SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Issue 13 // July 2017
VMWARE INTRODUCES INTEGRATIONS
WITH DELL EMC TO ACCELERATE
WORKFORCE TRANSFORMATION
With these integrated solutions, organisations will be able to leverage converged
infrastructure to optimise integrated desktop and application workloads.
The new HPE Apollo 6000 Gen10, HPE SGI 8600 and HPE
Apollo 10 Series systems are workload-optimised to deliver
faster, more efficient insights.
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:
V
Mware has
introduced
new technology
integrations with
Dell that enhance
VMware End-User Computing
(EUC) solutions to help
customers realise the benefits
of workplace transformation
through mobile, desktop and
cloud technologies.
With these integrated
solutions, organisations of all
sizes and industries with various
use cases will be able to leverage
converged infrastructure to
optimise integrated desktop and
application workloads and utilise
unified endpoint management
(UEM) to streamline
management and significantly
drive down costs.
Integration between VMware
AirWatch and Dell Client
Command Suite will extend
remote management capabilities
for key Dell hardware system
attributes to enhance AirWatch
HPE unveils new
high performance
computing solutions
Hewlett Packard Enterprise has
announced a new generation of
High Performance Computing
(HPC) and artificial intelligence
(AI) systems, software and
Continued on page 3
Continued on page 3
services. The new HPE Apollo
6000 Gen10, HPE SGI 8600 and
HPE Apollo 10 Series systems are
workload-optimised to deliver
faster, more efficient insights
Unified Endpoint Management
(UEM). Additionally, Dell
has announced Dell EMC
VDI Complete Solutions that
will offer a complete desktop
and application virtualisation
solution powered by VMware
Horizon with workload
optimised infrastructure,
integrated software, optional
Dell Wyse thin clients and
competitive pricing.
According to the company,
these integrated solutions
while reducing vulnerability to
cyber-attacks and improving
economic control, said the
company.
The first co-created system
since HPE acquired SGI, the
HPE SGI 8600 is a liquid cooled
petascale system, based on the
legacy SGI ICE XA architecture,
purpose-built to solve the most
complex scientific, engineering
and national security challenges.
According to the company, it
delivers fast parallel processing
performance, scales to more than
10,000 nodes without additional
switches using integrated switches
and hypercube technology and
offers more choice and flexibility
based on industry standards.
The HPE Apollo 6000 Gen10’s
new capabilities include reliability,
accessibility, serviceability
and manageability, better
application licensing efficiency,
reduced latency and higher
IOPs performance and reduced
power consumption and cooling
requirements, said the firm.
New cost effective platforms,
Sumit Dhawan, VMware
showcase the benefits of Dell
Technologies, a family of
businesses that provides the
essential infrastructure for
organisations to build its digital
future, transform IT and protect
the most important asset –
information.
For more information, please write to sales.value@redingtonmea.com
HPE SYNERGY
A new category of Infrastructure designed to accelerate
application delivery in both traditional and new IT environments.
Brought toyouby HPEandIntel®
.
Intel Inside®
.Powerful Productivity Outside.
Intel andtheIntel logoaretrademarksof Intel CorporationintheU.S.and/or other countries.
© Copyright 2016Hewlett PackardEnterpriseDevelopment LP.
For more information, write to us at sales.value@redingtonmea.com
AWS Greengrass is
now available
AWS Greengrass eliminates the complexity involved in programming and updating IoT devices.
Amazon Web Services has
announced that AWS Greengrass
is now available to all customers,
enabling users to run AWS
compute, messaging, data
caching, and sync capabilities on
connected devices.
With AWS Greengrass,
devices can run AWS Lambda
functions to perform tasks
locally, keep device data in sync,
and communicate with other
devices while leveraging the
full processing, analytics, and
storage power of the AWS Cloud.
AWS Greengrass
“eliminates the complexity
involved in programming
and updating IoT devices.”
Developers can add AWS
Lambda functions to connected
devices right from the AWS
Management Console, and
devices can execute the code
locally, responding to events
and taking actions in near
real-time. AWS Greengrass also
includes IoT messaging and
synching capabilities so devices
can send messages to other
devices without connecting
back to the cloud. It allows
customers the flexibility to have
devices rely on the cloud when
it makes sense, perform tasks
on their own when it makes
sense, and talk to each other
when it makes sense – all in a
single, seamless environment.
“By embedding AWS
Lambda and IoT capabilities in
connected devices, Greengrass
gives customers the flexibility
to have devices act locally on
the data they generate while
using the AWS Cloud for
management, analytics, and
storage – all using a single,
familiar AWS programming
model,” said Dirk Didascalou,
Vice President of IoT at AWS.
“We are excited to make AWS
Greengrass available to all
customers, and with our partners
shipping AWS Greengrass-
capable devices it is now
incredibly easy to build and run
IoT applications that seamlessly
span devices on the edge and in
the AWS Cloud.”
More than a dozen AWS
partners, including Annapurna,
BSquare, Canonical, Digi
International, Intel, Lenovo,
Mongoose, Qualcomm
Technologies, Raspberry Pi,
Samsung, Technicolor and
Wistron are integrating AWS
Greengrass into their platforms.
“VMware and Dell, together,
are delivering powerful business
benefits that can drive down cost
and time-to-desktop that can have
a real impact to the bottom line
for organisations, and also to front
line IT practitioners,” said Sumit
Dhawan, Senior Vice President
and General Manager, End-User
Computing, VMware. “Integrating
industry-leading solutions from
both companies demonstrates
that we are better together and
in a stronger position to help
businesses frustrated with the
burden of managing multiple
vendor contracts, service
level agreements, solution
management consoles and
everything in between that drive
up the total cost of ownership.”
“Organisations are looking
for solutions that will help
them accelerate their workforce
transformation while controlling
cost and complexity,” said Steve
Lalla, Senior Vice President and
General Manager, commercial
client software and solutions, Dell.
“Through our close collaboration
with VMware, we are able to
deliver integrated solutions from
the endpoint to the data centre
and required software that will
provide even greater value to
organisations than ever before.”
Both VMware AirWatch
integration with Dell Client
Command Suite and the Dell
EMC VDI Complete Solutions
is available immediately
through partners.
From page 1 From page 1
VMware... HPE...
3
In the last two months itself, we have
seen a glimpse of what can transpire
if enterprises, whether small or
large, take cybersecurity lightly.
Both WannaCry and NotPetya, the
recent ransomware attacks, have
crippled organisations from going
about their regular operations and
had monumental information and
financial loss.
These kinds of attacks have
tested the security posture of
firms who had firmly believed that
their security systems can provide
adequate protection. WannaCry
ransomware has brought the
spotlight back on the fundamentals
of evaluating a firm’s security
vulnerabilities, ensuring security
awareness among end-users and
patching systems on time.
The business of selling security
solutions means that what we are
trading is based on ‘trust’. The
current market circumstances offer
huge opportunities for our partners,
both, from an advisory role and
selling holistic solutions. Partners
need to hone their skills in next-gen
anti-malware, patch management,
advanced email security, privileged
identity management and APT
protection solutions. They need
to elevate their role from being
only security solutions providers
to trusted IT security advisors and
consultants with a core competency
in specific industry verticals.
At Redington Value, we look
to continue enabling our resellers
in addressing the full life cycle
of information security needs of
regional customers. We provide
end-to-end support in sales, pre-
sales, consultancy and professional
services engagement in multiple
areas. We encourage our partners
to take advantage of our support
to be able to emerge as successful
security resellers.
Weathering the
cybersecurity
storm
By Hishamul Hasheel, VP, Software and
Security, Redington Value
COLUMN: REDefined
HPE Apollo 10 Series, are
optimised for entry level Deep
Learning and AI applications that
are easy to manage and deploy.
The HPE Apollo sx40 System is a
1U dual socket Intel Xeon Gen10
server with support for up to 4
NVIDIA Tesla SXM2 GPUs with
NVLink. The HPE Apollo pc40
System is a 1U dual socket Intel
Xeon Gen10 server with support
for up to 4 PCIe GPU cards.
HPE’s HPC systems are
enhanced by a new compute
experience designed to address
the data intense needs of HPC and
AI customers. The key elements
of the HPC experience include
enhanced firmware security and
increased agility with software
defined HPC capabilities.
For more information, please write to sales.value@redingtonmea.com
about alerts and affected endpoints
while providing metadata, so users
can quickly distinguish between
threats and false alarms and save
hours of legwork and research, said
the firm.
“When an attacker gets on an
endpoint, they gain a foothold in
your network – so what begins as
an inadvertent click on a well-
crafted phishing email can escalate
as attackers move laterally within
your network and gain access to
your sensitive information,” said
Fidelis Cybersecurity CTO Kurt
Bertone. “Security teams are
buried in alerts, so we designed
our technology to provide the
visibility, context and automation
that security professionals need to
detect, investigate and resolve the
modern threats that enterprises
face today.”
Fidelis Cybersecurity has
announced the availability of Fidelis
Endpoint Cloud, which is expected
to provide security personnel
with the visibility, context and
automation required to investigate
and resolve threats lurking on
endpoints and to protect their
organisations from cyberattacks.
According to the company, this
solution includes all the features
and benefits of the on-premise
Security solutions provider
CyberArk Software has acquired
privately-held Conjur, a Newton,
Massachusetts based provider of
DevOps security software for $42
million in cash.
Conjur’s technology for
securing DevOps extends
CyberArk’s reach deeper into
the DevOps lifecycle to protect
Conjur’s innovative DevOps
security solution is gaining
momentum with developers,
security and operations
teams in modern enterprise IT
organisations around the world.”
CyberArk acquires Conjur for $42 million
Conjur’stechnologyforsecuringDevOpsextendsCyberArk’sreachdeeperintotheDevOpslifecycle.
Fidelis Cybersecurity releases endpoint cloud solution
The solution includes all the benefits of the on-premise version of Fidelis Endpoint with the added convenience, scalability and
economy of a cloud-based deployment model.
44
secrets and manage machine
identities.
“While empowering
organisations with more
efficiency and speed, the DevOps
process is also dramatically
expanding the attack surface
across the entire enterprise,”
said Udi Mokady, Chairman and
CEO, CyberArk. “CyberArk’s
acquisition of Conjur further
strengthens our market
leadership position – providing
the industry’s only enterprise-
class solution for privileged
account security and secrets
management on premises,
in the cloud and across the
DevOps pipeline. Now with
Conjur, CyberArk customers can
truly embrace DevOps without
compromising on security.”
“Conjur’s innovative DevOps
security solution is gaining
standard for privileged account
security and secrets management,
helping customers move to a true
DevSecOps delivery model that
supports greater business agility.”
The CyberArk-Conjur
Solution for DevOps is available
now from CyberArk.
With the Fidelis Endpoint Cloud
offering, all of the management,
metadata and analytics components
of the Fidelis Endpoint solution
are deployed in a Fidelis-provided
cloud infrastructure – making it
possible for organisations to focus
on security without the distractions
of provisioning, patching and
maintaining their ‘back end’ security
infrastructure.
Fidelis Endpoint Cloud can be
deployed as a standalone solution
or in conjunction with the Fidelis
Network product. When used
together, network and endpoint
event data is automatically
correlated to confirm and validate
alerts and suspicious activity.
Fidelis Endpoint Cloud is
generally available and includes all
the benefits of the latest version of
the solution.
version of Fidelis Endpoint with
the added convenience, scalability
and economy of a cloud-based
deployment model with capacity-
based subscription pricing.
With Fidelis Endpoint,
users can quickly identify other
compromised machines, determine
the root cause of issues, and take
rapid response and remediation
actions. The solution eases the steps
needed to retrieve information
Elizabeth Lawler, Conjur
momentum with developers,
security and operations teams
in modern enterprise IT
organisations around the world,”
said Elizabeth Lawler, CEO
and Co-Founder, Conjur. “We
are excited to become part of
CyberArk to set a new industry
For more information, please write to sales.value@redingtonmea.com
The biometric authentication solution helps organisations secure their networks against
unauthorised access, while also reducing the risk of attack from hackers and identity thieves.
Fujitsu has launched PalmSecure
ID Login, a new biometric
authentication solution that
helps organisations secure their
networks against unauthorised
access, while also reducing the
risk of attack from hackers and
identity thieves.
According to the company,
PalmSecure ID Login integrates
Fujitsu rolls out new biometric
authentication solution
Fujitsu’s highly secure biometric
palm vein authentication
technology into corporate
network environments using
Microsoft Active Directory –
helping boost IT security while
also making it easier for users to
log on to their system without
needing to remember complex
passwords, which need to be
changed on a regular basis.
To log on to their PC,
or authenticate for internal
system access, PalmSecure ID
Login users simply hover their
hand over a contactless palm
vein scanner – already built
in to several Fujitsu Lifebook
notebooks and Stylistic 2-in-1
tablets, and available as a stand-
55
alone USB pluggable device.
Enrolled users can log in from
any device within a corporate
network, since PalmSecure ID
Login is connected to Microsoft
Active Directory, which centrally
manages and stores all access
data, including biometrics.
The Fujitsu PalmSecure
technology works by capturing
an infrared scan of oxygen-
depleted blood veins within the
palm of a hand. The technology
combines the convenience of a
contactless sensor with biometric
security. For users, the system
is more convenient and faster
than typing a password – with
identity verification usually
completed within one second,
said the firm.
Thomas Bengs, Director
and Head of Biometrics, Fujitsu,
EMEIA, said, “Passwords are
forgotten, lost and get stolen,
which makes them a serious
vulnerability in any organisation’s
security arrangements. Replacing
password logins with palm
vein biometric authentication
technology reduces the risk of
misuse from stolen or unsecured
passwords, including the worst-
case scenarios of catastrophic
hacker attacks, identity fraud
and large scale data theft. It’s
also impossible to forget your
credentials, since they’re in the
palm of your hand – unlike
a smart card, or a difficult to
remember password.”
Fujitsu PalmSecure ID Login
is available to order across EMEIA
from June 2017, with availability
in Oceania and the Americas to
follow. Fujitsu PalmSecure ID
Login is sold directly from Fujitsu
and through the firm’s partners
with pricing varying according to
geographical regions.
Fortinet has announced the
findings of its latest Global Threat
Landscape Report. The data
spans the cybersecurity kill chain
focusing on three central aspects
of the landscape, including
application exploits, malicious
software, and botnets against the
backdrop of important enterprise
technology and industry sector
Fortinet Threat Landscape report
highlights most threats are opportunistic
Research demonstrates highly automated cyber defenses are critical to
mitigate pervasive ‘cybercrime-as-a-service’ attacks.
Phil Quade, Fortinet
trends. The research reveals that
while more high profile attacks
have dominated the headlines,
the reality is that most threats
faced by most organisations are
opportunistic in nature fueled by
a pervasive Crime-as-a-Service
infrastructure.
Phil Quade, Chief Information
Security Officer, Fortinet said,
“As organisations increasingly
adopt convenience and cost-
saving IT techniques, such as
cloud services, or add a variety of
smart devices to their network,
visibility and control of their
security is at risk. Meanwhile,
attackers are buying or re-using
tools of their own. Cybersecurity
strategies need to increasingly
adopt trustworthy network
segmentation and high degrees of
automation to prevent and detect
adversaries’ efforts to target the
newly-exposed flanks of our
businesses and governments.”
Three important research
highlights are as follows:
Attack tools never forget and
are always ready for service,
anywhere and anytime:
Modern tools and Crime-as-a-
Service infrastructures enable
adversaries to operate on a
global scale at light speed. As
a result, the Internet seems
not interested in geographic
distances or boundaries because
most threat trends appear more
global than regional.
Hyperconvergence and IoT
are accelerating the spread
of malware: As networks
and users increasingly share
information and resources,
attacks are spreading rapidly
across distributed geographic
areas and a wide variety of
industries. Studying malware
can help provide views into the
preparation and intrusion stages
of these attacks.
Visibility of distributed
and elastic infrastructure is
diminishing: Visibility and control
over today’s infrastructures are
diminishing as the number of
potential attack vectors across
the expanded network landscape
continues to grow.
For more information, please write to sales.value@redingtonmea.com
Veeam - Partner Academy - Dubai - 5 June
Veeam - Enablement Session with Fujisoft - Dubai - 8 June
Fortinet and Redington Value Iftar - Amman - 12 June Barracuda,MicrosoftandRedingtonValueIftar-Dubai-12June
Fortinet - Enablement Session with Hilal Group - Dubai - 6 June
Sonicwall - CSSP Bootcamp - Dubai - 11-14 June
Huawei - Partner Pre Sales Training Program - Volume Server - Dubai - 13 June
CheckPointSuhoor-Manama-12June
6
EVENTS
DellEMC,VMwareandRSA-Iftar-Riyadh-13June
Fortinet-PartnerIftar-Jeddah-13June
For more information, please write to sales.value@redingtonmea.com
Veeam - Enablement Session with Atom Options - Dubai - 18 June
Fortinet and Redington Value Iftar - Dubai - 14 June
Huawei - Partner Pre Sales Training Program - Campus Switch - Dubai - 20 June Huawei - Partner Pre Sales Training Program - Entry Level - Dubai - 20 June
Malwarebytes and Redington Value Iftar - Dubai - 13 June
Veeam - Enablement Session with Atom Options - Dubai - 18 June
Huawei - Huawei Iftar with Partner - Jeddah -20 June Veeam - Enablement Session with Mezzan - Dubai - 22 June
Huawei - Partner Pre Sales Training Program - WiFi - Dubai - 13 June
HPE - Redington Value HPE Iftar - Riyadh - 20 June
7
For more information, please write to sales.value@redingtonmea.com
Cisco - Sales Floordays and Demos - Nigeria - 8 June
8
Cisco - Sales Floor Day & Demos - Tanzania - 2 June
Dell EMC - Partner Enablement Session - Kenya - 14 June
Dell EMC - Partner Enablement Session - Kenya - 7 June
Tripp Lite -Lunch and Learn Partner Session - Kenya - 15 June Cisco - Sales Floor Day and Demos - Kenya - 22 June
Fortinet - Partner Training - Uganda - 14 June
Symantec - Partner Event - Kenya - 15 June
Dell EMC - Partner Event - Kenya - 23 June Tripp Lite -Lunch and Learn Partner Session - Kenya - 29 June
Fortinet-PartnerTraining-Tanzania-6June
EVENTS
For more information, please write to sales.value@redingtonmea.com
10
Trend Micro has announced the
launch of a corporate venture
fund to explore emerging
technology markets. With an
initial investment of $100
million, this venture fund will
allow Trend Micro to nurture
We want our channel to feel
part of a mutually beneficial
partnership where both parties
are invested in driving growth
together.”
Trend Micro launches $100M venture fund
Theventurefundwillallowthefirmtoexploreemergingtechnologymarkets.
a portfolio of startups that are
incubating ideas and living at
the epicenter of hyper growth
markets, such as the Internet of
Things (IoT).
Eva Chen, Founder and
CEO, Trend Micro, said, “Trend
Micro’s vision has always been
to make the world safe for
exchanging digital information.
The explosion of devices is
transforming how the world
works, thinks and acts. It is
clear that the ecosystem is still
evolving and there is work to
do to ensure organisations and
individuals can operate and live
safely in this new reality.”
Trend Micro’s venture will
offer companies, financial
backing, access to its world-
class global threat intelligence,
strategic alliances, as well as its
Platforms today. The second
mega wave was all about the
cloud; we made a bet early
on to securing the cloud and
so far we have secured over
two billion workload hours on
Amazon Web Services (AWS)
alone. Now, we believe the next
wave has arrived with IoT; our
fund will help us harness this
opportunity.”
With a strong financial
position and 72 quarters of
consecutive profitability, Trend
Micro says it is well positioned
to invest funds to do research
and make advancements
consistent with its corporate
strategy. The formation of this
venture arm allows additional
freedom to dive into new
areas without disrupting core
business resources.
Eva Chen, Trend Micro
channel of more than 28,000
partners.
In return, working with
these investments will uncover
insights into emerging
ecosystem opportunities,
disruptive business models,
market gaps and skillset
shortages. These learnings
will influence Trend Micro’s
cybersecurity solution planning
across the company.
“We have a 29-year history
of successfully anticipating
technology trends to secure all
types of environments,” said
Chen. “The first mega wave
we caught was the growth
of the PC marketplace; we
committed early on to endpoint
protection and remain a Leader
in Gartner’s Magic Quadrant
for Endpoint Protection
Malwarebytes unveils inaugural
channel programme
Partners can look forward to attractive margins from the new EMEA channel programme.
Malwarebytes, the advanced
malware prevention and
remediation solution provider,
has introduced its inaugural
channel programme for
partners across EMEA.
According to the firm, the
programme has been designed
to be simple and focuses on
driving deal registrations
with a commitment from the
company to help its partners
“close business opportunities
quickly and easily.”
Where traditional
channel schemes evaluate
partners based on revenue,
Malwarebytes looks to
incentivise its reseller and
distributor network based on
the exposure and opportunity
reach they provide for the
security company. Partners
can attain gold and platinum
levels based on numbers
of deal registrations rather
than revenue, certification
programs or complex points
based programmes.
“As a company,
Malwarebytes has always
been innovative and we’re
carrying that ethos through
to our partner programme,”
said Anthony O’Mara, EMEA
Vice President, Malwarebytes.
“Vendors often make partners
jump through far too many
hoops, wanting arbitrary
criteria to be met, often
dictating to resellers how to
run their business. We’re not
doing any of that. We know
our partners run successful
businesses. So, we’ve
designed our programme to
be flexible, forward-looking
and mutually beneficial.
We want our channel to feel
part of a mutually beneficial
partnership where both parties
are invested in driving growth
together.”
By providing support
and positive incentives, the
company said that it is offering
the reseller community
the tools they need to take
advantage of the opportunities
in the security space.
For more information, please write to sales.value@redingtonmea.com
The new capabilities enable businesses to deliver digital life experience
users expect.
Veeam and Microsoft extend alliance to
deliver availability for the always-on cloud
Veeam Software has announced
new capabilities enabling any
business to deliver the digital
life experience users expect by
protecting applications and
data running in hybrid cloud
leveraging backup and disaster
recovery based on Microsoft Azure
and Veeam ‘Always-On Cloud’
Availability Platform.
The new capabilities include
the following:
Veeam Disaster Recovery in
Microsoft Azure simplifies and
automates a disaster recovery
in Azure, helping businesses
maintain business continuity and
availability of critical workloads
with all-encompassing on-demand
Peter McKay, Veeam
11
DR in Azure. Veeam DR in Azure
combines Veeam Direct Restore
and new Veeam PN (Veeam
Powered Network).
Veeam PN for Microsoft Azure is
designed to simplify and automate
the setup of a DR site in Azure
using lightweight software-defined
networking (SDN). It helps
maintain business continuity and
availability by eliminating the
complexity of VPN deployments
and is designed for businesses of all
sizes and service providers.
The company announced a
new Scale Out Backup Repository
(SOBR) support for cloud object
storage as an Archive Tier extent.
This new functionality, arriving
with Veeam Availability Suite
v10, enables customers to archive
Veeam backups to Azure Blob
storage. This native support helps
customers to leverage Azure to
reduce long-term data archival,
retention and compliance costs.
Veeam Agent for Microsoft
Windows, previously announced
and was made generally available
at VeeamON 2017 in May. This
solution extends Veeam ‘Always-
On Cloud’ Availability Platform
to public cloud and physical
servers. This new solution
offers features and capabilities
designed to ensure Availability for
Windows-based physical servers,
workstations and endpoints,
as well as Windows workloads
running in Azure.
Microsoft announced that it
will enable all Azure customers to
access and use disks in Azure up
to 4TB in size (previously 1TB).
This enhancement means Veeam
customers can fully realize a more
cost-effective solution using a
Veeam virtual appliance to back
up four times as much data in
Azure Storage.
The firm also announced an
update to its SaaS Availability
solution, Veeam Backup for Office
365. In this update, a multi-tenant
architecture enables protecting
larger Office 365 deployments
with a single installation, while
empowering Veeam Cloud and
Service Providers (VCSPs) to
deliver Office 365 backup services.
Peter McKay, Co-CEO
and President, Veeam, said,
“Veeam and Microsoft have
its customers covered with
new solutions for backup and
disaster recovery using Azure.
With Veeam, enterprises can
confidently move to Azure and
Hybrid Cloud, and be confident
that their data and applications
will always be available, no
matter what happens.”
Intoday’senvironmentofexplodingdatagrowth,
customersneedsupportforexistingandmodern
workloadsastheyupdatetheirinfrastructurewith
software-definedtechnologiestobemorenimble
andcost-efficient.”
Newest version of storage platform broadens protocol support to extend flexibility of object storage deployments for
traditional and modern workloads.
Red Hat has announced Red Hat
Ceph Storage 2.3. This release,
based on Ceph 10.2 (Jewel),
introduces a new Network File
System (NFS) interface, offers new
compatibility with the Hadoop S3A
filesystem client, and adds support
Red Hat Ceph storage release expands
versatility as object store
for deployment in containerised
environments. According to the
company, these improvements
expand the product’s versatility as
an object storage platform, offering
the ability to support big data
analytics and serve as a common
platform for file-based workloads
Red Hat Ceph Storage is an
open, software-defined, unified
storage platform. It decouples
software from hardware to run
cost-effectively on industry-
standard servers and disks, scales
flexibly and massively to support
multiple petabyte deployments,
and provides web-scale object
storage for modern use cases.
Ranga Rangachari, Vice
Ranga Rangachari, Red Hat
President and General Manager,
Storage, Red Hat, said, “In
today’s environment of exploding
data growth, customers need
support for existing and modern
workloads as they update their
infrastructure with software-
defined technologies to be more
nimble and cost-efficient. Red Hat
aims to assist customers with IT
modernisation, and object storage
advancements in Red Hat Ceph
Storage 2.3 coupled with Red Hat
Consulting and Global Support can
be instrumental to their transition
and ultimate success.”
Red Hat Ceph Storage 2.3
and its containerised image will
be generally available via the
Red Hat Customer Portal and on
the Red Hat Container Registry,
respectively.
For more information, please write to sales.value@redingtonmea.com
Redington Value Journal - July 2017

Más contenido relacionado

La actualidad más candente

Microsoft certified azure developer associate
Microsoft certified azure developer associateMicrosoft certified azure developer associate
Microsoft certified azure developer associateGaurav Singh
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackNetworkCollaborators
 
Introduction to Microsoft on AWS
Introduction to Microsoft on AWS Introduction to Microsoft on AWS
Introduction to Microsoft on AWS Amazon Web Services
 
Infrastructure as Code Continuous Integration: A Delivery Pipeline Journey Se...
Infrastructure as Code Continuous Integration: A Delivery Pipeline Journey Se...Infrastructure as Code Continuous Integration: A Delivery Pipeline Journey Se...
Infrastructure as Code Continuous Integration: A Delivery Pipeline Journey Se...Amazon Web Services
 
RightScale Webinar: Operationalize Your Enterprise AWS Usage Through an IT Ve...
RightScale Webinar: Operationalize Your Enterprise AWS Usage Through an IT Ve...RightScale Webinar: Operationalize Your Enterprise AWS Usage Through an IT Ve...
RightScale Webinar: Operationalize Your Enterprise AWS Usage Through an IT Ve...RightScale
 
Why companies are moving Infor applications to cloud
Why companies are moving Infor applications to cloudWhy companies are moving Infor applications to cloud
Why companies are moving Infor applications to cloudVelocity Technology Solutions
 
Using Amazon RDS to Power Enterprise Applications (DAT202) | AWS re:Invent 2013
Using Amazon RDS to Power Enterprise Applications (DAT202) | AWS re:Invent 2013Using Amazon RDS to Power Enterprise Applications (DAT202) | AWS re:Invent 2013
Using Amazon RDS to Power Enterprise Applications (DAT202) | AWS re:Invent 2013Amazon Web Services
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageRyan Snell
 
Ibm bluemix
Ibm bluemix Ibm bluemix
Ibm bluemix Narendra
 
Cloud application architecture with sql azure and windows azure
Cloud application architecture with sql azure and windows azureCloud application architecture with sql azure and windows azure
Cloud application architecture with sql azure and windows azureEduardo Castro
 
Enterprise Cloud Architecture Best Practices
Enterprise Cloud Architecture Best PracticesEnterprise Cloud Architecture Best Practices
Enterprise Cloud Architecture Best PracticesDavid Veksler
 
Cloud workload migration guidelines
Cloud workload migration guidelinesCloud workload migration guidelines
Cloud workload migration guidelinesJen Wei Lee
 
Running SAP All-in-One ERP production system deployment on the AWS cloud
Running SAP All-in-One ERP production system deployment on the AWS cloudRunning SAP All-in-One ERP production system deployment on the AWS cloud
Running SAP All-in-One ERP production system deployment on the AWS cloudAmazon Web Services
 
Building compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWSBuilding compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWSAmazon Web Services
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes MainstreamIngram Micro Cloud
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company PresentationRapidScale
 
IBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM iIBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM iLuca Comparini
 
Basics of Java Cloud
Basics of Java CloudBasics of Java Cloud
Basics of Java CloudAnkur Gupta
 
Hyper Stratus Migrating Applications to the Cloud
Hyper Stratus Migrating Applications to the CloudHyper Stratus Migrating Applications to the Cloud
Hyper Stratus Migrating Applications to the Cloudbhgolden
 

La actualidad más candente (20)

Microsoft certified azure developer associate
Microsoft certified azure developer associateMicrosoft certified azure developer associate
Microsoft certified azure developer associate
 
Cisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stackCisco Connect 2018 Philippines - Microsoft azure stack
Cisco Connect 2018 Philippines - Microsoft azure stack
 
Introduction to Microsoft on AWS
Introduction to Microsoft on AWS Introduction to Microsoft on AWS
Introduction to Microsoft on AWS
 
Infrastructure as Code Continuous Integration: A Delivery Pipeline Journey Se...
Infrastructure as Code Continuous Integration: A Delivery Pipeline Journey Se...Infrastructure as Code Continuous Integration: A Delivery Pipeline Journey Se...
Infrastructure as Code Continuous Integration: A Delivery Pipeline Journey Se...
 
RightScale Webinar: Operationalize Your Enterprise AWS Usage Through an IT Ve...
RightScale Webinar: Operationalize Your Enterprise AWS Usage Through an IT Ve...RightScale Webinar: Operationalize Your Enterprise AWS Usage Through an IT Ve...
RightScale Webinar: Operationalize Your Enterprise AWS Usage Through an IT Ve...
 
Why companies are moving Infor applications to cloud
Why companies are moving Infor applications to cloudWhy companies are moving Infor applications to cloud
Why companies are moving Infor applications to cloud
 
Using Amazon RDS to Power Enterprise Applications (DAT202) | AWS re:Invent 2013
Using Amazon RDS to Power Enterprise Applications (DAT202) | AWS re:Invent 2013Using Amazon RDS to Power Enterprise Applications (DAT202) | AWS re:Invent 2013
Using Amazon RDS to Power Enterprise Applications (DAT202) | AWS re:Invent 2013
 
Best Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash StorageBest Practices for Architecting VDI with Flash Storage
Best Practices for Architecting VDI with Flash Storage
 
Ibm bluemix
Ibm bluemix Ibm bluemix
Ibm bluemix
 
DevOps and DBA- Delphix
DevOps and DBA-  DelphixDevOps and DBA-  Delphix
DevOps and DBA- Delphix
 
Cloud application architecture with sql azure and windows azure
Cloud application architecture with sql azure and windows azureCloud application architecture with sql azure and windows azure
Cloud application architecture with sql azure and windows azure
 
Enterprise Cloud Architecture Best Practices
Enterprise Cloud Architecture Best PracticesEnterprise Cloud Architecture Best Practices
Enterprise Cloud Architecture Best Practices
 
Cloud workload migration guidelines
Cloud workload migration guidelinesCloud workload migration guidelines
Cloud workload migration guidelines
 
Running SAP All-in-One ERP production system deployment on the AWS cloud
Running SAP All-in-One ERP production system deployment on the AWS cloudRunning SAP All-in-One ERP production system deployment on the AWS cloud
Running SAP All-in-One ERP production system deployment on the AWS cloud
 
Building compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWSBuilding compelling Enterprise Solutions on AWS
Building compelling Enterprise Solutions on AWS
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
IBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM iIBM Private Cloud Solutions with IBM i
IBM Private Cloud Solutions with IBM i
 
Basics of Java Cloud
Basics of Java CloudBasics of Java Cloud
Basics of Java Cloud
 
Hyper Stratus Migrating Applications to the Cloud
Hyper Stratus Migrating Applications to the CloudHyper Stratus Migrating Applications to the Cloud
Hyper Stratus Migrating Applications to the Cloud
 

Similar a Redington Value Journal - July 2017

VMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware HorizonVMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware HorizonRichard Common
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies
 
Cloud computing training | Cloud computing courses
Cloud computing training | Cloud computing coursesCloud computing training | Cloud computing courses
Cloud computing training | Cloud computing coursesCloud computing training
 
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDell Technologies
 
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware
 
Dell: Why Virtualization
Dell: Why VirtualizationDell: Why Virtualization
Dell: Why VirtualizationLiamJohnson30
 
What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?Insight
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any BusinessePlus
 

Similar a Redington Value Journal - July 2017 (20)

Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
Redington Value Journal - July 2018
Redington Value Journal - July 2018Redington Value Journal - July 2018
Redington Value Journal - July 2018
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Redington Value Journal - November 2017
Redington Value Journal - November 2017Redington Value Journal - November 2017
Redington Value Journal - November 2017
 
VMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware HorizonVMware solution brief - client virtualization with Dell and VMware Horizon
VMware solution brief - client virtualization with Dell and VMware Horizon
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 Minutes
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Value journal - August 2021
Value journal - August 2021Value journal - August 2021
Value journal - August 2021
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
Cloud computing training | Cloud computing courses
Cloud computing training | Cloud computing coursesCloud computing training | Cloud computing courses
Cloud computing training | Cloud computing courses
 
Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
 
DELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 MinutesDELL Technologies - The Complete Portfolio in 25 Minutes
DELL Technologies - The Complete Portfolio in 25 Minutes
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 
Accenture & Commvault
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
 
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud Era
 
Dell: Why Virtualization
Dell: Why VirtualizationDell: Why Virtualization
Dell: Why Virtualization
 
What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?What’s New in VMware vSphere 7?
What’s New in VMware vSphere 7?
 
Redington Value Journal - March 2019
Redington Value Journal - March 2019Redington Value Journal - March 2019
Redington Value Journal - March 2019
 
Powering IT Transformation For Any Business
Powering IT Transformation For Any BusinessPowering IT Transformation For Any Business
Powering IT Transformation For Any Business
 

Más de Redington Value Distribution

Más de Redington Value Distribution (20)

Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
 
Value Journal - April-May 2021
Value Journal - April-May 2021 Value Journal - April-May 2021
Value Journal - April-May 2021
 
Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
 
Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
 
Value journal September_2019
Value journal September_2019 Value journal September_2019
Value journal September_2019
 
Redington Value journal - August 2019
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
 
Redington Value Journal - July 2019
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
 
Redington Value Journal - June 2019
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 

Último

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 

Último (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 

Redington Value Journal - July 2017

  • 1. Issue 13 // July 2017 VMWARE INTRODUCES INTEGRATIONS WITH DELL EMC TO ACCELERATE WORKFORCE TRANSFORMATION With these integrated solutions, organisations will be able to leverage converged infrastructure to optimise integrated desktop and application workloads. The new HPE Apollo 6000 Gen10, HPE SGI 8600 and HPE Apollo 10 Series systems are workload-optimised to deliver faster, more efficient insights. Redington Value is a value added distributor for the following brands in parts of Middle East & Africa: V Mware has introduced new technology integrations with Dell that enhance VMware End-User Computing (EUC) solutions to help customers realise the benefits of workplace transformation through mobile, desktop and cloud technologies. With these integrated solutions, organisations of all sizes and industries with various use cases will be able to leverage converged infrastructure to optimise integrated desktop and application workloads and utilise unified endpoint management (UEM) to streamline management and significantly drive down costs. Integration between VMware AirWatch and Dell Client Command Suite will extend remote management capabilities for key Dell hardware system attributes to enhance AirWatch HPE unveils new high performance computing solutions Hewlett Packard Enterprise has announced a new generation of High Performance Computing (HPC) and artificial intelligence (AI) systems, software and Continued on page 3 Continued on page 3 services. The new HPE Apollo 6000 Gen10, HPE SGI 8600 and HPE Apollo 10 Series systems are workload-optimised to deliver faster, more efficient insights Unified Endpoint Management (UEM). Additionally, Dell has announced Dell EMC VDI Complete Solutions that will offer a complete desktop and application virtualisation solution powered by VMware Horizon with workload optimised infrastructure, integrated software, optional Dell Wyse thin clients and competitive pricing. According to the company, these integrated solutions while reducing vulnerability to cyber-attacks and improving economic control, said the company. The first co-created system since HPE acquired SGI, the HPE SGI 8600 is a liquid cooled petascale system, based on the legacy SGI ICE XA architecture, purpose-built to solve the most complex scientific, engineering and national security challenges. According to the company, it delivers fast parallel processing performance, scales to more than 10,000 nodes without additional switches using integrated switches and hypercube technology and offers more choice and flexibility based on industry standards. The HPE Apollo 6000 Gen10’s new capabilities include reliability, accessibility, serviceability and manageability, better application licensing efficiency, reduced latency and higher IOPs performance and reduced power consumption and cooling requirements, said the firm. New cost effective platforms, Sumit Dhawan, VMware showcase the benefits of Dell Technologies, a family of businesses that provides the essential infrastructure for organisations to build its digital future, transform IT and protect the most important asset – information. For more information, please write to sales.value@redingtonmea.com
  • 2. HPE SYNERGY A new category of Infrastructure designed to accelerate application delivery in both traditional and new IT environments. Brought toyouby HPEandIntel® . Intel Inside® .Powerful Productivity Outside. Intel andtheIntel logoaretrademarksof Intel CorporationintheU.S.and/or other countries. © Copyright 2016Hewlett PackardEnterpriseDevelopment LP. For more information, write to us at sales.value@redingtonmea.com
  • 3. AWS Greengrass is now available AWS Greengrass eliminates the complexity involved in programming and updating IoT devices. Amazon Web Services has announced that AWS Greengrass is now available to all customers, enabling users to run AWS compute, messaging, data caching, and sync capabilities on connected devices. With AWS Greengrass, devices can run AWS Lambda functions to perform tasks locally, keep device data in sync, and communicate with other devices while leveraging the full processing, analytics, and storage power of the AWS Cloud. AWS Greengrass “eliminates the complexity involved in programming and updating IoT devices.” Developers can add AWS Lambda functions to connected devices right from the AWS Management Console, and devices can execute the code locally, responding to events and taking actions in near real-time. AWS Greengrass also includes IoT messaging and synching capabilities so devices can send messages to other devices without connecting back to the cloud. It allows customers the flexibility to have devices rely on the cloud when it makes sense, perform tasks on their own when it makes sense, and talk to each other when it makes sense – all in a single, seamless environment. “By embedding AWS Lambda and IoT capabilities in connected devices, Greengrass gives customers the flexibility to have devices act locally on the data they generate while using the AWS Cloud for management, analytics, and storage – all using a single, familiar AWS programming model,” said Dirk Didascalou, Vice President of IoT at AWS. “We are excited to make AWS Greengrass available to all customers, and with our partners shipping AWS Greengrass- capable devices it is now incredibly easy to build and run IoT applications that seamlessly span devices on the edge and in the AWS Cloud.” More than a dozen AWS partners, including Annapurna, BSquare, Canonical, Digi International, Intel, Lenovo, Mongoose, Qualcomm Technologies, Raspberry Pi, Samsung, Technicolor and Wistron are integrating AWS Greengrass into their platforms. “VMware and Dell, together, are delivering powerful business benefits that can drive down cost and time-to-desktop that can have a real impact to the bottom line for organisations, and also to front line IT practitioners,” said Sumit Dhawan, Senior Vice President and General Manager, End-User Computing, VMware. “Integrating industry-leading solutions from both companies demonstrates that we are better together and in a stronger position to help businesses frustrated with the burden of managing multiple vendor contracts, service level agreements, solution management consoles and everything in between that drive up the total cost of ownership.” “Organisations are looking for solutions that will help them accelerate their workforce transformation while controlling cost and complexity,” said Steve Lalla, Senior Vice President and General Manager, commercial client software and solutions, Dell. “Through our close collaboration with VMware, we are able to deliver integrated solutions from the endpoint to the data centre and required software that will provide even greater value to organisations than ever before.” Both VMware AirWatch integration with Dell Client Command Suite and the Dell EMC VDI Complete Solutions is available immediately through partners. From page 1 From page 1 VMware... HPE... 3 In the last two months itself, we have seen a glimpse of what can transpire if enterprises, whether small or large, take cybersecurity lightly. Both WannaCry and NotPetya, the recent ransomware attacks, have crippled organisations from going about their regular operations and had monumental information and financial loss. These kinds of attacks have tested the security posture of firms who had firmly believed that their security systems can provide adequate protection. WannaCry ransomware has brought the spotlight back on the fundamentals of evaluating a firm’s security vulnerabilities, ensuring security awareness among end-users and patching systems on time. The business of selling security solutions means that what we are trading is based on ‘trust’. The current market circumstances offer huge opportunities for our partners, both, from an advisory role and selling holistic solutions. Partners need to hone their skills in next-gen anti-malware, patch management, advanced email security, privileged identity management and APT protection solutions. They need to elevate their role from being only security solutions providers to trusted IT security advisors and consultants with a core competency in specific industry verticals. At Redington Value, we look to continue enabling our resellers in addressing the full life cycle of information security needs of regional customers. We provide end-to-end support in sales, pre- sales, consultancy and professional services engagement in multiple areas. We encourage our partners to take advantage of our support to be able to emerge as successful security resellers. Weathering the cybersecurity storm By Hishamul Hasheel, VP, Software and Security, Redington Value COLUMN: REDefined HPE Apollo 10 Series, are optimised for entry level Deep Learning and AI applications that are easy to manage and deploy. The HPE Apollo sx40 System is a 1U dual socket Intel Xeon Gen10 server with support for up to 4 NVIDIA Tesla SXM2 GPUs with NVLink. The HPE Apollo pc40 System is a 1U dual socket Intel Xeon Gen10 server with support for up to 4 PCIe GPU cards. HPE’s HPC systems are enhanced by a new compute experience designed to address the data intense needs of HPC and AI customers. The key elements of the HPC experience include enhanced firmware security and increased agility with software defined HPC capabilities. For more information, please write to sales.value@redingtonmea.com
  • 4. about alerts and affected endpoints while providing metadata, so users can quickly distinguish between threats and false alarms and save hours of legwork and research, said the firm. “When an attacker gets on an endpoint, they gain a foothold in your network – so what begins as an inadvertent click on a well- crafted phishing email can escalate as attackers move laterally within your network and gain access to your sensitive information,” said Fidelis Cybersecurity CTO Kurt Bertone. “Security teams are buried in alerts, so we designed our technology to provide the visibility, context and automation that security professionals need to detect, investigate and resolve the modern threats that enterprises face today.” Fidelis Cybersecurity has announced the availability of Fidelis Endpoint Cloud, which is expected to provide security personnel with the visibility, context and automation required to investigate and resolve threats lurking on endpoints and to protect their organisations from cyberattacks. According to the company, this solution includes all the features and benefits of the on-premise Security solutions provider CyberArk Software has acquired privately-held Conjur, a Newton, Massachusetts based provider of DevOps security software for $42 million in cash. Conjur’s technology for securing DevOps extends CyberArk’s reach deeper into the DevOps lifecycle to protect Conjur’s innovative DevOps security solution is gaining momentum with developers, security and operations teams in modern enterprise IT organisations around the world.” CyberArk acquires Conjur for $42 million Conjur’stechnologyforsecuringDevOpsextendsCyberArk’sreachdeeperintotheDevOpslifecycle. Fidelis Cybersecurity releases endpoint cloud solution The solution includes all the benefits of the on-premise version of Fidelis Endpoint with the added convenience, scalability and economy of a cloud-based deployment model. 44 secrets and manage machine identities. “While empowering organisations with more efficiency and speed, the DevOps process is also dramatically expanding the attack surface across the entire enterprise,” said Udi Mokady, Chairman and CEO, CyberArk. “CyberArk’s acquisition of Conjur further strengthens our market leadership position – providing the industry’s only enterprise- class solution for privileged account security and secrets management on premises, in the cloud and across the DevOps pipeline. Now with Conjur, CyberArk customers can truly embrace DevOps without compromising on security.” “Conjur’s innovative DevOps security solution is gaining standard for privileged account security and secrets management, helping customers move to a true DevSecOps delivery model that supports greater business agility.” The CyberArk-Conjur Solution for DevOps is available now from CyberArk. With the Fidelis Endpoint Cloud offering, all of the management, metadata and analytics components of the Fidelis Endpoint solution are deployed in a Fidelis-provided cloud infrastructure – making it possible for organisations to focus on security without the distractions of provisioning, patching and maintaining their ‘back end’ security infrastructure. Fidelis Endpoint Cloud can be deployed as a standalone solution or in conjunction with the Fidelis Network product. When used together, network and endpoint event data is automatically correlated to confirm and validate alerts and suspicious activity. Fidelis Endpoint Cloud is generally available and includes all the benefits of the latest version of the solution. version of Fidelis Endpoint with the added convenience, scalability and economy of a cloud-based deployment model with capacity- based subscription pricing. With Fidelis Endpoint, users can quickly identify other compromised machines, determine the root cause of issues, and take rapid response and remediation actions. The solution eases the steps needed to retrieve information Elizabeth Lawler, Conjur momentum with developers, security and operations teams in modern enterprise IT organisations around the world,” said Elizabeth Lawler, CEO and Co-Founder, Conjur. “We are excited to become part of CyberArk to set a new industry For more information, please write to sales.value@redingtonmea.com
  • 5. The biometric authentication solution helps organisations secure their networks against unauthorised access, while also reducing the risk of attack from hackers and identity thieves. Fujitsu has launched PalmSecure ID Login, a new biometric authentication solution that helps organisations secure their networks against unauthorised access, while also reducing the risk of attack from hackers and identity thieves. According to the company, PalmSecure ID Login integrates Fujitsu rolls out new biometric authentication solution Fujitsu’s highly secure biometric palm vein authentication technology into corporate network environments using Microsoft Active Directory – helping boost IT security while also making it easier for users to log on to their system without needing to remember complex passwords, which need to be changed on a regular basis. To log on to their PC, or authenticate for internal system access, PalmSecure ID Login users simply hover their hand over a contactless palm vein scanner – already built in to several Fujitsu Lifebook notebooks and Stylistic 2-in-1 tablets, and available as a stand- 55 alone USB pluggable device. Enrolled users can log in from any device within a corporate network, since PalmSecure ID Login is connected to Microsoft Active Directory, which centrally manages and stores all access data, including biometrics. The Fujitsu PalmSecure technology works by capturing an infrared scan of oxygen- depleted blood veins within the palm of a hand. The technology combines the convenience of a contactless sensor with biometric security. For users, the system is more convenient and faster than typing a password – with identity verification usually completed within one second, said the firm. Thomas Bengs, Director and Head of Biometrics, Fujitsu, EMEIA, said, “Passwords are forgotten, lost and get stolen, which makes them a serious vulnerability in any organisation’s security arrangements. Replacing password logins with palm vein biometric authentication technology reduces the risk of misuse from stolen or unsecured passwords, including the worst- case scenarios of catastrophic hacker attacks, identity fraud and large scale data theft. It’s also impossible to forget your credentials, since they’re in the palm of your hand – unlike a smart card, or a difficult to remember password.” Fujitsu PalmSecure ID Login is available to order across EMEIA from June 2017, with availability in Oceania and the Americas to follow. Fujitsu PalmSecure ID Login is sold directly from Fujitsu and through the firm’s partners with pricing varying according to geographical regions. Fortinet has announced the findings of its latest Global Threat Landscape Report. The data spans the cybersecurity kill chain focusing on three central aspects of the landscape, including application exploits, malicious software, and botnets against the backdrop of important enterprise technology and industry sector Fortinet Threat Landscape report highlights most threats are opportunistic Research demonstrates highly automated cyber defenses are critical to mitigate pervasive ‘cybercrime-as-a-service’ attacks. Phil Quade, Fortinet trends. The research reveals that while more high profile attacks have dominated the headlines, the reality is that most threats faced by most organisations are opportunistic in nature fueled by a pervasive Crime-as-a-Service infrastructure. Phil Quade, Chief Information Security Officer, Fortinet said, “As organisations increasingly adopt convenience and cost- saving IT techniques, such as cloud services, or add a variety of smart devices to their network, visibility and control of their security is at risk. Meanwhile, attackers are buying or re-using tools of their own. Cybersecurity strategies need to increasingly adopt trustworthy network segmentation and high degrees of automation to prevent and detect adversaries’ efforts to target the newly-exposed flanks of our businesses and governments.” Three important research highlights are as follows: Attack tools never forget and are always ready for service, anywhere and anytime: Modern tools and Crime-as-a- Service infrastructures enable adversaries to operate on a global scale at light speed. As a result, the Internet seems not interested in geographic distances or boundaries because most threat trends appear more global than regional. Hyperconvergence and IoT are accelerating the spread of malware: As networks and users increasingly share information and resources, attacks are spreading rapidly across distributed geographic areas and a wide variety of industries. Studying malware can help provide views into the preparation and intrusion stages of these attacks. Visibility of distributed and elastic infrastructure is diminishing: Visibility and control over today’s infrastructures are diminishing as the number of potential attack vectors across the expanded network landscape continues to grow. For more information, please write to sales.value@redingtonmea.com
  • 6. Veeam - Partner Academy - Dubai - 5 June Veeam - Enablement Session with Fujisoft - Dubai - 8 June Fortinet and Redington Value Iftar - Amman - 12 June Barracuda,MicrosoftandRedingtonValueIftar-Dubai-12June Fortinet - Enablement Session with Hilal Group - Dubai - 6 June Sonicwall - CSSP Bootcamp - Dubai - 11-14 June Huawei - Partner Pre Sales Training Program - Volume Server - Dubai - 13 June CheckPointSuhoor-Manama-12June 6 EVENTS DellEMC,VMwareandRSA-Iftar-Riyadh-13June Fortinet-PartnerIftar-Jeddah-13June For more information, please write to sales.value@redingtonmea.com
  • 7. Veeam - Enablement Session with Atom Options - Dubai - 18 June Fortinet and Redington Value Iftar - Dubai - 14 June Huawei - Partner Pre Sales Training Program - Campus Switch - Dubai - 20 June Huawei - Partner Pre Sales Training Program - Entry Level - Dubai - 20 June Malwarebytes and Redington Value Iftar - Dubai - 13 June Veeam - Enablement Session with Atom Options - Dubai - 18 June Huawei - Huawei Iftar with Partner - Jeddah -20 June Veeam - Enablement Session with Mezzan - Dubai - 22 June Huawei - Partner Pre Sales Training Program - WiFi - Dubai - 13 June HPE - Redington Value HPE Iftar - Riyadh - 20 June 7 For more information, please write to sales.value@redingtonmea.com
  • 8. Cisco - Sales Floordays and Demos - Nigeria - 8 June 8 Cisco - Sales Floor Day & Demos - Tanzania - 2 June Dell EMC - Partner Enablement Session - Kenya - 14 June Dell EMC - Partner Enablement Session - Kenya - 7 June Tripp Lite -Lunch and Learn Partner Session - Kenya - 15 June Cisco - Sales Floor Day and Demos - Kenya - 22 June Fortinet - Partner Training - Uganda - 14 June Symantec - Partner Event - Kenya - 15 June Dell EMC - Partner Event - Kenya - 23 June Tripp Lite -Lunch and Learn Partner Session - Kenya - 29 June Fortinet-PartnerTraining-Tanzania-6June EVENTS For more information, please write to sales.value@redingtonmea.com
  • 9.
  • 10. 10 Trend Micro has announced the launch of a corporate venture fund to explore emerging technology markets. With an initial investment of $100 million, this venture fund will allow Trend Micro to nurture We want our channel to feel part of a mutually beneficial partnership where both parties are invested in driving growth together.” Trend Micro launches $100M venture fund Theventurefundwillallowthefirmtoexploreemergingtechnologymarkets. a portfolio of startups that are incubating ideas and living at the epicenter of hyper growth markets, such as the Internet of Things (IoT). Eva Chen, Founder and CEO, Trend Micro, said, “Trend Micro’s vision has always been to make the world safe for exchanging digital information. The explosion of devices is transforming how the world works, thinks and acts. It is clear that the ecosystem is still evolving and there is work to do to ensure organisations and individuals can operate and live safely in this new reality.” Trend Micro’s venture will offer companies, financial backing, access to its world- class global threat intelligence, strategic alliances, as well as its Platforms today. The second mega wave was all about the cloud; we made a bet early on to securing the cloud and so far we have secured over two billion workload hours on Amazon Web Services (AWS) alone. Now, we believe the next wave has arrived with IoT; our fund will help us harness this opportunity.” With a strong financial position and 72 quarters of consecutive profitability, Trend Micro says it is well positioned to invest funds to do research and make advancements consistent with its corporate strategy. The formation of this venture arm allows additional freedom to dive into new areas without disrupting core business resources. Eva Chen, Trend Micro channel of more than 28,000 partners. In return, working with these investments will uncover insights into emerging ecosystem opportunities, disruptive business models, market gaps and skillset shortages. These learnings will influence Trend Micro’s cybersecurity solution planning across the company. “We have a 29-year history of successfully anticipating technology trends to secure all types of environments,” said Chen. “The first mega wave we caught was the growth of the PC marketplace; we committed early on to endpoint protection and remain a Leader in Gartner’s Magic Quadrant for Endpoint Protection Malwarebytes unveils inaugural channel programme Partners can look forward to attractive margins from the new EMEA channel programme. Malwarebytes, the advanced malware prevention and remediation solution provider, has introduced its inaugural channel programme for partners across EMEA. According to the firm, the programme has been designed to be simple and focuses on driving deal registrations with a commitment from the company to help its partners “close business opportunities quickly and easily.” Where traditional channel schemes evaluate partners based on revenue, Malwarebytes looks to incentivise its reseller and distributor network based on the exposure and opportunity reach they provide for the security company. Partners can attain gold and platinum levels based on numbers of deal registrations rather than revenue, certification programs or complex points based programmes. “As a company, Malwarebytes has always been innovative and we’re carrying that ethos through to our partner programme,” said Anthony O’Mara, EMEA Vice President, Malwarebytes. “Vendors often make partners jump through far too many hoops, wanting arbitrary criteria to be met, often dictating to resellers how to run their business. We’re not doing any of that. We know our partners run successful businesses. So, we’ve designed our programme to be flexible, forward-looking and mutually beneficial. We want our channel to feel part of a mutually beneficial partnership where both parties are invested in driving growth together.” By providing support and positive incentives, the company said that it is offering the reseller community the tools they need to take advantage of the opportunities in the security space. For more information, please write to sales.value@redingtonmea.com
  • 11. The new capabilities enable businesses to deliver digital life experience users expect. Veeam and Microsoft extend alliance to deliver availability for the always-on cloud Veeam Software has announced new capabilities enabling any business to deliver the digital life experience users expect by protecting applications and data running in hybrid cloud leveraging backup and disaster recovery based on Microsoft Azure and Veeam ‘Always-On Cloud’ Availability Platform. The new capabilities include the following: Veeam Disaster Recovery in Microsoft Azure simplifies and automates a disaster recovery in Azure, helping businesses maintain business continuity and availability of critical workloads with all-encompassing on-demand Peter McKay, Veeam 11 DR in Azure. Veeam DR in Azure combines Veeam Direct Restore and new Veeam PN (Veeam Powered Network). Veeam PN for Microsoft Azure is designed to simplify and automate the setup of a DR site in Azure using lightweight software-defined networking (SDN). It helps maintain business continuity and availability by eliminating the complexity of VPN deployments and is designed for businesses of all sizes and service providers. The company announced a new Scale Out Backup Repository (SOBR) support for cloud object storage as an Archive Tier extent. This new functionality, arriving with Veeam Availability Suite v10, enables customers to archive Veeam backups to Azure Blob storage. This native support helps customers to leverage Azure to reduce long-term data archival, retention and compliance costs. Veeam Agent for Microsoft Windows, previously announced and was made generally available at VeeamON 2017 in May. This solution extends Veeam ‘Always- On Cloud’ Availability Platform to public cloud and physical servers. This new solution offers features and capabilities designed to ensure Availability for Windows-based physical servers, workstations and endpoints, as well as Windows workloads running in Azure. Microsoft announced that it will enable all Azure customers to access and use disks in Azure up to 4TB in size (previously 1TB). This enhancement means Veeam customers can fully realize a more cost-effective solution using a Veeam virtual appliance to back up four times as much data in Azure Storage. The firm also announced an update to its SaaS Availability solution, Veeam Backup for Office 365. In this update, a multi-tenant architecture enables protecting larger Office 365 deployments with a single installation, while empowering Veeam Cloud and Service Providers (VCSPs) to deliver Office 365 backup services. Peter McKay, Co-CEO and President, Veeam, said, “Veeam and Microsoft have its customers covered with new solutions for backup and disaster recovery using Azure. With Veeam, enterprises can confidently move to Azure and Hybrid Cloud, and be confident that their data and applications will always be available, no matter what happens.” Intoday’senvironmentofexplodingdatagrowth, customersneedsupportforexistingandmodern workloadsastheyupdatetheirinfrastructurewith software-definedtechnologiestobemorenimble andcost-efficient.” Newest version of storage platform broadens protocol support to extend flexibility of object storage deployments for traditional and modern workloads. Red Hat has announced Red Hat Ceph Storage 2.3. This release, based on Ceph 10.2 (Jewel), introduces a new Network File System (NFS) interface, offers new compatibility with the Hadoop S3A filesystem client, and adds support Red Hat Ceph storage release expands versatility as object store for deployment in containerised environments. According to the company, these improvements expand the product’s versatility as an object storage platform, offering the ability to support big data analytics and serve as a common platform for file-based workloads Red Hat Ceph Storage is an open, software-defined, unified storage platform. It decouples software from hardware to run cost-effectively on industry- standard servers and disks, scales flexibly and massively to support multiple petabyte deployments, and provides web-scale object storage for modern use cases. Ranga Rangachari, Vice Ranga Rangachari, Red Hat President and General Manager, Storage, Red Hat, said, “In today’s environment of exploding data growth, customers need support for existing and modern workloads as they update their infrastructure with software- defined technologies to be more nimble and cost-efficient. Red Hat aims to assist customers with IT modernisation, and object storage advancements in Red Hat Ceph Storage 2.3 coupled with Red Hat Consulting and Global Support can be instrumental to their transition and ultimate success.” Red Hat Ceph Storage 2.3 and its containerised image will be generally available via the Red Hat Customer Portal and on the Red Hat Container Registry, respectively. For more information, please write to sales.value@redingtonmea.com