now the cloud gets a long asked for feature to please your developers and those who just want to customise everything.

Lync Online 2013:Conference and video upgrades. Lync conferencing management has a new interface that allows large conferences to have pictures of those people attending. When someone speaks, their image rotates to the centre of the screen so you visually know who is talking. HD video updates also mean you don’t need to buy expensive dedicated conference hardware for your boardrooms when your laptop can achieve the same.

Skype connectivity. Lync users can see the presence information of Skype users as well as initiate IM and VOIP calls. Connecting to your external clients and collaborating with non-Lync users just got easy.

Lync Web App. From a PC or MAC you can join a Lync Meeting from within a web browser and get the full meeting experience, including: HD Video, Voice over IP, IM and desktop sharing. All without any installation.

Lync for Mobile devices. Windows Phone, iPhone, iPad or Android. You can now join meetings, send IM instant message or email with just one touch. For those with ‘Lync to phone’ you can even dial a land line number over a wireless network and pay no call charges (requires specifi c Lync 3 plan).

www.bytes.co.uk | 65

more about Offi ce 365 or how Bytes and Parative can help you to implement it, please speak to your Bytes account manager on 020 8786 1500.

fi nd out...

Page 66: Bytes Magazine Spring_Summer 2013

66 | spring/summer 2013

This trend is exacerbated by the ever-evolving landscape of the technology available to organisations. This is underlined by the amount of new technology that has been released by Microsoft in the past 12 months, with major technology releases in Windows Desktop and Server, System Center and upcoming release of Offi ce 2013. Given their huge investment in R&D, this is a trend set to continue throughout their existence.

To assist IT in building the business proposition to deploy latest technology and secure funds for future IT projects, Risual, a Gold Certifi ed Microsoft Partner has taken its experience in this area and wrapped clear business benefi t into offerings which extract away from the underlying technology. This gives a strategic approach to embracing these new technologies, thus increasing the return on investment by delivering early in the product lifecycle.

These customer ready strategies are outlined below:

Enterprise End User Compute (EUC)Organisations want a Flexible Work style for each of their users, which is delivered by a set of products, and services that gives those users agility, fl exibility and is user centric in its nature. When delivered, this gives the business increased productivity, governance and security, and provides

predictable cost management. This strategy leverages industry frameworks such as ITIL and Microsoft Operations Framework (MOF) and embraces trends such as Bring Your Own Device and VDI. This eventually is delivered by a set of technology components and business processes that are made available through the Microsoft agreements and include core components such as Windows Desktop, Windows Server, Desktop Optimisation (MDOP), Offi ce and Lync.

Optimised Service VisionAs organisations mature, IT in effect evolves into a Service Provider, and the users become Service Consumers with specifi c requirements around Self Service, delegated control, pay per use and have a business fi rst approach. This can be wrapped by a Service Level Agreement to ensure the right level of investment to address the business need. To deliver against this, the Service Provider can leverage several service models including Infrastructure as a Service (IAAS), Software as a Service (SAAS) and Platform as a Service (PAAS) and the delivery mechanism can be via Private, Hybrid or Public cloud services. Today Microsoft helps deliver against these requirements with a blend of

on-premise and cloud services that include Windows Server 2012, System Center 2012 and Azure.

Connected BusinessWith the explosion of data and the challenges with storing, making intelligent decisions based upon reliable, up to date information is essential to every organisation to maximise business opportunity. Whether that be real-time voice communication, trend analysis of historical data or planning for future investment, getting the right information to the right person at the right time is essential. Communicating to the business how this can be delivered by using Microsoft backend technologies such as SQL Services, SharePoint and Lync and surfacing that into the right endpoint device be that Windows 8 touch screen devices or even Point of Sale devices, having a strategy to deploy these technologies is how the Connected Business strategy can assist.

By having a strategic approach along with a clear methodology in designing and deploying technology solutions, Risual can assist in building the business justifi cation for change and help you gain the maximum return on your IT investment.

the business

NEWtechnology

information or to book a free half day session on the above strategiesspeak to your Bytes account manager on 020 8786 1500.

for more...

there is a long-standing challenge in linking business objectives to It projects. Quite often, there are two very different languages spoken within the same organisation and despite common goals, relating It investment to tangible business return is diffi cult.

proposition for

Building

partners

Page 67: Bytes Magazine Spring_Summer 2013

there is a long-standing challenge in linking business objectives to It projects. Quite often, there are two very different languages spoken within the same organisation and despite common goals, relating It investment to tangible business return is diffi cult.

The business case for Lync Enterprise VoicePublic sector organisations must therefore fi nd innovative ways to get more done with less. The key lies in mobilising staff and boosting their productivity by enabling them to connect with colleagues, information and resources whenever they need, wherever they are.

InterCall Enterprise Voice, running on the Microsoft Lync, the unifi ed communications (UC) platform, can play a central role in transforming public sector processes and budgets – here’s how. The typical organisation has multiple sites, gained either through organic growth or by merging with neighbouring bodies. Over time its communications environment grows increasingly complex with different types of private branch exchanges (PBXs) installed and a signifi cant number of expensive integrated services digital network (ISDN) connections in place. This scenario drives up both capex and opex costs because equipment from different manufacturers must be maintained throughout its life and then replaced. Then there are the associated costs of employing and training in-house technical staff to manage these technologies and their gateway protocols.

The answer is a tailored unifi ed communications migrationThe InterCall approach tailors Lync implementations to customers’ needs. It allows for either a wholesale deployment or a step-by-step migration that optimises the investment in existing assets.

Over time, disparate PBX technologies can be integrated into one central administration directory service. When they reach end of life, they are replaced by Lync’s internet protocol capabilities, creating a hybrid communications environment that can be rolled out as user demand dictates.

The benefi ts of the InterCall approachThe technology estate is simplifi ed and management costs reduced. Fewer PBX maintenance contracts will be required, less time will be spent managing heterogeneous technology and support staff can be redeployed to more business critical projects.

In addition to the technological benefi ts, InterCall Lync Enterprise Voice helps public sector organisations to achieve many of their strategic objectives, including a commitment to environmental responsibility. For instance, with Lync’s conferencing and collaboration capabilities employees can work seamlessly from remote sites, cutting transport emissions.

Remote working can also help to address work-life balance for many employees, enabling employers to retain highly skilled, experienced staff. More remote workers means real estate can be sold which delivers cashable income and signifi cantly cuts overheads.

Thanks to InterCall’s exceptional knowledge of Lync, gained as a member of Microsoft’s partner innovation community in Redmond, the US, one InterCall client in the North West of England immediately saved 30%on its overheads. An additional 20% saving was delivered in the following years and it increased the number of mobile workers by 40%.

Key Features• implementation tailored to customer needs• simplifi ed technology estate• reduced management costs

www.bytes.co.uk | 67

more about InterCall or Lync, speak to yourBytes account manager on 020 8786 1500.

fi nd out...

InterCall’s Lync Enterprise voice solution re-engineers the meaning of communication.

The strategic imperative for European public sector organisations is to cut expenditure with as little impact on frontline services as possible.

Lync Enterprise

Page 68: Bytes Magazine Spring_Summer 2013

partners

68 | spring/summer 2013

For mission-critical applications and large-scale data warehousing, the Enterprise Edition of SQL Server 2012 provides SQL Server AlwaysOn, a unifi ed high-availability and disaster-recovery solution. xVelocity in-memory technology delivers up to 100 times the previous performance, and fi ne-grained data access controls help facilitate compliance.

Equally, SQL Server 2012 is cloud-ready – which means organisations can deploy solutions locally, then move them to the cloud without technical or licensing restrictions. Connection points in SQL Server 2012 provide easy access to the Microsoft Azure Platform, and the software is also fully interoperable with private clouds.

Finally, SQL Server 2012 Business Intelligence Edition offers in-built business intelligence capabilities, combining highly scalable data warehousing with self-service analytics tools for interactive data exploration and visualisation. IT departments are under increasing pressure to make it easier to access and analyse rapidly growing amounts of data. Business users want intuitive reports and analytics at their fi ngertips, to help them spot trends and make informed

decisions ahead of competitors. For IT staff, the fi rst challenge is to provide a single version of the truth, based on the right data at the right time in the right format. The second challenge is to do this in a resilient, effi cient, cost-effective and sustainable way that empowers users with self-service tools.

With more than 20 years of experience in delivering major data warehousing and analytics projects, Northdoor has excellent knowledge of both the technical and business aspects of business intelligence. This includes deep technical expertise in all aspects of designing, deploying and running SQL Server environments for analytics and business intelligence.

To add value around its licensing services and help its clients maximise their return on investment, Bytes has appointed Northdoor as its services partner for Microsoft SQL Server.

Northdoor has a proven

track record ofsuccess in SQL

Server projects, shown in numerous client

references.

For example, Northdoor recently designed and implemented a complete business intelligence solution from scratch for Stenham Asset Management (www.stenhamassetmanagement.com). This fund manager wanted to make better investment decisions for its clients based on large volumes of fund and market data, and also to ease reporting to both clients and regulators. By deploying SQL Server 2012 BI Edition as the data hub (taking feeds from multiple internal and external sources), integrated with SharePoint for static reporting and interactive analytics, Northdoor provided a solution that is comprehensive, user-friendly and easy to support.

Microsoft SQL Server 2012 is designed to help organisations gain a competitive edge through better use of business data. This major release of the software offers new capabilities in three key areas: enterprise-class resilience, scalability and performance; full readiness for cloud deployment; and in-built business intelligence functions.

SQL Server 2012:enterprise-class,

built for BIcloud-ready&

About NorthdoorNorthdoor is a long-established mid-market systems integrator and consultancy, with expertise across the full Microsoft enterprise technology stack. Holding several Microsoft Gold Competencies, including one for Business Intelligence, Northdoor provides end-to-end business solutions built on SQL Server 2012, ranging from consultancy and design through to implementation and support.

more about how Northdoor can assist with your business requirements, speak to your Bytes account manager on 020 8786 1500.

fi nd out...

Page 69: Bytes Magazine Spring_Summer 2013

We’ve listed a small selection of some of the events being run or attended by our manufacturers in 2013. These events offer a perfect opportunity to meet the experts and also to network and swap ideas with peers. If you would like details of any other manufacturer events not listed here, please speak to your Bytes account manager who will be happy to assist you.

Citrix Synergy 2013: Los Angeles 22nd-24th May 2013, London 23rd – 25th October 2013The conference will present the latest solutions for mobile workstyles and cloud services. Synergy will showcase the newest mobility, virtualisation, cloud, networking, and collaboration technologies from Citrix and other leading IT companies. Synergy is renowned for insights into macro IT trends, professional networking and intensive technical training - all presented in a community-focused atmosphere. This three-day event provides unmatched value to IT professionals at all levels, from executives to administrators.

To fi nd out more about the London event: www.citrix.co.uk/events/citrix-synergy-2013-london.html

manufacturersmeet the

VMworld 2013: San Francisco, 26-29th August 2013, Barcelona 15-17th October 2013Learn about the latest virtualisation technologies and strategies which can help your organisation realise its vision for a cloud computing approach to IT. In VMware’s words: “Don’t miss VMworld 2013 - where IT and business professionals learn how to navigate the daunting world of cloud computing. Not only does it demand a new level of innovation and performance, it requires the confi dence to push system and software delivery to the next level. Get the tools and training you need to master this new landscape, with the speed, security and control you’ve come to expect. We are ready. The technology is here. And the partners are in place. Move with the boldness of the industry that never sleeps - go with the power of VMware at your side.”

To pre-register interest: www.vmworld.com/community/conference/pre-reg

Vision 2013: Las Vegas 15-18th April 2013, Nice 8th-10th October 2013This event offers hands-on labs, technical breakouts, in-depth training, and one-on-one time with Symantec engineers and product experts. You’ll leave the event with the knowledge, relationships, and inspiration you need to solve tough new IT challenges, squeeze even more value from your Symantec investment, and move your IT organisation toward a successful, productive future.

For information on this event: www.symantec.com/vision/

www.bytes.co.uk | 69

InfoSecurity 2013: 23rd - 25th April 2013, Earls Court LondonInfosecurity Europe is the only European event that enables industry professionals to gather vital information about the latest trends and developments in IT security, exchange ideas and shop for products and services to create security solutions. Bringing together hundreds of providers (about 350 exhibitors) showcasing the latest product and service solutions in the ever-changing IT security arena, Infosecurity Europe provides a leading platform for organisations to address constantly evolving security issues.

For full details: www.infosec.co.uk/

IBM in the UK hosts a comprehensive range of events, fairs, exhibitions, seminars and conferences. Aimed at all IT professionals, including developers, their ‘IT Solution’ events provide information on current hot IT topics and full IT solutions, including software, hardware and services.

For more information visit: www.ibm.com/events/uk/en/

CPX 2013: Barcelona 8th – 10th April 2013, Washington DC 24 - 26th April 2013Check Point Experience is Check Point’s annual conference to bring together customers, partners and industry leaders to discuss the latest technologies and solutions surrounding the hottest topics in Internet security.

To fi nd out more visit: www.checkpoint.com/experience/2013/

Oracle OpenWorld 2013: 22nd – 26th September 2013, San FranciscoYou’re sure to discover new ways to optimise your systems, new solutions that will help you take your business to the next level, and new practices that will make you more successful in your job and in your industry.

To fi nd out more: www.oracle.com/openworld/index.html

IP Expo: 16-17th October 2013, Earls Court, LondonIP Expo is the biggest end-to-end IT infrastructure event in the UK. It receives visitors from both the private andpublic sectors and due to the quality of the keynote speakers and exhibitors, it’s of particular interest to those at board level, and those involved in IT stragety, management, implementation and infrastructure.

For more information visit: http://ipexpo.co.uk/

Page 70: Bytes Magazine Spring_Summer 2013

case study

casecasestudyInternational Law fi rm, Linklaters LLP, engaged Bytes Software Services’ training division to help deliver 1,200 training sessions in support of their global migration to Microsoft Offi ce 2010.

The ChallengeTo provide Linklaters with a fl exible and varied training solution across 27 offi ces globally, in support of their highly critical Microsoft Offi ce 2003 to Offi ce 2010 migration project.

During initial discussions and a formal presentation process, Linklaters were given a variety of learning options to mix and match, that included classroom, seminar, online and workshops in order to meet their organisational structure requirements.

Linklaters’ chosen blended training approach was to use both traditional and distance learning, which catered for their international offi ces and those working outside of normal working hours. Training session content needed to range from basic skills in all Offi ce 2010 applications, to the more advanced sessions such as enhanced Excel and Visio 2010.

over a fourweek period 5000

in 27offi cesstaff trained

spanning 19 countriesaround the globe

Jay BabikerStrategic Client Director, Bytes

in 27offi cesspanning 19 countries

70 | spring/summer 2013

Page 71: Bytes Magazine Spring_Summer 2013

Different formats were also required to suit employees’ heavy and time consuming workloads, as well as being able to span across different time zones.

All training delivery and materials needed to be bespoke, to refl ect the customised applications used within the law fi rm.

Our challenge was to source a team of Microsoft certifi ed global trainers with the ability to deliver training in fl uent English as well as the local language. They also needed to be fl exible towards travelling to other regional offi ces and profi cient in various styles of delivery in order to ensure that the Linklaters training budget was maximised at all times.

Project administrators in the form of on-site personnel in the UK and Asia were required to manage training bookings, cancellations and offi ce logistics, as well as handling queries from trainers and learners on a 24/7 basis across the globe.

The Bytes SolutionWorking alongside our global training partners, we conducted a large recruitment campaign, sourcing trainers for each offi ce to deliver classroom training in English - with an understanding of the local language. In order to provide a real time and an online solution for employees, web conferencing sessions were planned across the 3 time zones of Asia, Europe (including UK) and the Americas.

To ensure that the trainers were familiar with Linklaters’ customised use of applications and to have an understanding of their learning culture, a two week intensive induction programme was arranged ahead of the roll out. In addition, a team of backup trainers were provided to cover any cases of absenteeism.

Specialist trainers were also recruited to train a global user group on Project, Visio, and advanced Excel. This was again conducted via live web conferencing facilities.

A user-friendly 24/7 online system was provided for learners to book relevant courses which was managed by the project administrators, who were also responsible for further training deployment activities.

These included:• Scheduling course timetables• Dealing with cancellations and

re-bookings• Liaising with the relevant offi ces and

booking training rooms• Securing fl ights and accommodation

To ensure coverage of all time zones, extra resources were on hand in New York and Hong Kong to manage the scheduling of courses, under the guidance of the UK team.

The Result• 5,000 employees, in 27 offi ces,

across 19 countries successfully trained over a 4 week period

• 1,200 classroom sessions delivered• 300 live web conferencing sessions

conducted by 5 trainers• 45 trainers and administrators initially

interviewed with 29 successfully approved and recruited to the project

• 2 specialist master trainers used to teach advanced user group skills, delivering 14 specialist live online sessions within 20 days

• 2 administrators employed on a full time basis for 40 days throughout the deployment

The Benefi ts:From an initial consultation and tendering process, to the above results being achieved, the Linklaters Offi ce 2010 migration training project ran according to the agreed schedule throughout and within budget.

Bytes Software Services were able to provide us with a fl exible approach in providing a team of high quality and appropriately qualifi ed trainers to deliver training in a number of our offi ces. They quickly understood our requirements and provided us with a robust and well supported solution.

Sue HallLinklaters Director of ISS

Company: LinklatersIndustry: LegalCountries: 19Revenues: £1.2dnEmployees: 5000Website: www.linklaters.com

Bytes Solutions Provided:• A team of Microsoft certifi ed global trainers to

deliver courses in English and local languages• Bespoke training delivery and materials• 24/7 scheduling support• Onsite Training Administrators to manage

scheduling and logistics of training• 27 trainers to deliver 1200 classroom sessions

in 4 weeks

Key Benefi ts:• Large, established network of training partners

meant that highly skilled, multi-lingual trainers were quickly made available

• A fl exible approach with a willingness to plug skills where required

• Able to provide multiple training styles in a blended format which ensured strong uptake within a short time frame

• Highly responsive escalation process

customer profile

www.bytes.co.uk | 71

hear what our customers think about uswww.bytes.co.uk/bytestv

TVBYTES

Page 72: Bytes Magazine Spring_Summer 2013

interview

in thehotseathotseathotseatin thehotseatin theWhat was your fi rst job in IT & what year? I was a Computer engineer fi xing Tank IT systems, then fi xing Cheftain Weapon guidance systems in the army, so early 1980’s.

What is your current job title? Head of Alliance and Channels UK and Ireland.

In a nutshell what does your current job entail? Managing 1500 registered Oracle partners via 4 Sales Directors who deliver $650million, over 60% of Oracle UK revenue. These Sales directors manage 32 Partner Managers who have the responsibility of delivering incremental revenue to Oracle from new territories driving Applications, Technology and Hardware revenues. I am a UK Board member and the only member of the board with a compensation plan for all 2346 Oracle products.

What do you think was the single biggest & most benefi cial infl uence on IT in the last 20 years and why? The Internet; it has transformed every vertical industry and has actually given IT a place in the Boardroom. Why? ...because of its ability to reduce cost or increase revenues through smarter and more agile business fl ow.

What do you think will be the next ‘big thing’ in IT & why? Big Data – Because the “Internet of things” will be capturing Petabytes of data and the key to unlocking the commercial value from all this data will be through IT Analytics. The advent of social media will only increase the amount of data to be stored, it’s just growing and growing but how do we monetize it?

In this feature we interview a senior fi gure from the world of IT. We ask them a bit about their view of technology from their perspective, but mostly we like to be nosey and fi nd out about the person behind the job title!As a child what did you want to be when you grew up? I wanted to be a soldier.... and I was. I did 14 years in the Army and left in 1995 to join Azlan (VAD). The reason I wanted to be a soldier was: I would get my own bed - I was sick of having to share with my brother.... we were poor in Newcastle in 1980.

What was your fi rst job? Cleaner, my family managed pubs in Newcastle so I was the bottle boy and the cleaner for my dad. I was 12 when I started this, I used to do it before I went to school.

72 | spring/summer 2013

David TweddleHead of Oracle Alliance and Channels UK and Ireland

Page 73: Bytes Magazine Spring_Summer 2013

What piece of technology could you not live without & why? My Motor home, I class it as technology because it has a fl at screen telly. If I didn’t have this vehicle I would go mad. It’s my sanctuary and enables my wife and I to get away on the bikes and in the kayaks.

If you could have lunch with three famous people past or present who would you choose & why? Sir Winston Churchill - In the darkest days of the Blitz and the Battle of Britain he had to make some tough decisions, like allowing the bombing of Coventry........ I would ask “how do you reconcile with the hard choices?”Dave Brailsford – UK Cycling Director, the man responsible for managing Sir Bradley. How does he think, what does he say to motivate and inspire these world class athletes? What drives him?Jesus Christ – Wow, how many questions would I have for him and his theories, like what’s his view on Darwinism? How was the earth created in 7 days? What was it like being the only person to come back from the dead?

What was the last book you read and what did you think of it?1027 amazing facts from QI – I retain stupid facts and this book is amazing, did you know an octopus has 3 hearts?Peter James Dead series, very interesting with good sub stories and its UK based so it’s easy to associate with the places and behaviours.

What is your favourite TV Programme?

Ringside, it’s a Boxing show at 7pm on Thursdays, it inspires and motivates me. It also makes me realise that I am not the only person in the world that gets punch drunk after a session at work, well that’s how I feel after 3 forecast calls in 4 hours sometimes.

What is your greatest achievement? Delivering my three children to success in their lives. Two now work for Oracle and one is a director in a fl ooring company, they have all moved out and delivered two grandchildren......... my work here is done, I am spent.

What are your hobbies? My Family. The Gym, I use Calorie counter to help me manage my exercise, I do on average 7,000Kcal in the gym or on my bike in a week.I have just started Bikram Yoga, hot yoga, wow its tough!

Do you have a favourite saying or motto, if so what is it? If you’re going through hell, keep going. – Sir Winston Churchill.

What is your favourite biscuit & why? 4 Finger KitKat – I bite the thick chocolate off the end and then dip it my tea and allow the chocolate to melt as I eat it. I have one every day in the afternoon.

If you were asking the questions for this piece, what single question would you ask? What have you done today to inspire someone or make a difference to someone else’s life?

....and what is your answer to the above question? As a Samaritan (not in the slightest religious) I will be working with suicidal prisoners in Reading jail tonight. They are not all bad lads and given guidance they will change.

If you could trade places with any other person for a week, famous or not famous, living or dead, real or fi ctional - with whom would it be and why? My wife, just to see if I am as big a pain in the backside as she says I am. Plus I could see if I really do snore, because I have never heard myself do it.

If you were given a month off and the money for the fares and accommodation, where in the world would you go and why?I would spend the time in that well known holiday resort..... Reading! I would choose this so I could have my family around me, go for walks and take my grandchildren swimming. So I would take the money and stay at home - that is where I am happiest.

What would be your 8 ‘desert island discs’? (and which ONE track would you choose if only allowed one)Stairway to Heaven – Led Zeppelin, And I love you so – Elvis, Insomnia – Faithless, Firestarter – Prodigy, Have I told you lately that I love you - Van Morrison, Mr Blue Sky – ELO, The fog on the Tyne is all mine – Gazza. If I was only allowed one track, it would

be English Rose by the Jam, it’s just an amazing track - it resonates with my loving of home.

What and whereis your favourite

restaurant?The Chinese at Woodley shops (WantWant Chinese). It’s easy, it’s close and it knows exactly what I like! Also, the people in there are real, unlike some of the “trendy” City places I frequent on a weekly basis.

www.bytes.co.uk | 73

David TweddleHead of Oracle Alliance and Channels UK and Ireland

As a Samaritan (not in the slightest religious) I will be working with suicidal prisoners in Reading jail tonight. They are not all bad lads and given guidance they will change.

the above question? As a Samaritan (not in the slightest As a Samaritan (not in the slightest religious) I will be working with suicidal prisoners in Reading jail tonight. They are not all bad lads and given guidance they will change.

Page 74: Bytes Magazine Spring_Summer 2013

Software vendors offer a

huge range of products and

solutions on a try before

you buy basis, below is a

small selection of some of

the most popular:

Beforebuy

tryYOU the most popular:

74 | spring/summer 2013

A broad range of Oracle products available for educational and trial purposes are available free of charge at:www.oracle.com/technetwork/indexes/downloads/index.html…If you already have a commercial license you should use the Oracle Software Delivery Cloud located here:https://edelivery.oracle.com/

Put Sophos products to the test at:www.sophos.com/en-us/products/free-trials.aspx

Offers a comprehensive range of trialware on its site:www.symantec.com/en/uk/business/products/downloads/index.jsp

A good selection of Trend Micro products available to download here:http://downloadcenter.trendmicro.com/index.php?regs=uk

Download and evaluate VMware Desktop and Datacenter products from:www.vmware.com/tryvmware/

Live and video online demos + evaluation products available at:www.websense.com/content/evaluations.aspx

Trial versions of McAfee SaaS Endpoint Protection Suite & McAfee SaaS Total Protection + several others are available at: www.mcafee.com/us/downloads/downloads.aspx

A comprehensive Trial centre, providing downloads of many Citrix products:www.citrix.com/downloads.html

For a 30 day evaluation of Becrypt software, register your interest here:www.becrypt.com/evaluation-request

Offers a broad range of products on a trial basis, to view the current selection visit:www.adobe.com/uk/downloads/

Offers various free trials on its site located at:www.checkpoint.com/products/trials/index.html

Download a free 30 day trial of Good for Enterprise at: www.good.com/resources/trygood

Kaspersky offers 30 day trials for several of its products across the small offi ce, business and corporate spectrum. www.kaspersky.co.uk/trials

Try LANDesk’s top selling products before you buy them or read what analysts have to say about LANDesk.www.landesk.com/downloads/

To trial a broad selection of Microsoft software and service packs visit:www.microsoft.com/downloads/en-us/default.aspx

To try RSA secureID for free visit:www.emc.com/security/index.htm

Offers a free download of Veeam ONE for VMware andHyper V at:www.veeam.com/vmware-esx-reporter-free.html

regular

Page 75: Bytes Magazine Spring_Summer 2013

BYTES SOFTWARE &LICENSING SERVICESUK and Global Software Licensing Experts

now and years into the future. Bytes can make this a reality by analysing your IT infrastructure and comparing it to growing trends in the market, allowing us to recommend licensing agreements that are both cost-effi cient and fl exible enough to grow with your business.

Bytes International LicensingInternational companies with a global software requirement will benefi t from our specialist knowledge of international licensing. We are highly experienced in handling the myriad of different approaches to managing ICT systems internationally, helping you to overcome the technological and cultural barriers to local adoption. In order to gain you the best price possible, we can also use the foreign exchange markets to purchase the software in the most cost-effective currency.

The Bytes PortalEverything comes together through the BytesPortal, including:

The Service Desk – a quick and easy communication channel into Bytes.

Online Ordering – purchasing your software has never been easier, and the fl exible system is entirely tailored towards your company’s needs.

Contract and Maintenance Management – existing licences are tracked with a traffi c light system and warnings issued when the licence renewal dates are approaching. During each stage of the process the system feeds back information, which we can use to negotiate favourable rates for software renewals.

Bytes Software Licensing ServicesWith over 600 different vendors to choose from, and with over 20 years’ experience providing software solutions to businesses, Bytes is perfectly positioned to meet your software licensing needs. Amongst other benefi ts, Bytes utilise their purchasing power and strong relationships with software vendors to negotiate the best possible rates, whether it’s volume licensing or specialist software.

But we’re not simply about maximising your procurement budget. All of our team are experts in software licensing which enables us to provide you a truly focussed level of software licensing knowledge and support. We provide information about current software enhancements and other announcements as they happen and can recommend the solutions from established and emerging technology vendors.

But of course, the key benefi t to you is how much we can save you. By

analysing and assessing your current software usage (see our TLC offer below) we can re-shape your license model to fi t prevalent

vendor discounting offers, and by using our intimate knowledge of vendor license agreements we can maximise the right deal for all parties.

Imagine a situation in which your software requirements are accurately predicted both

“Bytes have helped Tesco make signifi cantsavings by effective and intelligent management of our licensingentitlements.They manage ourglobal requirements,are able to keep us abreast of new and relevant licensing changes and apply these to our requirements ensuringwe are always licensed in the best way possible”.James McNulty,Head of Tesco Group IT Procurement

Mandi NicholsonBytes Sales Director

about Bytes Software & Licensing Services and SAM services, please speak to your Bytes account manager on 020 8786 1500.

learn more...

www.bytes.co.uk | 75

Page 76: Bytes Magazine Spring_Summer 2013

“ Throughout the SAM process, Bytes demonstrated a tremendous level of knowledge and provided us with an extraordinary service. They’ve proved their value to the firm and have earned their place as one of our trusted business partners”.Brian Lunnon, IT Manager, Martineau Johnson

76 | spring/summer 2013

BYTES SAM SERVICESSoftware Asset Management isn’t just about compliance, it’s importance in large corporations for increasing performance and profits is becoming clear.

Software Asset Management has been a necessary consideration for large companies for the past ten years, and Bytes have been at the forefront of this industry since day one. Many companies claim to offer SAM, but very few prioritise it as a core service. We are a Microsoft Gold Partner for SAM and were instrumental in establishing the ISO19770 standard in 2007.

For companies that are using, or looking to use a Software Asset Management company, Bytes have three packages that will ensure your company is maximising the efficiency of its software estate. Taking one package does not restrict you from utilising parts of another; in fact many of our clients will later pick and choose various products from within another service range because either their internal structure changes, or because they find they waste less time, resources and money by outsourcing some of their SAM requirements to us.

1. A Software License Review (SLR): The first package is a full software asset audit, which gives companies a clear picture of their current software portfolio status and a definitive account of software users. We can utilise your existing SAM software, such as Altiris, SCCM, LANdesk, to name but a few, or we can use our own system to conduct the review. Fundamentally this package is designed for customers that need to inventory their software assets either for compliancy reasons, or to ensure they are making full use of their software investment. In both instances it is imperative that a completely accurate picture is generated from the audit, and Bytes will provide you with exactly that.

2. Asset Management Platform (AMP):For a continual overview of your software portfolio, we can supply and implement one of the world’s most respected SAM platforms – Snow License Manager. Snow License Manager is fully ISO 19770 and ITIL compliant and comes highly recommend by us. This package principally involves supplying and implementing the software; however, we can also provide both technical support and assistance with system controls and data entry.

3. The Bytes Asset Management Service (AMS):For those who do not have the time or resources to manage their software portfolio, Bytes offer a fully managed SAM solution. From initial audit and installation of an Asset Management Platform, we can take total control over usage, licenses, vendor audits, procurement and end-of-life software. To augment this service we have created a bespoke online resource that allows you to monitor and control your software estate in real time. The Bytes Portal is easy to use, extremely practical and very cost-effective.

Chris Hibbert Bytes SAM General Manager

Page 77: Bytes Magazine Spring_Summer 2013

Bespoke training

If you need something that’s not ‘off the shelf’, let us know what you are looking for and we can put together a training solution to fit. Whether it’s a mix of technologies and vendors or the need for tailored on-site or off-site courses we can help.

eLearning

The most cost and time effective method of on-line training available. Whether it’s standalone or as part of a blended training solution, eLearning courses can provide the most flexible solution. All our eLearning courses are provided by our training solutions partner, Arc IT Training.

Training Budget Services

To help our customers maximise their training budgets, we offer a range of services designed to fit a variety of budgets and payment systems. Prepayment discounting and price freezing along with prepayment budget management are some of the payment methods offered.

In 2010 Bytes organised 2,786 courses across 400 companies, in both the UK and internationally. Our independent position, coupled with our extensive knowledge and close relationships with all major vendors, means that we can source the highest standard of courses covering all formsof software learning, management and personal development. We can cater for all requirements and budgets, utilising our buying power to offer our customers the best rates.

Our Learning Solutions team was established in 2000 and continues to grow as the importance of software and management learning becomes recognised. Our experience, systems and partners, means that whatever the course you’re looking for, we’re confident we can find it for you in less time and at lower cost.

The range of trainingcourses offered:• Vendor specific courses including

Microsoft, Oracle, Unix, VMware, Adobe, Citrix, Symantec, Cisco, Juniper, Novell, IBM, Lotus and many more.

• Management & Personal Development.

• Information Technology Areas including Virtualisation, Infrastructure, Networking, IT security, PC Maintenance, Software Licensing.

• Data & Telecommunications.• Project, Programme & Service

Management including Prince2 and ITIL.• Desktop Applications from Adobe,

Lotus, Microsoft to bespoke.

BYTES LEARNING SERVICESFinding the right training course for you and your organisation just got easier!

Bytes offer a range of learning services to meet our customer specific requirements:

Bytes Licensing Academy

We offer two courses: ‘Licensing Essentials’ and ‘SAM Best Practice’. The Bytes Licensing Academy has been developed for our customers to help understand the complexities of software licensing and software asset management. These half day courses - vendor-specific or generic - are run by Bytes and they are for both the novice and experienced.

Bytes have consistently provided us with an excellent service. It is invaluable for us to have a supplier with such impeccable professionalism”Brian Lunnon, IT Manager, Martineau Johnson

www.bytes.co.uk | 77

about Bytes Learning Services, please speak to your Bytes account manager on 020 8786 1500.

learn more...

Page 78: Bytes Magazine Spring_Summer 2013

awards

A small selection of some

of the awards we have

won recently:

&Key achievements

awardsawardswon recently:

awardswon recently:

awards

Adam ThorntonManager, Vendor Solutions Team, Bytes

CRN Enterprise Reseller ofthe Year 2012Winner

Microscope Innovative Reseller of the Year 2012Winner

National BusinessAwards 2012Rating: Excellent

78 | spring/summer 2013

Adam ThorntonManager, Vendor Solutions Team, Bytes

• Microscope Innovative Reseller of the Year 2012 - Winner

• CRN Enterprise Reseller of the Year 2012 - Winner

• Microsoft Corporate Accounts LAR Partner of theYear 2012 - Finalist

• National Business Awards 2012 – Rating: Excellent

• European Check Point Reseller of the Year 2011 - Winner

• Xerox Premier Partner of the Year 2012 – Winner

Our vendor team is made up of a number of specialists who are dedicated to specifi c vendors and technology areas. Acting as an overlay to the account managers, they ensure that our customers receive the best advice on the solutions available and negotiate hard with vendors in order to receivethe most competitive cost.

Security Partnerships has long been a key partner for Check Point, and the acquisition by Bytes Technology Group will further strengthen our relationship. The company adds real value in the solutions it delivers to customers, using Check Point technology to simplify complex security challenges.

Terry Greer-KingUK Managing Director, Check Point

Xerox have been working with Bytes for 30 years. As our longest serving and largest partner across Europe and Africa they are always professional, dedicated and offer exceptional service, with customer satisfaction their number one priority.

Mark DuffelenDirector & General Manager, UK Channels Group, Xerox

accred itations

Page 79: Bytes Magazine Spring_Summer 2013

Key achievementsaccred itations

accreditations

www.bytes.co.uk | 79

Platinum Partner Authorised Partner Premier Partner Platinum PartnerAffi liate elite Partner Premier Partner

Strategic Partnerships

Strong Relationships

Bytes are one of our most proactive and dynamic partners and work with us and our mutual clients to deliver very high levels of service. They have continually demonstrated a fi rst class knowledge of the products and solutions to the clients with the customer’s business priorities at the forefront of their minds.

Jeremy KeefeDirector ERM Sales and Marketing UK, Citrix

Gold solution AdvisorGold Partner Gold Partner Gold PartnerGold Certifi ed Partner(Volume Licensing & sAM)

Platinum Partner

Gold Partner Gold Partner Partnerenterprise Partner Authorised Partner Premier Partner

Gold Partner silver Partner Registered Partner Authorised Partnersolution Provider Partner

Authorised Partnersilver Partner VAR Partner silver Business Partner Business Partner silver Partner

Certifi ed PartnerAuthorised Partner expert solutions Provider Authorised Partner Business Partner Premier Partner

service Provider Gold PartnerApproved Corporate Reseller Gold PartnerRed Hat Ready Gold PartnerPlatinum Partner

service Provider Gold PartnerPremier Partner Gold PartnerGold Partner Gold PartnerGold Partner

service Provider Gold Partnersilver Partner Gold PartnerGold Partner Accredited PartnerAffi nity One Partner

Page 80: Bytes Magazine Spring_Summer 2013

EAS P L ATLPCLPECIEAPSASELECTPLUS

Since 1982bytes.co.uk

making software licensing clear since 1982

Bytes has been

Bytes magazine adverts x3.indd 3 27/02/2013 11:51