24
1 BROUGHT BY BEST OF BREED SOLUTIONS ON A SINGLE PLATTER

Spectrami

  • Upload
    ec-mea

  • View
    219

  • Download
    3

Embed Size (px)

DESCRIPTION

Best of Breed Solutions on a single platter

Citation preview

Page 1: Spectrami

1

BROUGHT BY

BEST OF BREED SOLUTIONSON A SINGLE PLATTER

Page 2: Spectrami

2

Page 3: Spectrami

3

ABOUT CONTENTSOCT 2015

YOU ARE HERE

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

ONE STEP AHEAD OF ANY ATTACKER

FIDELIS

PARADIGM SHIFT IN BUSINESS AGILITY

ACTIFIO

TRIED, TESTED AND TRUSTED

REDHAT

ALWAYS ON, SAFE AND

SECURE

A10 NETWORKS

EXPERT VIGILANCE ROUND-THE-CLOCK

TENABLE

SPECTRAMI ADVT

SPECTRAMI ADVT

SHOWROOM

SMART ACTIONABLE INTELLIGENCE

SHOWROOM

CONTACTS OF SPECTRAMI

SHOWROOM

OUR GROWTH STORY

SUCCESS PATH

LOGRHYTHM

ACCELERATING INNOVATION

XCEEDIUM

INSIDE WATCH

Spectrami was incepted with the vision of bringing niche and specialized technologies into the MEA region. The objective was to deliver a seamless service level akin to leading vendors by building up an ecosystem in the region that adds value to the Customers, Resellers & Vendors. We service the entire eco-system with our local team of sales and technical resources present in UAE- Dubai & Abu Dhabi, Kuwait, Oman and Saudi Arabia. Through our Vendor Extension Model, we aspire to give same experience that a vendor would give to customer for enterprise solution delivery in terms of multi point engagement from Sales, Pre-sales, Marketing, Delivery and Channel fulfillment. One of initiative is to deliver better experience to our customers using our CEC (Customer Experience Center), which simulates real world scenario in a Lab environment using our technologies to demonstrate solution capabilities. We work very closely with our Vendors and reseller to conduct Customer focused events such TechCafe and CIO round table sessions where we invite key decision makers from customer ecosystem, validate our technology architecture and help them realize a higher operational efficiency and resiliency.

Page 4: Spectrami

4

EXPERT VIGILANCE ROUND-THE-CLOCK

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Tenable identifies all types of risk on the network—including missing patches, malware and intruders, missing configurations and missing monitoring. Our products reach across cloud, virtual, mobile and traditional IT systems. Tenable is relied upon by many of the world’s largest corporations, not-for-profit organizations and public sector agencies, including the entire U.S. Department of Defense.

TROY THEOBALD, Territory Manager – Emerging Markets

Troy has more than 20 years’ experience in the IT industry with most of them being based purely in the IT security sector. Having worked for vendors like Check Point Software Technologies, Sonic Wall as well as Barracuda Networks, Troy’s experience in doing business ranging from small business up to multi -national corporations.

Solution PoolTenable SecurityCenter Continuous View (CV) is Tenable’s market-defining continuous monitoring platform, which provides the most comprehensive view of security posture and compliance of your entire IT infrastructure.

Tenable’s Nessus Professional is the world’s most widely-deployed vulnerability, configuration and compliance assessment product. Nessus prevents network attacks by reducing your attack surface – identifying the vulnerabilities and configuration issues that hackers could use to penetrate your network, whether your network is on-premises, in the cloud or hybrid.

Nessus Manager combines the powerful detection, scanning, and auditing features of Nessus, the world’s most widely deployed vulnerability scanner, with extensive management and collaboration functions to reduce your attack surface and eliminate vulnerability blind spots.

Nessus Cloud is Tenable’s hosted, cloud-based vulnerability management solution that combines the powerful detection, scanning and auditing features of Nessus with multi-user support enabling extensive collaborative capabilities of scanners and resources.

Why Tenable?l Supported by a world-renowned research

team; with the largest vulnerability knowledge base possible, making it suitable for even the most complex environmentsl Only vendor to offer both active and passive

scanning along with event analysis and log correlationl First vendor to offer both agent-less and agent

based scanning, increasing flexibility l Continuous monitoring of network traffic for

both IPv4 and IPv6 environmentsl Efficient scalability l Software based products thus enabling the

servers that support Tenable’s applications to be managed by the organization’s existing infrastructure policies

Focus at GITEX 2015:l Provide demos of the Tenable Network Security portfolio from vulnerability management to continuous network monitoringl Meet our territory team for a face-to-face

meetingl Executive level authorized partner meetingsl Demonstrate how Tenable Network Security

can help organizations identify vulnerabilities, reduce risk and ensure complianceFOLLOW US

FOR MORE INFORMATION, PLEASE VISIT TENABLE.COM AND FOLLOW US @TENABLESECURITY

Page 5: Spectrami

5

From vulnerability management to continuous network monitoring

Our products protect you.

Learn more at tenable.com

Page 6: Spectrami

6

ONE STEP AHEAD OF ANY ATTACKER

Fidelis Cybersecurity protects the world’s most sensitive data by equipping organisations to detect, investigate and stop advanced cyber-attacks. Our products, services and proprietary threat intelligence enable customers to proactively face advanced threats and prevent data theft with immediate detection, monitoring and response capabilities. With our Fidelis XPS and Resolution1 Platform, customers can get one step ahead of any attacker before a major breach hits.

WALEED BADR, Regional Sales Manager, MENA

Possessing a successful track record in transforming sales and business for dedicated territories, Waleed is committed to deliver the regional goals with boundless energy and tactful strategies. He is known for orchestrating effectively with the account team and the business partners with a positive attitude and a good team spirit to deliver customer’s core business needs.

Solution PoolWith Fidelis, you’ll know when you are being attacked; you can retrace attackers’ steps and freeze them in their tracks. Fidelis offers a complete portfolio of products, consulting services and proprietary threat intelligence that equip our customers to proactively get one step ahead of any attacker before they achieve their ultimate objective.

Why Fidelis? l Network-based threat detection, prevention, and monitoring capabilitiesl Endpoint visibility with an agent-based

approach that monitors and records system activity to detect threats validates and prioritizes alerts, and supports automated remediation through its acquisition of Resolution1 Securityl Fidelis XPSTM to see deeper into the

applications and leveraging its patented Deep Session Inspection technology to see content that’s flowing over the network – no matter how deeply buried that content might bel Ability to conduct deep content decoding and

analysis, in real-time, enabling users of the product to see threats that would otherwise be invisiblel The combined ability to see malicious network

activity and content, view data that’s leaving the network, and go back in time to reconstruct what attackers may have done in the past l Ability of the Resolution1 Endpoint solution

to consume intelligence in any format and use it to search for and identify compromised endpoints l Seamless integration with third-party security

tools (e.g., SIEMs, NGFWs, or monitoring systems)l A comprehensive services portfolio that

includes proactive assessments, incident response, and litigation support servicesl The combination of products, services,

and proprietary threat intelligence delivering a comprehensive Advanced Threat Defense (ATD) solution

Focus at GITEX 2015l Demonstration on how Fidelis solutions and services can help organisations to mature their security posturel Meet some of our executive team for a face-

to-face meeting

FOLLOW USTO LEARN MORE ABOUT FIDELIS CYBERSECURITY, PLEASE VISIT WWW.FIDELISSECURITY.COM AND FOLLOW US ON TWITTER @FIDSECSYS.

Page 7: Spectrami

7

Page 8: Spectrami

8

For more information or to place an order on Red Hat,please write to [email protected]

TRIED, TESTED AND TRUSTED

More than two decades ago, Red Hat had a spark of an idea—a vision for developing better software. Then and now, collaboration with an ecosystem of IT leaders, open source advocates, developers, and partners creates the perfect foundation for the future of IT—Red Hat Enterprise Linux. That vision for developing better software is a reality, as CIOs and IT departments around the world rely on them to deliver solutions that meet their business needs. Today, Red Hat is at the forefront of open source software development for enterprise IT,.

LEE MILES, General Manager, Middle East and Africa (MEA)

Lee is an international sales leader with over sixteen years experience, seven of which havebeen in the Middle East. His key achievements atInfor include orchestrating the integration of the two regions, growing the company’s staff and partnereco-system and establishing Infor’s new office in Saudi Arabia.

Solutions GaloreRed Hat provide customers with a wide range of enterprise class open source based enterprise infrastructure software.

Why Red Hat?l Red Hat JBoss Middleware is a family of lightweight, cloud-friendly, enterprise-grade products that help organizations innovate faster, in a smarter way. That’s what we call enlightened innovation.l Deployment: All Red Hat’s solutions are

straightforward to deploy and to integrate withl Scalability: Highly scalable.l Integration with Existing Infrastructure: Highly

efficient l Cloud compatibility: Fully cloud compatible

from both a technical and licensing viewpoint l Security - Unlike proprietary vendors, Red Hat

develops software in collaboration with customers from a range of industries, including government and financial services, ensuring that rigorous security protocols are built into our software. l Choice and flexibility- Red Hat customers have

complete flexibility when designing their IT solutions. l Business-relevant innovation - Because Red

Hat technologies are developed in close collaboration with customers, partners, and communities, our products provide businesses with the latest software developments and give IT departments a competitive

edge.l Comprehensive ecosystem - As the world’s

leading supplier of open source solutions, the breadth and depth of Red Hat partnerships is unmatched—helping customers deploy innovative solutions that are fully certified.l Simple, effective business model- The

Red Hat subscription-based business model is straightforward and flexible, which makes products easy to acquire and maintain.l Track record of success - Red Hat products and

services have been proven in the market, with rapid customer adoption and outstanding success in the most demanding computing environments.

Presence in the region Regionally we are present in numerous organizations, from regional Giants, cloud providers and government customers to small to medium enterprises.

Focus at GITEX 2015With Spectrami at Gitex, Red Hat want to showcase our new middleware focused partnership and reach customers and partners who can benefit from Red Hat’s broad Jboss middleware portfolio.FOLLOW US

FOR MORE INFORMATION, PLEASE VISIT WWW.REDHAT.COM/EN AND FOLLOW US @REDHATNEWS

Page 9: Spectrami

9

For more information or to place an order on Red Hat,please write to [email protected]

Page 10: Spectrami

10

ACCELERATING INNOVATION

CA Technologies creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services.

PIERRE HANNA,Sales Director, CA MENA

Pierre joined CA MENA with over 15 years’ sales management experience working in the Gulf with a number of multinational organizations including NCR, Sun Microsystems, Oracle and Symantec. His experience covers hardware, middleware, applications and security solutions. His expertise spans from the data center to applications and to IT security management.

Solutions GaloreCA Technologies focuses on three key areas aligned to our core expertise: l Security: Invest in the security of KNOW. It’s as

much about engaging the marketplace and ensuring consumer confidence as it is about defense and protection.l DevOps: The methodology to accelerate

time-to-market. Rooted in the best practices of agile development, test and operational approaches, DevOps is having a transformative impact on IT organizations. l Management Cloud: Insights powered by

speed and scale. A suite of management applications delivered from the cloud that enable enterprise portfolio management, mobility management and IT service management.

We deliver this expertise across three primary platforms: Mobility, Cloud and Mainframe.

CA makes software for businesses that are development–driven, because we believe those who build the apps will own the future.

Why CA Technologies l Helps customers thrive in the new application economy by delivering the means to deploy, monitor and secure their applications and infrastructurel Helps organizations develop applications and

experiences that excite and engage and, in turn, open

up money–making opportunities for their businessesl Powerful innovation from planning to DevOps

to security to systems managementl Accelerated delivery of superior IT services,

applications and customer experiences

Industry Recognition l Most Innovative Company in Customer

Success Awards 2015l Red Hat Innovation Award for Application

Developmentl Certified: Global Excellence in Service

Operations by Technology Services Industry Association

Focus at GITEX 2015The CA + Xceedium solution provides privileged identity controls at the server and the gateway to control access and action based on identity. The proxy-based, gateway approach from Xceedium also provides privileged identity control over cloud, on-premise, virtualized and hybrid IT environments, helping you protect the systems driving the application economy. “Enable and protect the open enterprise” is the mantra of today’s application economy and identity is the new security perimeter. The CA Security portfolio enables and secures the open enterprise.

FOLLOW USLEARN MORE AT WWW.CA.COM OR FOLLOW US @CAINC

Page 11: Spectrami

CA Technologies has acquired Xceedium and now provides a comprehensive offering for combatting privileged user security breaches and compliance risk. Visit the Spectrami Stand #A2 – 6, Hall 2, Dubai World Trade Center to see a demo and learn more

Page 12: Spectrami

12

PARADIGM SHIFT IN BUSINESS AGILITY

Actifio virtualises the data that’s the lifeblood of businesses in more than 30 countries. Actifio’s Virtual Data Pipeline technology enables customers to protect, access, and move their data faster and more simply by decoupling data from physical storage, similar to hypervisor technology decoupling compute from physical servers. For enterprise-class backup modernisation, self-serve instant data access, or service provider business transformation, Actifio is the first and only choice for radically simple copy data virtualisation.

GRANT AMOS,General Manager, MEA

Grant is based in Dubai. He has carried out this role since May and is well-known for his innovative solutions for the unique growth challenges of the Middle East and African regions. Prior to this, Grant worked for IBM for 6 years culminating in his role as MEA Storage Business Unit Director, with responsibility for the entire IBM storage portfolio and storage workforce throughout MEA.

Solution PoolCopy Data Virtualization - Actifio replaces siloed data management applications with an application-centric, SLA-driven approach. Production data is captured non-disruptively and in its native form, to make it instantly available when needed. Copy Data Virtualization frees increasingly strategic data from increasingly commoditized infrastructure, replacing the many siloed systems you’re using today to protect and access copies of the same production data.Actifio Enterprise fundamentally changes the nature of data protection and business resiliency. Because it leverages the Actifio Virtual Data Pipeline, it is incredibly efficient in its use of infrastructure, storage, and bandwidth, enabling substantially better performance at lower total costs.Likewise, through data virtualization, Actifio Enterprise provides nearly instant access to large amounts of data for any use. Because it is SLA-driven, Actifio Enterprise makes it easy to comply with diverse data governance needs that require that certain data meet certain standards for availability and retention, while other data can be treated less stringently.

Why Actifio?l Speed- From measuring in days to measuring in seconds

l Savings- 95% lower storage 90% lower Bandwidth 65% lower Software Costl Simplicity- Application centric, SLA driven, one

platform, all use cases, full lifecycle of datal Decouples applications from infrastructure

l High scalabilityl Truly application-centric, infrastructure-

agnosticl Deep technology partnerships to directly

integrate Actifio with all major applications, systems, and storagel Enables customers to move data into the

cloud, across local and remote cloud infrastructurel Visionary in Gartner’s Magic Quadrant,

Enterprise Backup and Recovery Software (2014, 2013)l Global deduplication for maximum space

efficiencyl Open and extensible platform with RESTful APIl Automated Disaster Recovery as a Service

Focus at GITEX 2015: l Data Protection & Recovery in minutes, last backup modernisation everl Data Access, self-serve instant data provision

for test & development purposesl Data Mobility, move data into the cloud, across

local, remote cloud infrastructure

FOLLOW USFOR MORE VISIT ACTIFIO.COM, OR FOLLOW US ON TWITTER @ACTIFIO.

Page 13: Spectrami

13

Actifio virtualizes the data that is the lifeblood of your business, decoupling it from infrastructure, accelerating business resiliency, agility and access to the cloud, while reducing cost and operational complexity.

Our radically simple approach to data management lets customers capture

application data easily, manage it economically, and use it when and where

they need it to ensure business continuity, control access, and develop new

applications and insights faster and more efficiently than ever before.

www.actifio.com

ACTIFIO AT A GLANCE

• Radically simplified data management for customers in 36 countries

• Access data when and where you need it in minutes

• Slash your RPOs and RTOs to almost nothing

• Accelerate application development and empower your analysts with faster data provisioning

• Eliminate multiple-point software tools and slash your storage and bandwidth consumption for rapid ROI

WE CAN PROVIDE ACCESS TO

A 20TB ORACLE DATABASE IN

LESS THAN TWO MINUTES.

CAN YOU?

Page 14: Spectrami

14

ALWAYS ON, SAFE AND SECURE

A10 has pioneered a new generation of application networking technologies. The solutions enable enterprises, service providers, Web giants and government organizations to accelerate, secure and optimize the performance of their data centre applications and networks. A10’s Advanced Core Operating System (ACOS) platform is designed to deliver substantially greater performance and security relative to prior generation application networking products.

GLEN OGDEN,Regional Sales Director for the Middle East region

Glen has over 15 years combined experience in Application Delivery and Network Security, holding positions with F5, NetScaler, Cogneto, Nokia and Qualys. Glen holds a post-graduate degree in International Business from Hull University, United Kingdom.

Solutions GaloreSolutions include Application Delivery Controllers (ADCs), DDoS Mitigation Technologies, IPv4 scaling/ IPv6 Transition technologies and Network Management Solutions.

At the centre of the A10 product offering is our Advanced Core Operating System (ACOS), which serves as the high-performance, application-aware networking platform for all of our Application Services Gateway (ASG) products.

Thunder Series ADC: An Application Delivery Controller product line that accelerates and secures data center applications and networks

Thunder Series CGN: A Carrier Grade NAT product line that provides large-scale address and protocol translation services for carrier networks

Thunder Series TPS: A Threat Protection System product line that provides detection and mitigation against Distributed Denial of Service (DDoS) cyber-attacks.

Why A10? l Strength: Outside of A10 Networks, all of the existing highly recognized security vendors will struggle against large volumetric DDoS attacks. A10 Networks has 155 gigabytes/second which is over three times the performance of competitors.l Performance: A10 Thunder delivers unrivalled

performance in a 1RU form factor, fully featured

without any licensingl Scalability- A10 64-bit ADCs provide a

foundation for current and future application features that need more memory or higher scalability. l Cloud compatibility: A10 Networks aCloud Services Architecture is a portfolio of products and features that enable seamless integration with cloud orchestration platforms and SDN network fabrics through Application Programming Interface (API) calls to dynamically provision application and security policies per tenant. The aCloud Service Architecture ensures that tenant policies are enforced with significant improvements in provisioning speed, business agility and total cost of ownership.

Industry Recognition l Best of Show Award at the North American IPv6 Summit l Interop Tokyo 2014 Best of Show Awardsl Best of TechEd “Breakthrough Technology”

Award

Focus at GITEX 2015At Gitex A10 Networks will showcase the company’s Thunder appliances, including Application Delivery Controllers (ADC) with SSL Insight and Threat Protection Systems (TPS) that ensure user-to-application connectivity is fast, always on, safe and secure.

FOLLOW USFOR MORE INFO, VISIT HTTPS://WWW.A10NETWORKS.COM/ OR FOLLOW US @A10NETWORKS

Page 15: Spectrami

15

A10- AD

Page 16: Spectrami

16

SMART ACTIONABLE INTELLIGENCE

LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s award-winning platform unifies next-generation SIEM, log management, network and endpoint monitoring and forensics, and security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides innovative compliance automation and assurance, and enhanced IT intelligence.

MAZEN DOHAJI,Regional Director – MENA

Mazen Dohaji has more than 21 years of IT industry wealth in the Middle East region and more than 3 years in the SIEM space. He has worked for multiple multinational organizations including IBM, HP, and Intel Security.He has extensive knowledge of the Middle East Security market and has been the trusted advisor for major government entities and large enterprises.

Solutions GaloreSelecting a platform upon which to build your security operation is one of the most important strategic decisions you’ll make. It has to meet your immediate needs and it has to scale over time. It shouldn’t require costly integrations or customizations to realize your goals. Modernize your security operations with the powerful and integrated capabilities of our Security Intelligence Platform

LogRhythm provides SIEM 2.0 technology which helps organizations to reduce the (MTTD) Mean Time to Detect and the (MTTR) Mean Time to Respond.

Why Logrhythm? l Detection of Advanced Threatsl Orchestration and Automation of incident

Responsel End-to-End Threat Management in One

Platforml Flexible Data Collectionl Forensic Data Generationl Machine Analyticsl Actionable Intelligencel Machine Data Intelligence Fabricl Forensic Analyticsl Quick and easy installation; centralized

management through a simple interfacel Expansion that is as simple as plugging in a

new appliance as a simple addition to their initial

investmentl Supports three leading virtualization

platforms—VMware ESX, Microsoft Hyper-V and Citrix XenServer—hence enabling implementation in a completely virtual deployment, or a mixed-mode environment

Industry Recognition l Positioned as a Leader in Gartner’s SIEM Magic Quadrant report for four consecutive yearsl Named a “Champion” in Info-Tech Research

Group’s 2014-15 SIEM Vendor Landscape reportl Ranked Best-in-Class (No. 1) in DCIG’s 2014-

15 SIEM Appliance Buyer’s Guidel Awarded the SANS Institute’s “Best of 2014”

award in SIEM l Frost & Sullivan’s SIEM/LM Global Market

Penetration Leadership Award

Focus at GITEX 2015LogRhythm’s focus at Gitex 2015 is to educate customers and prospects on rapid change of Cyber Security Threat landscape. LogRhythm Security Maturity Model helps organizations to identify their current Security Maturity Level, and draw a roadmap to enhance it

FOLLOW USFOR MORE VISIT HTTPS://LOGRHYTHM.COM/INDEX.HTML OR FOLLOW US ON TWITTER @LOGRHYTHM

Page 17: Spectrami

17

NOT IF. IT’S WHEN. SIEM 2.0 | See what you’re missing. Cyber Threat Defence, Detection and Response.

•FullyintegratedLogmanagementandSIEMinonesolutio

•Advancedcorrelation&patternrecognition

•Buildingblockarchitectureforeasyexpansion

•Noadditionalchargesforcompliancereportingpackages

•FastandSimpleDeployment

LeadersintheGartner2012SIEMMagicQuadrant.

www.logrhythm.com

Page 18: Spectrami

18

AT A GLANCE

Customer Satisfaction Team launched

Looking at 60% growth this year

First Multimillion dollar order from on the leading Telcos

Extended Local presence in Kuwait

and Oman

Moved to our own office space with three times the size of the previous office

Closed First 20G implementation for Fidelis outside of US and the

largest order in EMEA

Largest order for Actifio in

EMEA

Reached the FY14 target in first nine

months

New office in South Africa

Built Local presence in KSA

Launched the CEC - customer experience center in a new

office space 2011

2012 2013 2014 2015

YEAR OF INCEPTION

HEADCOUNT VERTICALS TARGETED

OUR CUSTOMERS PROFILE

Started with 3 members

now we have 25+ employees

GOVERNMENT AVIATION HOSPITALITY OIL & GASBFSI

OUR MAJOR CUSTOMERS ARE FROM THESE VERTICALS

Telco BFSI Government Oil and Gas Enterprise

Page 19: Spectrami

19

YOY GROWTH IN REVENUES CUSTOMER BASE

AREAS OF FOCUS

GEOGRAPHIC PRESENCEGCC

(Dubai, Abu Dhabi, Oman, Qatar, Kuwait, Bahrain, KSA )

O F F I C E S Head office in DubaiLocal Presence – Abu Dhabi, Oman, Qatar, Kuwait, Bahrain, KSA

6 5 +N U M B E R O F P A R T N E R S I N G C C R E G I O N

CURRENT PORTFOLIO

FIDELIS

CYBER

SECURITY LOGRHYTHM GOOD

TECHNOLOGY ACTIFIOTENABLEA10

NETWORKS

CA + XCEEDIUMRED HAT

2011 - 2012 2012 - 2013 2013 - 2014 2014-2015(expected)

6.7Million USD

8.0Million USD

10Million USD

16Million USD

Looking at 60% growth

this year

250+Total customer base in year 2014-15

IT security Storage solution

Page 20: Spectrami

20

SHOWROOM

SECURITY INTELLIGENCE PLATFORM

SPECTRAMI -SOLUTIONS SHOWCASE

Fidelis XPS equips security-conscious organizations to confidently detect, investigate and stop advanced attackers at every stage of the attack lifecycle.

Analyze all of your organization’s network traffic at multi-gigabit speeds. With Fidelis XPS you can detect the tools and tactics of advanced

attackers including advanced malware, exploits and command and control activity that typically bypass traditional network security systems. Identify attacker behavior including lateral movement and the staging of data for exfiltration. Fidelis XPS provides the visibility, context and speed required to identify threats and ensure data theft never

happens.Capabilities include Detection

at Every Stage of the Attack Lifecycle, Deep Session Inspection, Visibility Across All Ports and Protocols, retroactive Detection and Investigation, Accelerated Investigation Cycles and ability to Stop Attackers on the Network.

Tenable’s SecurityCenter Continuous View (SecurityCenter CV) is the only true continuous network monitoring platform. SecurityCenter CV provides the broadest coverage of your environment, the deepest detection of vulnerabilities, misconfigurations, malware and real-time threats, the most advanced analytics, and the industry’s only Assurance Report Cards. SecurityCenter Continuous View and SecurityCenter products offer complete vulnerability analytics and continuous network monitoring to identify all known vulnerabilities, continuously monitor networks for threats, and perform analysis to measure security and compliance status and to rapidly respond to security breaches. The new capabilities in SecurityCenter 5.0 enable CISOs and security leaders to provide continuous assurance by measuring, analyzing and visualizing the security posture of their IT enterprise.

Selecting a platform upon which to build your security operation is one of the most important strategic decisions you’ll make. It has to meet your immediate needs and it has to scale over time. It shouldn’t require costly integrations or customizations to realize your goals. LogRhythm seamlessly combines SIEM, log management, file integrity monitoring and machine analytics with host and network forensics in a fully integrated Security Intelligence Platform.

LogRhythm is designed to address an ever-changing landscape of threats and challenges, with a full suite of high-performance tools for security, compliance and operations. Comprehensive, useful and actionable insight provides true visibility into what is really going on in and around an enterprise IT environment.

•  Next-generation SIEM and log management

•  Independent host forensics and file integrity monitoring

•  Network forensics with application ID and full packet capture

•  State-of-the art machine analytics•  Advanced correlation and pattern 

recognition•  Multi-dimensional user / host / 

network behavior anomaly detection•  Rapid, intelligent search•  Large data set analysis via visual 

analytics, pivot and drilldown•  Workflow-enabled automatic 

response via LogRhythm’s SmartResponse

•  Integrated case management

XPS ADVANCED THREAT DEFENSE

TENABLE’S SECURITYCENTER CONTINUOUS VIEW

Page 21: Spectrami

21

A10’s Application Delivery Controllers, an evolution of traditional server load balancers (SLBs), ensure that customer data center applications and networks remain highly available, accelerated, and secure.

Application availability enables your Web and key infrastructure servers to scale and seamlessly redirect users in the event of an outage, using core advanced layer 4-7 load balancing and application health-checks. Acceleration capabilities provide fast and responsive service to your customers while reducing infrastructure server requirements, using features such as SSL offload, RAM caching,

compression and TCP reuse. Security protection services are provided against advanced and emerging attacks for uninterrupted operations, with capabilities including Web and DNS application firewalls (WAF and DAF), application access management (AAM), SSL Insight and firewall load balancing (FWLB).

All A10 ADCs have advanced capabilities such as customized traffic transformation with our aFleX scripting tool, a comprehensive RESTful management API (aXAPI) enabling automated provisioning and support for multi-data center global server load balancing (GSLB).

APPLICATION DELIVERY CONTROLLER

Actifio - Radically Simple CDS is a purpose-built storage system, designed to manage data protection and availability applications traditionally handled by siloed data management tools including backup, snapshot, disaster recovery, business continuity, replication, deduplication and WAN optimization through a single solution by virtualizing storage systems, integrating their common core functions – Copy, Store, Move and Restore – into a single, fully optimized and efficient storage platform. Actifio effectively decouples the management ofdata from its underlying infrastructure, just as server virtualization does.

Industry is experiencing storage explosion problems Industry is experiencing storage explosion problems inside business and struggle to meet application level SLA’s and backup window, copy data is likely to blame. Backup, Snapshot, DR, BC, Test & Dev, Analytics all of them are making copy above copy of production data, in an independent silo unaware of the copies that already exist. Companies now spend more time and money managing copies of data than spent on production data. This problem needs a solution.

Actifio is based on patented Virtual Data Pipeline (VDP) technology, delivering dramatically enhanced business availability by eliminating backup and restore windows and creating virtual point-in-time copies of data on-demand, for use by any business Application. By integrating data deduplication, network, and processor utilization optimization, Actifio’s VDP provides the most efficient way to manage data growth while solving your biggest IT challenge around information protection and availability.

ACTIFIO CDS

XSUITE PRIVILEGED IDENTITY MANAGEMENTXsuite delivers Next Generation privileged identity management with a robust set of controls designed to limit, monitor, and record the activity of privileged users across hybrid cloud environments.

Xceedium Xsuite controls access, monitors, and records the activities of privileged users across hybrid cloud environments. You can easily define and enforce security policies for sensitive systems across traditional data centers, virtualized infrastructure, and public and private clouds. Xsuite vaults and manages credentials, federates identities and protects systems regardless of where they’re located; helping to reduce risk, ensure compliance, and lower administrative overhead.

Red Hat JBoss Middleware is a family of lightweight, cloud-friendly, enterprise-grade products that help organizations innovate faster, in a smarter way. That’s what we call enlightened innovation.

Red Hat JBoss Middleware delivers the innovation of community projects without the risks and potential costs of deploying them in production or embedding them in a product for resale. IT organizations and independent software vendors alike can benefit from adopting Red Hat JBoss Middleware for the development and deployment of mission-critical applications and services.

The Red Hat JBoss Middleware portfolio:•  Integrates software components from various open source communities, 

including the JBoss community.•  Combines innovative open source software with the testing, certification, 

and maintenance releases necessary for enterprise production use.•  Is rigorously tested and certified against multiple operating systems, 

Java™ Virtual Machines (JVMs), and databases.•  Includes documentation, training, multiyear maintenance policies, 

guaranteed patches, updates, hot fixes, legal assurance, and award-winning support.

•  Is best suited for mission-critical, long-term production use.

REDHAT JBOSS MIDDLE WARE

Page 22: Spectrami

22

MOBILE APPLICATION MANAGEMENTManage containerized apps and maintain control over corporate information being consumed by your extended enterprise across a growing variety of managed and unmanaged devices. With MAM from Good, you can support the complete mobile app lifecycle.

MOBILE COLLABORATIONEmployees can be more productive with secure mobile collaboration. The Good Collaboration Suite provides an intuitive user experience with separation of business and personal tasks on the same device, delivering the core productivity apps that users demand — all built on the Good Secure Mobility Platform, so your corporate data is protected.

ENTERPRISE SPLIT BILLINGGood removes the complexity and cost associated with managing mobile data usage for BYO or COPE devices, with split billing technology. With this innovative solution, the company receives a separate bill for just the data used by specified corporate apps built on Good Dynamics, removing the need for employee expense recovery programs or stipends, and reducing regulatory risk.

MOBILE CONTENT MANAGEMENTDeliver the app-level encryption and data protection your mobile employees need to safely share documents and other content. With Good you can securely mobilize content stored in SharePoint, on file shares, or across multi-device synchronization.

ENTERPRISE MOBILITY MANAGEMENTReduce costs and simplify management by centrally controlling the complete mobile device and app lifecycle. Good’s Enterprise Mobility Management solutions allow enterprises to holistically manage diverse mobility needs and embrace the”Bring Your Own Device” (BYOD) trend without compromising security.

MOBILE IDENTITY AND ACCESS MANAGEMENT (IAM)Today’s app-driven world demands that Identity and Access Management (IAM) capabilities be delivered not just to mobile devices, but also to mobile apps. Good Dynamics bridges the gap between Enterprise IAM and the mobile endpoint by extending strong two-factor authentication, single sign-on, identity federation, and on-demand policy deployment and enforcement.

BLACKBERRY MIGRATION PLANNINGA successful BlackBerry transition requires a mobile messaging platform that supports the security that IT needs, the productivity apps that users expect, and the flexibility to grow that the business demands. Good provides a secure messaging solution that offers day one productivity along with MDM and a BlackBerry-like security architecture.

MOBILE SERVICE MANAGEMENTGrow mobile deployments with a scalable, reliable solution that continually monitors the mobility infrastructure and provides extensive device metrics, enabling the support desk to quickly diagnose where problems lie and resolve them in a fraction of the time. Staffing costs are lowered, user satisfaction is increased and business disruption is minimized.

MOBILE DEVICE MANAGEMENT (MDM)Configure and manage devices over the air and lock down or remote wipe if compromised. Automate device provisioning, policy and configuration assignments, role changes, and device decommissioning. With MDM from Good, IT can focus on more strategic functions while still supporting the complete mobile device lifecycle.

BYOD — BRING YOUR OWN DEVICEMaximize employee productivity while ensuring security and compliance. Bring your own device with total confidence that your confidential data and apps are secure. Good’s unique “containerization” places a safe partition between personal and business data for solid information integrity that protects email and other programs.

GOOD FOR SAMSUNG KNOXGood containers and apps can be integrated into the Samsung KNOX security solution, while Good Mobile Device Management supports KNOX management. Samsung KNOX is a tamper proof Android system, leveraging hardware- and software-based protections that protect system integrity at boot and runtime. Now customers can combine leading Good-secured apps, container security, and DLP controls with Samsung KNOX system security for a multi-layered security approach that accelerates Android adoption.

SHOWROOM

Page 23: Spectrami

23

CONTACTS

SALES & OPERATIONSPUNIT BHATIA,Executive Director [email protected] of Joining: 2015

CHANNELILYAS MOHAMMED,Channel Director [email protected] of Joining: 2013

TECHNICAL SARFARAZ KAZI,Technical Director [email protected] of Joining: 2011

MARKETING ASHUTOSH BARONIA,Marketing Manager [email protected] of Joining: 2011

ANAND CHOUDHA, Managing Director [email protected] of Joining: 2011

Page 24: Spectrami

24

Security Intelligence Platform

Advanced Threat Defense Solution

Secure MobilitySolution

Network Monitoring & Vulnerability Management

Application Delivery Controller

Copy DataManagement

Open Source Solution

Identity Management Solution

Cyber SecuritySolution

Security & Storage Solutions