Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
REVIEWTHE
An in-house publication by Aptec – an Ingram Micro Company Business insights for IT solution providers
06Microsoft Customized cloud solutions for enriched customer experiences
16OracleMinicluster: simple, secure and efficient
25 McAfeeIntegrating Machine Learning into endpoint security strategies
INSIDE
OCTOBER 2017
Convergence of cloud and security
Exploring channel opportunities
Vendors and Contact Information
Aptec - GCC
Dubai Internet CityP.O.Box 33550Tel: (+971 4) 3697111Contact: Svetlana SorokinaEmail: [email protected]
Aptec – Egypt
KM 30 Cairo, Ismailia Desert Road ,Al-Obour Investment Complex, Al-Obour City, Cairo, Egypt Tel: (+2) 24772156 / 24772157 / 24772159 Contact: Mohamed Selim Email: [email protected] Ingram Micro– Lebanon
St. Georges Square Blk A Floor 1Jal-El-Dib, Beckanaya Str., LebanonTel: (+961) 4718817Contact: Elie Abou EmaanEmail:[email protected]
Aptec – Oman
Knowledge Oasis Muscat Building 4P.O.Box 100, Rusayl, OmanTel: +968 96429250Contact: Shivanand PalaniprasadEmail: [email protected] Aptec – Saudi Arabia Office 519, Akariya Bldg. 2, Olaya Rd P.O. Box 94609, Riyadh 11614, Saudi ArabiaTel: +966 11 460 1950 Contact: Mohammed Sheikh Email: [email protected] Ingram Micro – Morocco
Lot.33, La Colline 2, Immeuble les Alizés,Bureau 302, Sidi Maarouf, Casablanca, Morocoo Tel: +212-522 786 171/+212-522 786 223Contact: Nouha DoudouhEmail: [email protected]
Ingram Micro – Pakistan
Ingram Micro Pakistan (Private) Limited,Suite# 1310, 13th Floor, Caesars Tower,Shahrah-e-Faisal, Karachi, PakistanTel: +9221 32786675/ 32783209 Email: [email protected] Ingram Micro – Turkey
Suleyman Seba Card82 / 3 Macka 34357Istanbul, TurkeyTel: (+90 212) 259 0064Contact: Hulya ErkamEmail: [email protected]
Contact Information
Published by
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 72
Introduction
Know more about HPE SimpliVity hyperconverged infrastructure
Dear Partners,
The advent of cloud solutions has brought the importance of security to the
forefront. We have seen the adoption of cloud gradually picking up within the
region, although lack of strong security frameworks continues to make customers
think twice before committing to the technology.
At Ingram Micro, we encourage our partners to adopt an approach that knits security
closely with all stages of cloud deployments. The channel ecosystem needs to
enhance their competencies in different areas to be able to sell these technologies
successfully. For example, they have to build their capabilities in sales and pre-sales
for solution selling, implementation, migration and project management practices. It
is imperative that partners begin looking at key technical certifications around virtual
infrastructure environments.
As a regional value-added distributor who has been taking the lead in bringing
innovative solutions to the market, our offering ranges from solutions, services and
training around best-in-breed global cloud and security vendors. These solutions
can be combined into an easy buy, implement and use approach. We are also
focusing on dedicated programs around cloud, Infrastructure-as-a-Service (IaaS) and
security to enable partners to develop their skillsets. Additionally, we ensure our
partners have access to our advanced training sessions built for cybersecurity and
end-user trainings, which can be resold by them.
Over the course of 2018, one of our objectives is to increase our focus and
investments in both, cloud and security, as the technologies become even more
sophisticated. Our partners have a definite opportunity here and we aim to work
together to address customers’ challenges in these areas. Visit us at GITEX 2017 to
have fruitful conversations around these technologies.
Ali Baghdadi
SVP & Chief Executive
Ingram Micro META
Discover Cisco CAT 9K switches to enable digital transformation
A Complete GuaranteeHPE SimpliVity hyperconverged systems
Only HPE SimpliVity hyperconverged infrastructure delivers the enterprise-class performance, protection, and resiliency that you require, with the cloud economics your business demands.As a proof point of our platform maturity and what our capabilities can do for our customers, we o�er one of the industry’s most complete guarantees including data e�iciency, protection, simplicity, management, and availability.
HyperE�icient If you use HPE SimpliVity hyperconverged infrastructure and its built-in VM-centric backup capability as outlined below, you will achieve 90% capacity savings across storage and backup combined, relative to comparable traditional solutions.
HyperSimpleUsing HPE SimpliVity user interface, which is fully integrated with VMware® vCenter™, you only need three clicks to back up, restore, move, or clone a VM, all from a single console.
HyperManageableUsing the HPE SimpliVity user interface in a central location, in less than a minute on average, you will be able to create or update backup policies for 1000s of VMs across dozens of sites.
These guarantees are available to all customers who use HPE SimpliVity 380 and are covered under the standard HPE SimpliVity 380 product warranty, which is valid for three years after delivery of the product to the customer. The warranty is described in the HPE SimpliVity 380 QuickSpecs at hpe.com/info/simplivity.
HyperProtectedIf you use HPE SimpliVity hyperconverged infrastructure and its built-in backup capability, it will take less than one minute, on average, to complete a local backup or local restore of a 1 TB VM.
HyperAvailableYou will be able to add or replace HPE SimpliVity hyperconverged systems• Without any downtime for local or remote sites.• Without any disruption to local or remote HPE SimpliVity backups.• Without any reconfiguration of HPE SimpliVity and backup policies for local
or remote sites.• Without the need to reenter any IP addresses in remote sites.
No gimmicks, no separate contracts, no additional steps
1
3
4
5
2
HPE SimpliVity
HyperGuarantee
12
26How GFI Software and Ingram Micro alliance empowers partners
10How to protect data seamlessly across all clouds with Veritas
18
Aptec news
VENDOR AWARDS
Global Distribution Partner
of the Year 2017
Partner of the Year 2017 META @ Microsoft
Inspire Conference
Distributor of the
Year 2016 Gulf
Largest Global Coverage
Distributor Award Year 2017
Best Distributor Partner Development
Award Year 2017 –UAE & GULF
MENA Distributor of the Year Award 2017 @
VM World Partner Awards in Barcelona
APTEC ACCOLADESMEDIA AWARDS
Value Added Distributor of the Year 2017 -
Channel Middle East Awards
Networking VAD of the Year 2017 -
The Integrator ICT Champions Award
Cloud Distributor of the year –
Reseller ME Readers’ Choice Partner
Excellence Awards 2017
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 74
Aptec, an Ingram Micro company, has been
selected as a strategic distribution partner by Dell
EMC across the United Arab Emirates, Oman,
Qatar, Bahrain, Kuwait and Yemen. The expanded
relationship builds on Aptec’s current partnership
with Dell EMC and further strengthens Ingram
Micro’s relationship with the company. The Middle
East value-added distributor’s vendor solutions
offerings now provide access to Dell EMC’s full
portfolio of products, including advanced cloud IT
infrastructure, converged systems, server/storage
solutions and Client Systems.
“We are very pleased to have Ingram Micro on
board in this important market, as they are a key
player of ICT distribution who is well connected to
the partner landscape both on a global scale and
specifically in the META region,” said Mohammed
Amin, senior vice president, Middle East, Turkey and
Africa, Dell EMC.
Ingram Micro Dell EMC forum 2017 was held last
month to announce the partnership to the channel.
Centered on ‘Powering Digital Transformation’,
the forum discussed the channel strategy and
highlighted key solutions that can help partners be
profitable in the digital era.
Going forward, we will see Ingram Micro
delivering on a joint go-to-market strategy with Dell
EMC built around its key technology differentiators.
Ingram Micro has signed training partnerships with
several global vendors such as SUSE, Red Hat, Nuix,
Aruba and Kaspersky Lab over the last few months.
As part of these collaborations, Ingram Micro’s
training center in Dubai will offer instructor-led
training modules designed to help organizations
transform to digital businesses. Channel
partners will have access to vendor-authorized
certification training, which ranges from web
classes, real labs and live instructors. Partners
have an opportunity to earn considerable margins
by adding training to their end-user solutions
and reselling to their technical end clients. With
the firm’s training modules, available across
the Middle East and Africa regions, solutions
providers stand to gain significantly. Ingram Micro
Training Academy certification training prepares
partners for certification exams designed to
measure knowledge and skills related to their
field in the IT industry.
Ingram Micro aims to bring together a large
gathering of cloud and security resellers,
VARs and vendors on a single platform at
its Cloud & Security Summit. Partners can
expect to have dedicated discussions with
over 250 cloud innovators and participate in
more than 40 sales and technical educational
sessions across three days. Ingram Micro
NEW VENDOR PARTNERSHIPS
DellEMC - Middle East region
Parallels - Middle East, Turkey and
Africa (META) region
Honeywell - Middle East region
Zebra - Gulf Region
iBoardTouch - Gulf Region
GFI - Middle East region
Enterprise portfolio - Gulf Region
NCR - Gulf Region
APG Cash Drawer - Gulf Region
NEC - Gulf Region
Middle East, Turkey and Africa
(META) Region
Aptec news
DELL EMC NAMES INGRAM MICRO AS KEY ME DISTRIBUTION PARTNER
INGRAM MICRO FORGES TRAINING PARTNERSHIPS WITH REDHAT, SUSE, NUIX, ARUBA AND KASPERSKY LAB
INGRAM TO HOST CLOUD AND SECURITY SUMMIT
Mohammed Amin, Senior VP, META, Dell EMC
speakers include Renee Bergeron, SVP, Global
Cloud Channel; Rahul Bhavsar, Director -
Cloud, META and Marc Kassis, Cyber Security
Director EMEA.
In 2016, the event saw 130 plus partner
attendees, 16 cloud vendors, 14 breakout
sessions and several keynote sessions along
with panel discussions.
a e . i n g r a m m i c r o .c o m O c t o b e r 2 0 1 7 5
Learn Profitable, Sustainable, Proven Global Practices & Solution Selling Techniques to Own Your End-to-End Customer Relationships & Seize Every New Opportunity.
At Ingram Micro we offer customized
solutions to all our partners to empower
them for delivering an enriched
customer experience.
Parul Pathak, Product Manager Microsoft
Gulf at Ingram Micro says, “Our strategic focus
is on offering various solutions bundled with
Microsoft products to support our re-seller
community for establishing deeper engagement
with their end-customers. We are also
supporting this initiative with our Valued Added
Services, which our resellers may leverage to
increase their efficiency & gain a competitive
edge in the market.”
We are focused on driving awareness &
momentum for Microsoft Azure as a Platform
that offers multiple solutions for unique business
needs & as for solution selling we have signed up
with Parallels (Remote Application Server).
To elaborate, Microsoft Azure is an open and
flexible cloud platform which can help you build
applications using multiple languages, tools,
frameworks, & enables easy integration for your
on-premises IT environment with the public cloud.
It offers some unique use cases like building
anything from lightweight websites to multi-
tier cloud services or accelerate Mobile App
Development by using a backend hosted on
Microsoft Azure that scales up, as your traffic grows.
One can rely on geo-redundant cloud storage for
backup, archiving, and disaster recovery.
And as for Parallels Remote Application Server
(RAS) it is powered by Microsoft Azure & makes
application and desktop delivery extremely fast,
easy, & affordable on any device.
Parallels (RAS) when deployed on Microsoft
Azure provides employees with secure, fast,
and reliable access to Windows applications
and desktops at any time, on any device, from
any location & with the advanced filtering of
Parallels RAS in Azure, the solution protects
sensitive information and enhances overall
corporate data security.
To offer all round support to our partners we
have designed 3 step Partner Engagement Model
“Enable-Engage-Encourage” where our dedicated
in-house teams will be providing one on one
consultations on Solution Selling to end customers
& owning the end to end customer relationship.
Unique to reseller needs we are offering Value-
Added Services in terms of Pre-sales (trainings,
certifications, sizing opportunities), Post-sales
(implementation, deployment) & Marketing
support to rev up reseller’s digital transformation
& establish a strong differentiated brand
presence in the region.
Last year we were awarded by Channel Middle
East with “Channel Champion Award” for our
Double Treats Campaign for Gulf Partners as
the Best Channel Marketing Campaign of the
year. This year in Microsoft WPC, Ingram Micro
won Partner of the Year Award for recruiting
maximum number of cloud partners in META
region. We are ready to support each & every
partner in the region who is focused & has
potential to transform & embark on the journey
to cloud transformation.
By Parul Pathak,
Product Manager
Parallels & Microsoft
Gulf at Ingram Micro
For consultation or queries please mail us at:
http://tiny.cc/microsoftazure-parallels
https://www.facebook.com/imcloud.me/
EMBARK ON YOUR PATH TO PROFITABILITY WITH MICROSOFT THROUGH INGRAM MICRO
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 76
Microsoft
To successfully navigate the multi-cloud, you need to manage and protect data and workloads seamlessly across all clouds.
Avoid SiloesMulti-cloud adoption has many benefits. But productivity, performance and effectiveness can be hindered when data is not integrated and scattered across clouds and date centers.
Maintain Visibility and Control of DataThe cloud may seem like a cost-effective solution for keeping all your data. But you may be driving up both your cost and exposure to risk. Instead, identify what data you have, assess whether it is worth keeping and then migrate it to the cloud.
Reduce ComplexityBacking up to multiple clouds can increase the complexity within the IT environment. Each cloud provider uses proprietary metadata, policies and protocals that do not work accross other cloud platform, or on-pemises solutions.
Veritas 360 Data Managementremoves the complexity and cost of data siloes by consolidating multiple functions into a single platform that can accommodate your new and existing landscapes.
When you scale your data management and protection across your entire environment with Veritas, the multi-cloud becomes an extension of your strategy — rathar than a standalone piece of infrastructure.
Veritas Information Mapallows enterprise to understand what data they both on-premises and in multiple clouds. These insights can inform decision about what keep, archive or delete.
Migrate your data to the cloud or even between clouds intelligently, by first gaining visibility of your entire environment.
Veritas NetBackupenables enterprise to extend their data protection platform to the cloud using the same policies as your other servers. The reslut: greater controls and visibility that ever before.
Protect physical, virtual and cloud environments through a single platform that leverages the same policies and processes no matter where your data is being backed up.
VERITAS CLOUDVERITAS 360 DATA MANAGEMENT: VERITAS MULTI-CLOUDS ONE APPROACH:
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 710
Veritas
NIT an Ingram Micro Company, P.O. Box 23043, Dubai, UAE - www.nit.ae
Regional value added distributor of complete IP surveillance and security solutions for META Region
Specialized Security Distribution
ONE infrastructureAn infrastructure so intelligent, it can adapt to every workload and deliver services at lightning speed
TWO operating modelsA new category of infrastructure designed to accelerate application delivery in both traditional and new IT environments.
FOUR big benefits for IT and businessReduce cost: Up to 30 percent reduction in ongoing CAPEX SavingsDeploy at cloud-like speed: Minutes to provision a workload-ready hostSimplify apps: One step to implement updatesDevelop more apps: Single line of code to stand up infrastructure
THREE design principlesFluid resource pools: Single infrastructure of disaggregated resourcesSoftware-defined intelligence: Template-driven workload composition Unified API: Infrastructure as code
FIVE elements to HPE Synergy Composer: Composes infrastructure at near instant speedsComposable frame: All resources needed to run any applicationComposable compute: Full portfolio for performance and scalabilityComposable storage: High density integrated storageComposable fabric: Rack scale multi-fabric connectivity
Learn more athpe.com/info/Synergy�
HPE SynergyThe first platform achitected for Composable Infrastructure
A Complete GuaranteeHPE SimpliVity hyperconverged systems
Only HPE SimpliVity hyperconverged infrastructure delivers the enterprise-class performance, protection, and resiliency that you require, with the cloud economics your business demands.As a proof point of our platform maturity and what our capabilities can do for our customers, we o�er one of the industry’s most complete guarantees including data e�iciency, protection, simplicity, management, and availability.
HyperE�icient If you use HPE SimpliVity hyperconverged infrastructure and its built-in VM-centric backup capability as outlined below, you will achieve 90% capacity savings across storage and backup combined, relative to comparable traditional solutions.
HyperSimpleUsing HPE SimpliVity user interface, which is fully integrated with VMware® vCenter™, you only need three clicks to back up, restore, move, or clone a VM, all from a single console.
HyperManageableUsing the HPE SimpliVity user interface in a central location, in less than a minute on average, you will be able to create or update backup policies for 1000s of VMs across dozens of sites.
These guarantees are available to all customers who use HPE SimpliVity 380 and are covered under the standard HPE SimpliVity 380 product warranty, which is valid for three years after delivery of the product to the customer. The warranty is described in the HPE SimpliVity 380 QuickSpecs at hpe.com/info/simplivity.
HyperProtectedIf you use HPE SimpliVity hyperconverged infrastructure and its built-in backup capability, it will take less than one minute, on average, to complete a local backup or local restore of a 1 TB VM.
HyperAvailableYou will be able to add or replace HPE SimpliVity hyperconverged systems• Without any downtime for local or remote sites.• Without any disruption to local or remote HPE SimpliVity backups.• Without any reconfiguration of HPE SimpliVity and backup policies for local
or remote sites.• Without the need to reenter any IP addresses in remote sites.
No gimmicks, no separate contracts, no additional steps
1
3
4
5
2
HPE SimpliVity
HyperGuarantee
HPE SimpliVity HyperGuarantee
CONVERGENCE OF CLOUD AND SECURITY
Editorial
Identifying that security is integral to a successful cloud deployment, Ingram Micro proposes a joint approach that includes key elements from
both technologies for partners to maintain profitability in this space.
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 714
business owners. “Or, they need to give enough
confidence to these customers through reporting
of the control aspect of the business processes.
For instance, provide the information on number
of connections or non-authorized attempt to
connect, etc. All these aspects need to be part of
the proposed cloud solutions.”
As security is essential in all aspects of cloud,
from storage and data protection to network
visibility, it is imperative that partners who sell
cloud solutions also have expertise in security-
related solutions.
Marc Kassis, Cyber Security Director, Ingram
Micro EMEA says, “Ingram Micro is proposing
a joint cloud and security approach to all our
business partners. Our offering ranges from
solutions, services and training that can be
delivered to end-users. We also bundle cloud and
security vendors into an easy buy, implement and
use approach. We operate in this model to bring
ready go-to-market and fast growth.”
In such a scenario, partners should focus
on building their capabilities around sales and
pre-sales for solution selling, implementation,
migration and project management practices
and key technical certifications around virtual
infrastructure environments, he adds.
To refine partners’ skillsets in these areas
within the cloud and security space, Ingram
Micro is focusing on programs around cloud,
Infrastructure-as-a-Service (IaaS) and security.
“For instance,” Bhavsar explains, “the IaaS
program helps resellers with opportunity
generation within the IaaS space as well as one
click solutions on IaaS platforms and hybrid
cloud offerings. Other Ingram Micro initiatives
As the advantages of cloud are well-
understood by organizations, we see the
adoption levels increasing rapidly on a
global level. Benefits such as scalability, flexibility, cost-
effectiveness and pay-as-you-go models are attractive
to both enterprise as well as SME businesses.
Middle East customers didn’t immediately
warm up to the reality of cloud, although it
has picked up significantly over the last few
years. One of the main reasons for this was
that regional customers viewed cloud solutions
as insecure. While this viewpoint is gradually
diminishing, security within cloud infrastructures
continue to be a fundamental factor for
customers to adopt cloud solutions.
According to Rahul Bhavsar, Director, Cloud
Sales, Ingram Micro META, the core challenge
customers have faced in the past and continues
to do so today is around data.
He says, “Data migration and its security on the
cloud are vital aspects for any business. Over the
last few months, we have observed an increasing
appetite for migration to the cloud within regional
customers. Although the industry has paid attention
to data security, the lack of robust frameworks is
leading to hesitation among customers.”
There is no disputing that security is definitely
closely intertwined in a cloud-first business
landscape. In such an environment, what are
the elements partners must keep in mind before
deploying a related solution? The first key aspect
is to understand that when it comes to cloud
solutions for enterprises, it means a loss of direct
control on their data and processes.
This is why, says Bhavsar, cloud solution
providers must focus on offering control to the
include technical enablement programs, partner
marketing programs for opportunity generation,
fully automated Cloud Marketplace and
Professional Services.”
Ingram Micro META region has built a
comprehensive enablement training session for
cybersecurity, which is provided to all its business
partners. The distributor has also created a complete
range of end-user trainings that can be resold.
Kassis says, “We also provide Assessment
Services and Consultancy to help our channel
partners address new markets. We also deliver a
large quantity of contents through white-papers and
webinars as well as events such as the upcoming
Cloud and Security Summit to communicate, educate
and deliver the best solutions to our market.”
Over the last year, the regional value-added
distributor has experienced a strong double
digit growth in its security portfolio. The channel
opportunities will continue to develop in 2018 as
security increasingly becomes intertwined with all
technology layers deployed at an enterprise.
“We also see many new vendors emerging and
growing quickly in the domains of Investigation
and Forensic, Data Protection, Identity
Management, etc.,” adds Kassis.
Bhavsar says, “We are expecting our overall
cloud business to grow between 20 to 25 percent
as compared to last year. We are anticipating a
steeper increase in the IaaS space, considering
our focus and investments in this space.”
As the regional security and cloud markets
are set to grow even further, channel partners
must maximize the opportunities and reach out
to distribution partners such as Ingram Micro for
in-depth support to develop their offerings.
As security is essential in all aspects of cloud, from storage and data protection to network visibility, it is imperative that partners who sell cloud solutions also have expertise in security-related solutions.
Rahul Bhavsar, Director, Cloud Sales, META
Marc Kassis, Cyber Security Director, EMEA
a e . i n g r a m m i c r o .c o m O c t o b e r 2 0 1 7 15
ORACLE MINICLUSTER
Oracle MiniCluster Virtual Assistant
• Dramatically simplifies and accelerates day-to-day
operation, eliminating the need for specialized
system administration skills and training
Database automation
• Provides an easy, error-free approach to
implementing Oracle Real Application Clusters
and highly available Oracle Database instances
• Support for Oracle Database Enterprise Edition
and Oracle Database Standard Edition 2
Security automation
• Activate and configure hundreds of technologies
and integrated security controls with the push of
a button
• Easily comply with DISA-STIG, PCI-DSS and CIS
equivalent security profiles
Patch automation
• Execute pretested and verified rolling, full-system
patches and updates faster with less risk
Compliance automation
• Verify security by running compliance reports
with the push of a button
Silicon Secured Memory
• Secures databases and applications from
tampering and unreliability
Cryptographic acceleration
• The industry’s most advanced wide-key
cryptographic acceleration provides end-to-end
network and data encryption with virtually no
performance cost
Data analytics accelerators
• Dramatically speed up analytics by offloading
key operations to data analytics accelerators
High-performance and high-efficiency architecture
• Reduce software and hardware footprint with
SPARC processors that deliver 50 to 100
percent better Oracle Database and Java
application performance per core than any
comparable x86 processor
Simple, Secure & Efficient
JULIE VARGHESE
ORACLE Business Unit Manager
Email: [email protected]
ABDALLA QUQAS
Oracle Technical Manager
TANIA THOMAS
Oracle Sales Executive
Oracle MiniCluster S7-2 is a simple and efficient engineered system designed to
run enterprise databases and applications with uncompromising security. Oracle
MiniCluster is integrated server, storage, networking, and software systems that
provide maximum end-to-end database and application efficiency, and security while re-
ducing complexity and delivering the lowest total cost of ownership. Oracle MiniCluster
is ideal for Oracle Database and Oracle application customers looking to maximize return
on their software investment. Listed below are the features and benefits of Minicluster:-
Oracle MiniCluster
For more information on the product, please get in touch with Oracle team at Aptec – An Ingram micro company.
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 716
Millions of data points. A singular vision.Data Visionaries Wanted
©2017 NetApp, Inc. All Rights Reserved. NETAPP, the NETAPP logo, and the marks listed at http://www.netapp.com/TM are trademarks of NetApp, Inc. Other company and product names may be trademarks of their respective owners.
netapp.com/datavisionary
Technology trends such as big data and Blockchain are beginning
to take their place on the ground, in government and business
strategies for digital transformation, and in the transformation of
industry towards the next leap; the industry 4.0.
Cisco Digital Transformation; at a glance Digital transformation is the process of re-defining the strategies, plans,
services and customer experience to create a sustainable and competitive
advantage for the organization. Cisco solutions provide the innovative
network services to keep pace with the accelerated growth in data and
digital business services.
How Cisco help organizations applying the Winning Infrastructure model for Digital Transformation Journey• Security
Cisco CAT 9K switches enable AES-256 MACsec encryption is
the IEEE 802.1AE standard for authenticating and encrypting
packets between switches. They provide segmentation and
micro-segmentation. The Encrypted Traffic Analytics (ETA)
help you detect malware and other threats on encrypted
traffic as first line of defense starting from the access layer.
The Cryptographically signed images provide assurance that
the firmware, BIOS, and other software are authentic and
unmodified. Cisco Trust Anchor module provides single-chip
solution provides hardware authenticity assurance.
A BLUEPRINT FOR DIGITAL TRANSFORMATIONCisco Catalyst 9000 Series (CAT 9K)
• IOT-ReadyThe IOT-Ready CAT9K switches delivers scalability, convergence and application-
visibility to the top-down and bottom-up approach of network design, making the
network able to offer world-class mobility services and bandwidth capacity.
• Open for Cloud and Integration CAT 9K switches are able to handle more complex workloads with the
ability to act as self-starter infrastructure. Cisco IOS® XE 16 delivers
advanced programmability across the different infrastructure resources.
They apply Software-Defined Access (SD-Access) and the Cisco Application
Policy Infrastructure Controller Enterprise Module (APIC-EM), delivering the
policy-based automation from edge to cloud.
• Able to enhance workers and end user experience.The next generation infrastructure should be able to secure, authenticate
and authorize users while delivering the highest level of innovative
collaboration services and connected mobile experience.
By Waddah Fadul, Cisco Infrastructure Consultant at Aptec –An Ingram Micro Company.
For consultation or queries:
https://www.facebook.com/Aptec.Ingramflyhigher.Cisco.Page/
@flyHigherME
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 718
Cisco
Copyright © 2017 Symantec Corporation. All rights reserved.
We Are The Cloud Generation. The Cloud Generation is everyone who lives and works in this unique era— as computing breaks the boundaries of desktops and data centers to embrace the mobile, social, global, crowd-sourced, always-on realities
of modern life. It’s a time when critical data, applications and infrastructure are shifting from “behind the firewall” to “running on the cloud.” Some of us are “all in.” Some are only 20% there. Yes, it’s liberating. And yes, it’s chaotic. Symantec is here to help.
Securing the Cloud Generation
SYMC_230x275_PrintAd_EMEA.indd 1 8/29/17 7:21 AM
Mohammad Sabry, Head Of Services, Gulf and Near East, Aptec - an Ingram Micro company
Ingram Micro
INGRAM MICRO ADVANCED SOLUTIONS
PROFESSIONAL AND TRAINING SERVICES
As a distributor, Ingram Micro serves a wide range of partners in the region with diverse technologies. Ingram Micro’s services role is to provide its partners with increased expertise in the skill-set and
background required to optimize full solution deployment.
The vendors in Ingram Micro’s services
portfolio are A10, Netapp, Cisco, Vmware, Veeam,
IBM, Symantec, Nexthink, Veritas, Aruba, McAfee,
Kaspersky Lab, Nuix, SUSE, Microsoft, HP.
opportunities. This in turn leads to better support
for their customers.
The Ingram Micro management team is largely
focused on delivering added value to its partner
community by offering skill development resources
regionally to all its partners in the META region.
Ingram Micro is currently a certified services
delivery partner to select vendors and it supports
these vendors by delivering their own branded
services to enterprise clients through its pool of
resources located in UAE, KSA, Egypt, Turkey and
South Africa.
Ingram Micro actively encourages its partners
to reach out and rely on its structured services
sales team to help identify opportunities and
assist in expanding services.
With the current economical market
conditions, naturally the budgets for
training and development of partners
are being allocated and spent more carefully.
The same is evident with end users such as
enterprises and government verticals. This has
led to an increased number of partners relying
on distributor implementation and deployment
of services.
Ingram Mirco offers its partners the option to
train their engineers and maintain the running
of their development plans at a reduced cost
through the Virtual Training Delivery option.
Ingram Micro runs several campaigns and
promotional offers on its services to encourage
and enable its partners to attain new business
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 720
Raj Samani, Head of Strategic Intelligence, McAfee LLC
McAfee
a e . i n g r a m m i c r o .c o m O c t o b e r 2 0 1 7 25
MACHINE LEARNING – TAKING YOUR SECURITY TEAM TO THE NEXT LEVEL
valuable investigation and response data would
be available through the already-present endpoint
management console. The presence of machine-
learning technology results in significant time
savings – by a factor of 10 is not uncommon – that
can help security teams keep the business running
Elevate security teams with machine learning
People matter the most, but combining human
intelligence with machine-learning technology
creates strong security teams. With machine-
learning assistance, security teams have greater
insight into who the attacker is, the methods
being used, where the attacks are coming from
and how they are spreading, as well as which
security measures are working and which are
being defeated.
To conclude, machine learning should be a
critical component of an enterprise’s endpoint
security strategy. Given the volume and evolution
of attacks hammering away at endpoints,
security must be able to adapt without human
intervention, and must provide the visibility and
focus to enable humans to make more informed
decisions. Machine learning has come of age
with big data driving accuracy up and false
positives down. The proof of successful human
and technology teaming will be seen in the ability
to rapidly dismiss alerts and accelerate solutions
to thwart new threats. Your users deserve the
best that cybersecurity has to offer, and today
the best endpoint security products leverage
machine learning.
learning into endpoint security is the amount of
relevant data consumed by the algorithms.
Machine learning manifests itself in multiple ways
in helping save security teams’ time and energy:
User experience is optimized - Machine-
learning algorithms feed information to the
endpoint about file attributes that indicate the
presence of malware. These attributes may be
related to type, size and source, as well as header
anomalies and detected sequences of operating
system calls. A quick scan before execution
allows security to perform its preliminary triage
without souring the user experience.
Suspicious behaviour flagged automatically -
Once the program is running, machine learning
on the endpoint monitors behaviour for signs
of an attack. This runtime detection is keyed by
information on attack tactics again uncovered by
machine-learning analysis of malware samples
in the datacentre. While pre-execution checks
file attributes to make a malware decision,
runtime execution requires knowledge of specific
actions attackers are likely to use. For example,
ransomware can render your files useless in
less than a minute. Machine-learning analysis
of ransomware attacks may uncover timing and
access patterns of file shares that would indicate
an attack is underway – allowing endpoint security
to stop the threat before all files are encrypted.
Highly valuable investigation and response
data available automatically - Helping security
teams respond to an incident, machine learning
can identify suspicious connects and create
alerts based on equations. In this case, security
analysts need precise information on the threat
such as files touched, registry changes, server
connections, etc. Because machine learning
looks across multiple dimensions, much of the
data that incident response teams require is
already available, but has traditionally required
extensive manual correlation. Ideally, highly
In relation to cybersecurity, machine learning
has been changing the game as a means of
managing the massive amounts of data within
corporate environments. However, machine
learning lacks the innately human ability to
creatively solve problems and intellectually
analyse events. It has been said time and again
that people are a company’s greatest asset.
Machine learning makes security teams better,
and vice versa. Human-machine teams deliver
the best of both worlds.
Machine learning allows endpoint security to
continually evolve to stop new attack tactics
The dark web is driven by intelligent bad actors
who are often financially motivated to create
new threats with new attack techniques. Security
becomes personal when considering the people
behind the attacks, making the human-machine
team the best sustaining defence. While machine
learning can detect patterns hidden in the data at
rapid speeds, the less obvious value of machine
learning is providing enough automation to allow
humans the time and focus to initiate creative
responses when responses are less obvious.
By using a filter for optimization across the best
advantages of human and machine elements, it’s
easier to evaluate the relationship between them.
Machine learning adds critical capability to
security strategies
The process of security researchers analysing
malware to develop signatures is still important,
but only as a capability to address the large
volume of known malware because it cannot
be expected to evolve quickly enough to meet
the rapid pace of malware being introduced to
the wild. Machine learning becomes the fastest
way to identify new attacks and to push that
information out to endpoint security platforms.
The key differentiator in incorporating machine
SELLING NETWORK SECURITY AND COMMUNICATIONS
SOLUTIONS JUST GOT EASIERThanks to the GFI
Software and Ingram Micro partnership
Finding the right technology vendor to partner with can be a daunting task. IT resellers and
cloud service providers need a vendor that will support their business, providing the right
tools and products to fulfill the needs of their customers and enable future growth. For
partners based in META (Middle East, Turkey and Africa), the wait to find the right one is over!
Earlier this year, GFI Software and Ingram Micro announced their expanded partnership. The
agreement means that channel partners in 16 additional countries, including Afghanistan, Algeria,
Bahrain, Egypt, Iraq, Jordan, Lebanon, Kuwait, Morocco, Oman, Pakistan, Qatar, Saudi Arabia,
Tunisia, United Arab Emirates and Yemen, have access to GFI’s full range of award-winning
network security and communications solutions and a great network of support from a distributor
that is 100% committed to the channel.
Together, the two companies are on an exciting growth journey. Earlier this year, GFI released
two new products to the market; GFI OneConnect, a cloud-based email security and continuity
platform, and GFI OneGuard, an IT management platform which centralizes, simplifies and
automates the process of managing the security status of machines, network resources and
users. Not only that, GFI acquired two companies, Kerio Technologies and Exinda. With the
product portfolio continuing to grow, partners are all set to have their pick of the best technology
to better serve small and medium-sized businesses (SMBs).
To find out more about the partnership and what it means for partners in the META (Middle East,
Turkey and Africa) region visit http://meta.ingrammicro.com.
a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 726
GFI
The Ingram Micro Cyber Security Business Unit offers an expansive suite of Technical, Consultancy and Managed Security Services. We have developed a wide range of Cyber Security services by building key and exclusive relationships with our vendors. As a result, we are able to help maximize our Business Partners’ revenue potential and grow our vendors in the META region.
Our Partners
IM Cyber Security Trainings► Fundamentals of Information Security
► CyberSAFE: Security Assets for the End User
► Cyber Security First Responder (CFR)
► CompTIA Network Plus (N+)
► CompTIA Security Plus (S+)
► CompTIA Advanced Security Practitioner
► Certified Information Systems Security
Professional (CISSP)► PCI DSS & Payment Card Security
► ISO 27001
► Fundamentals of a Formal Information
Security Risk Assesment► Information Security Risk Assessment as
per NIST SP 800-30, OCTAVE & ISO 27005
INGRAM MICRO CYBER SECURITY DIVISION CONTACTS
Web: http://security.ingrammicro.comEmail: [email protected]
OFFICE ADDRESS
Ingram Micro, P.O.Box: 33550, Dubai Internet City – UAETel: +971 4 369 7111 | Fax: +971 4 369 7110
For our latest Cyber Security Webinar Recordings, please visit the link http://security.ingrammicro.com/News/Events-Webinars.aspx
Public Discovery Report (PDR)
Vulnerability Assessment (VA)
Web Malware Detection Scanning
Web Application Scanning (WAS)
Penetration Testing
Blackbox Testing (PT)S
PCI DSS ASV Scan
IM Cyber Security Assessment Services
Cyber Security Governance
Policies & Procedures Review
Security & Operations Review
Risk Assessment
Physical Security Assessment
Incident Management
Access Control Review
Compliance Assessment
IM Cyber Security Consultancy Services
Unlocking Cyber Security Potential
McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Copyright © 2017 McAfee, LLC
Learn more about dynamic endpoint threat defense, pervasive data protection, data center and cloud defense, and intelligent security operations at www.mcafee.com/us/solutions.
Your securityproducts workingas one. That’s orchestration.Together is power.