Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the March Edition:
•Oracle Expands Hybrid Cloud Portfolio with Roving Edge Infrastructure
•Huawei Unveils New Solutions to Stimulate Growth in the Digital Economy
•Fortinet Delivers Major Updates to FortiOS Operating System
•Cisco Completes Acquisition of IMImobile
•Palo Alto Networks Launches NextWave 3.0
•Cambium Networks Unveils Gigabit Outdoor Point to Point Solution
•Check Point Software Launches Unified Security Solution Harmony
•Citrix Tackles Employee Well-Being
•CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads
•Kaspersky: DDoS Attacks in Q4 2020 Dropped by a Third Compared to Q3
•Nutanix Extends Ransomware Protections to Help Secure Customers’ IT Environments
•New Veeam Backup & Replication v11 Now Available
•VMware Refreshes vRealize Cloud Management
•Veritas Introduces NetBackup 9
•Ivanti Wavelink Expands Velocity Platform
•CyberArk Delivers New Identity Security Offerings to Drive Customer Success
1. the 5G New Calling solution. This
solution harnesses IMS data channel
architecture and provides an enhanced
voice experience with HD, visual, and
interactive services. By using this solu-
tion, operators can refine the 5G ser-
vice experience, satisfy industry cus-
tomer requirements, gain advantages,
and achieve business success.
Issue 53 // March 2021
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa
At MWC Shanghai 2021, the firm also launched the OptiX SuperSite solution for global operators.
Huawei Unveils New Solutions to
Stimulate Growth in the Digital Economy
the fourth industrial revolution. The
cloud network provides continuous
computing power for numerous in-
dustries, stimulating new growth in
the digital economy.
During the event, Huawei also launched
the OptiX SuperSite solution for glob-
al operators. Richard Jin, President
of Huawei’s Transmission & Access
Product Line, said, “OptiX SuperSite
is how industry and home users get
connected at a high-speed level. It also
presents an opportunity for operators to
benefit from the enterprise market and
enhance home broadband experience.”
Separately, Xinyan Coal Mine, Shanxi
Mobile, and Huawei jointly released a
5GtoB kite-like solution for public net-
work integrated non-public networks
(PNI-NPN). The solution provides
high-performance, high reliability 5G
networksthatfunctionthroughacombi-
nation of private and public networks. It
also aims to accelerate the development
of the 5G industry and increase the value
of 5G for businesses, ultimately creating
momentum in the digital economy.
Additionally, during the summit, Chi-
na Mobile and Huawei jointly unveiled
>> Continued on page 4
New solution enables secure, scalable cloud services wherever customers need
them, even in the most remote areas of the world.
Oracle Expands Hybrid Cloud Portfolio
with Roving Edge Infrastructure
Kevin Hu, Huawei
O
racle has expanded its hy-
brid cloud portfolio with
Oracle Roving Edge Infra-
structure,anewofferingthat
brings core infrastructure services to the
edge with Roving Edge Devices (REDs)
– ruggedized, portable, scalable server
nodes. Using Oracle Roving Edge Infra-
structure, organizations can run cloud
workloadswherevertheyneedthem,even
in the world’s most remote locations.
The new service is part of Oracle’s
comprehensive hybrid cloud portfolio,
At MWC Shanghai 2021, Kevin Hu,
President of Huawei Data Communi-
cation Product Line, announced the
‘five ones’ new capabilities of the In-
telligent cloud network solution —one
hop to cloud, one-network wide con-
nection, one-click fast scheduling, one
fiber for multiple purposes, and one-
stop integrated security. This solution
helps carriers build cloud-oriented
service networks and core capabilities
for DICT transformation.
According to Kevin Hu, the cloud net-
work is the key enabler in the digital
economy, bringing new impetus for
cloud image
which provides customers with more
flexibility and control over their cloud
deployments than other vendors.
“Customers want choice when it comes
to running workloads in the cloud. Each
customer has different requirements
basedondatasovereignty,scale,orwant-
ing the full experience of a public cloud
on-premises with all of Oracle’s cloud
services. Oracle Roving Edge Infrastruc-
ture is the latest example, delivering core
infrastructure services to remote loca-
tions,” said Clay Magouyrk, Executive
Vice President, Oracle Cloud Infrastruc-
ture. “Oracle’s hybrid cloud portfolio es-
sentially delivers a cloud region wherev-
er and however a customer needs it.”
Oracle Roving Edge Infrastructure
delivers core infrastructure services,
3. For more information, please write to sales.value@redingtonmea.com
3
Fortinet Delivers Major Updates
to FortiOS Operating System
Cisco Completes Acquisition of IMImobile
FortiOS 7.0 expands the Fortinet Security Fabric’s ability to deliver consistent
security across all networks, endpoints, and clouds.
The combined offering will enable businesses to deliver customer experiences across the entire life cycle by
incorporating cloud contact center, AI, omnichannel communications and programmability for customization.
Fortinet has announced version 7.0 of
FortiOS, Fortinet’s flagship operating
system. With over 300 new features,
FortiOS 7.0 enhances the Fortinet Se-
curity Fabric and Fortinet’s ability to
deliver consistent security for all net-
works, endpoints, and clouds.
John Maddison, EVP of Products
and CMO at Fortinet, said, “New in-
novations in FortiOS 7.0 continue
Fortinet’s commitment to delivering
a cybersecurity
platform that ex-
pands across the
entire digital at-
tack surface to en-
able security that
is broad, integrat-
ed, and automated
to protect devices,
data, and applica-
tions.”
The Fortinet Secu-
rity Fabric is the
industry’s highest-performing cyber-
security platform, powered by For-
tiOS to enable consistent and flexible
security across the entire attack sur-
face. With more consumption mod-
els than any other vendor – physical,
virtual, cloud, and as-a-Service, across
the largest product portfolio – span-
ning network security and SD-WAN,
switching and wireless access, network
access control, authentication, public
and private cloud security, endpoint
security, and
AI-driven ad-
vanced threat
protection solu-
tions – all built
on a common
operating sys-
tem, Fortinet
empowers orga-
nizations of any
size to secure
and simplify
their IT infra-
structure.
SMS, WhatsApp, Apple Business Chat,
Facebook Messenger and in-app com-
munications. Due to rising customer
expectations, the quality of those in-
teractive experiences is more import-
ant than ever before.
IMImobile orchestrates, automates,
monitors and delivers the customer
interactions that drive the best expe-
riences. By combining IMImobile’s
solution with Webex Contact Center,
Cisco will be able to provide a robust
Customer Experience as a Service
(CXaaS) offer. This new offering will
bring together cloud contact center,
artificial intelligence, experience man-
agement, collaboration and Commu-
nications Platform as-a-Service to
create a single solution that will give
organizations the ability to provide the
exceptional experiences that custom-
ers expect.
John Maddison, Fortinet
Businesses need to make richer con-
nections with their customers through
the channel of their choice. This
means going beyond email, voice and
chat to enable communications on
the most popular digital channels like
Cisco has announced the completion
of the acquisition of IMImobile. IMI-
mobile is a leading global provider of
cloud communications software and
services that manage business-critical
interactions at scale.
Key features of FortiOS 7.0 among
many include:
• Zero Trust Network Access for
Remote Access and Application
Control: FortiOS 7.0 enables every
FortiGate customer to employ Zero
Trust Network Access (ZTNA) capa-
bilities out of the box, making For-
tinet the only vendor to enable fire-
wall-based ZTNA. ZTNA enabled by
FortiOS 7.0 improves user experi-
ence by supporting the evolution of
better remote access to replace tradi-
tional VPN.
• Consistent Security Everywhere
with SASE: Fortinet gives enterprises
the flexibility needed to enable their
workforce to work from anywhere
with consistent, enterprise-grade se-
curity delivered on-premises – and
now, via cloud-based SASE consump-
tion (Security-as-a-Service).
• New Self-Healing SD-WAN Ca-
pabilities: Fortinet’s leading Secure
SD-WAN solution now includes
self-healing capabilities through adap-
tive WAN remediations to make the
application experience more resilient.
• Expanding the LTE Edge with
5G: Fortinet is extending network
connectivity and security beyond
the WAN Edge with innovations in
5G and LTE that improve wireless
network performance and increase
resiliency. With a diverse Wireless
WAN and LTE offering, organiza-
tions can achieve secure, scalable,
and highly available network con-
nectivity anywhere.
FortiOS 7.0 will be available at the end
of Q1 2021.
“Customer expectations are rising,
proving every interaction matters for
the brand and the end-user experi-
ence. Customers want delightful expe-
riences where they can have two-way
interactions with a business exactly
when they need to, on the channel
they prefer, without having to wait
or jump through hoops to prove who
they are, and without having to repeat
themselves. With the right technology,
world class brands can and must pro-
vide this level of easy and effortless in-
teraction. The addition of IMImobile
to Cisco will be integral to delivering
on the promise of delightful and en-
gaging customer experiences,” said
Jeetu Patel, Senior Vice President and
General Manager of Cisco’s Security
and Application business.
The IMImobile team joins Cisco’s
Contact Center business unit.
New innovations
in FortiOS 7.0
continue Fortinet’s
commitment
to delivering a
cybersecurity
platform that expands
across the entire
digital attack surface.”
4. For more information, please write to sales.value@redingtonmea.com
4
Cambium Networks Unveils Gigabit
Outdoor Point to Point Solution
Cambium Networks has announced
the new ePMP Force 400 series point
to point system with gigabit speed
fixed wireless connectivity in the
Sub-6 GHz spectrum. Service pro-
viders and enterprises can rapidly
extend connectivity and expand ca-
pacity without the cost of licensed
spectrum, expensive subscriptions or
trenching fiber.
Network operators can extend cover-
age with cost-effective backhaul for
enterprise access, fiber extensions, Wi-
Fi access or CCTV networks with the
ePMP Force 400’s flexible hardware
design, 80 MHz channel support and
improved over the air efficiencies pro-
viding up to 1 Gbps speed. The ePMP
an integrated Small Form-Factor Plug-
gable (SFP) port and optional Gigabit
Passive Optical Networks (GPON)
Optical Network Unit (ONU) module,
the ePMP Force 425 also makes a great
fiber extension to reach places where
fiber cannot be cost justified.
“Cambium Networks listens to ser-
vice providers and enterprise network
operators, and we are pushing the en-
velope to develop affordable gigabit
wireless solutions that deliver a low
total cost of ownership,” said Sakid
Ahmed, General Manager of ePMP
and cnVision business for Cambium
Networks. “The ePMP Force 400 se-
ries, leveraging a leading 802.11ax
technology platform from Qualcomm
ePMP Force 400 enables service providers and enterprises to rapidly build affordable
gigabit speed wireless bridges and campus area networks using unlicensed spectrum.
Force 425 is ideal for service providers
looking to deliver high-capacity access
services to residential and business
customers. It also serves as a low-cost
backhaul for MicroPoP’s and outdoor
Wi-Fi access points that require high
capacity at moderate range without the
overhead of licensed microwave. With
New specializations, incentives and enablement offer partners
the flexibility to differentiate and meet customers’ needs.
Palo Alto Networks
Launches NextWave 3.0
specializations include corresponding
partner training and certifications.
Enhance partner profitabili-
ty with three new specialization
incentives for Prisma SASE, Prisma
Cloud and Cortex XDR/XSOAR deals,
along with other new incentives, deal
boost and new rebates for its Next-
Wave Diamond Innovator partners.
Expand partner opportunities by
boosting existing deal referral incen-
tives on all Palo Alto Networks prod-
ucts, extending partner-delivered sup-
Palo Alto Networks has unveiled
NextWave 3.0, a significant set of en-
hancements, incentives and training
to its NextWave Partner Program.
Designed to help partners leverage
all of Palo Alto Networks technolo-
gies, NextWave 3.0 will help partners
differentiate their services, build new
security expertise and grow profitable
businesses as they meet customers’
needs in a dynamic security market.
As digital transformation fuels the
demand for specialized security ex-
pertise and creates a new economy of
services, Palo Alto Networks is com-
mitted to delivering the products,
programs and resources to enable its
NextWave partners. Developed in
consultation with the company’s part-
ners, NextWave 3.0 will:
Enable differentiation with new spe-
cializations. Partners can build their
security expertise through three new
Prisma SASE (Prisma Access and
Prisma SD-WAN, formerly CloudGe-
nix), Prisma Cloud and Cortex XDR/
XSOAR specializations. These new
portacrossmoreofPaloAltoNetworks›
technologies and offering new educa-
tion credits. Further, NextWave part-
ners can now resell Prisma Cloud via a
two-tier go-to-market strategy.
Empower partner success. NextWave
3.0 includes a host of new enablement
resources and ways for partners to earn
or maintain NextWave status, expand-
ing Certified Professional Services cer-
tification to include the new special-
izations, Technology Education credits
and technology adoption discounts.
“The future of our business and that
of our partners are fundamentally
linked,” said Karl Soderlund, Senior
Vice President of Worldwide Chan-
nels. “The NextWave partner of tomor-
row will enable digital transformation
for our customers by embracing new
technology, offering product-specific
expertise, and leading with services.
NextWave 3.0 helps our partners do
just that. It is the most sweeping set of
enhancements we have done to help
our partners become security experts
across our entire technology portfolio.”
Palo Alto Networks NextWave partner
program includes approximately 6,500
partners who help 80,000 customers
around the world succeed with the
company’s technologies. In FY’20, 900
NextWave partners doubled their busi-
ness through Palo Alto Networks.
>> From page 1
platform software, enterprise grade
security, and applications to the edge
and disconnected locations with
Roving Edge Devices, ruggedized,
portable, scalable server nodes. It
enables customers to operate cloud
applications and workloads in the
field, including machine learning
inference, real-time data integration
and replication, augmented analytics,
and query-intensive data warehouses.
In addition, it delivers cloud comput-
ing and storage services at the edge of
networks for government and enter-
prise organizations, enabling low-la-
tency processing closer to the point of
data generation and ingestion, which
provides timely insights into data.
Oracle Roving Edge Infrastructure is
a fully mobile, connection-indepen-
dent extension of customers’ Oracle
Cloud Infrastructure (OCI) tenancy
with a similar interface and work-
flow to provide a consistent, unified
experience. An Oracle RED device
is equipped with high-performance
hardware including 40 OCPUs, an
NVIDIA T4 Tensor Core GPU, 512
GB RAM, and 61 TB of storage, and
can be clustered into groups of 5 to
15 nodes in a single cluster, starting at
$160 per node per day.
Oracle...
Technologies, builds on top of the
field proven ePMP fixed wireless ar-
chitecture, and expands fixed wire-
less broadband capability without the
overhead of licensed spectrum.”
The ePMP Force 400 is a global prod-
uct supporting specific channels
dependent on local country regula-
tions. The system includes an SFP
port making it easy to extend the
fiber network. With an innovative
optional range extender attachment,
the ePMP Force 425 can offer an addi-
tional 6 dBi of gain without installing
a completely new dish. The new radios
support LINKPlanner planning soft-
ware, cnHeat heatmapping modeling
tool, and the cnMaestro management
system. The radios are IP67 rated for
rugged outdoor environments.
The ePMP Force 400 is available in
two variations: Force 425 – equipped
with a 25 dBi integrated dish antenna
and Force 400C – connectorized with
two RP-SMA RF interfaces for dish or
horn antennas.
The NextWave
partner of tomorrow
will enable digital
transformation for our
customers by embracing
new technology, offering
product-specific
expertise, and leading
with services.”
5. For more information, please write to sales.value@redingtonmea.com
5
Check Point Software Launches
Unified Security Solution Harmony
Citrix Tackles Employee Well-Being
Check Point Software Technologies
has launched Check Point Harmony,
the first unified solution to enable
secure connectivity to any resource
anywhere and give total endpoint
protection for users on any device.
Harmony secures both corporate and
BYOD devices, and internet connec-
tions from known and zero-day at-
tacks, while giving Zero-Trust access
to business applications in a single,
easy to manage solution.
Citrix Systems has announced the
availability of new well-being capa-
bilities within Citrix Workspace that
companies can use to help employees
better manage the pressures and com-
plexities of the workday so they can be
and do their best.
“Traditionally, companies have fo-
cused on the physical well-being
of their employees and viewed the
other aspects as a bit taboo. But the
pandemic has changed this,” said
Donna Kimmel, Executive Vice Pres-
ident and Chief People Officer, Citrix.
“Companies are now having more
holistic conversations that cover the
mental, spiritual, and emotional as-
new Harmony Browse uniquely pro-
vides secure, fast and private web
browsing by inspecting all SSL traf-
fic directly on the endpoint without
adding latency or re-routing traffic
through a secure web service.
• Secure remote access from any de-
vice, anywhere: Harmony Connect
securely connects any user or branch
to any resource, supporting client-
less Zero Trust Network Access from
any browser.
• Protects users’ email and produc-
tivity apps: Harmony Email & Office
secures users’ email clients and, gives
complete protection for Microsoft
Office 365, Exchange, Google G Suite
and more.
• Total endpoint and device securi-
ty: Harmony Endpoint protects users’
PCs from ransomware, phishing, and
malware, and minimizes breach im-
pact with autonomous detection and
response capability. Harmony Mobile
secures employees’ mobile devices
against malicious apps and network
or OS attacks.
And there is incentive for them to do
so. The World Health Organization
estimates that depression and anxiety
disorders cost the global economy $1
trillion each year in lost productivity.
With Citrix, companies can create
the space people need to be well and
succeed. Using Citrix Workspace,
they can deliver a secure, reliable and
consistent experience that removes
the noise and distractions from work,
enabling employees to focus, innovate
and create value.
And, leveraging new microapp capa-
bilities within the solution, they can
seamlessly integrate well-being func-
Harmony is the industry’s first unified solution for remote work, providing the highest
level of security protection and eliminating management complexity.
Company extends capabilities within Citrix Workspace to help
organizations create the space people need to be well and succeed.
Check Point Harmony - unified security solution for users, devices and access
Check Point Harmony addresses re-
mote work challenges by unifying
endpoint, browser, email and remote
access security components to protect
all user devices and the enterprise
networks they connect against known
and unknown threats. Harmony in-
tegrates key security capabilities in a
single solution to deliver:
• Complete web security: As a
core component of Harmony, the
pects of well-being because they real-
ize that they must create a workspace
that empowers their people to be well
on all fronts.”
“The move to mass remote work-
ing created security gaps in organ-
isations’ security infrastructures
that cannot easily be addressed
with multiple different point prod-
ucts from several different security
vendors,” said Rafi Kretchmer, VP
Product Marketing at Check Point
Software. “Harmony closes these
gaps with unified, multi-layered
security and prevention technol-
ogies, blocking against all exploit
techniques across all attack vectors.
This protects the enterprise´s net-
work end to end, ensuring uncom-
promised security for the new ‘work
from anywhere’ enterprise environ-
ment, with easy deployment and
single-console management.”
Check Point Harmony is easy to de-
ploy with a simple per-user pricing
model and is managed via a cloud
service, enabling user-centric securi-
ty policies to be applied across orga-
nizations’ environments.
Harmony closes
these gaps with
unified, multi-layered
security and prevention
technologies, blocking
against all exploit
techniques across all
attack vectors.”
Citrix Workspace
can deliver a secure,
reliable and consistent
experience that
removes the noise and
distractions from work,
enabling employees
to focus, innovate and
create value.
tionality into the workspace and make
it part of how they work. The easy-to-
use, low-code tools enable companies
to automatically surface relevant con-
tent and resources to support employ-
ees and deliver it to any device. And
they can be used to drive vital tasks
associated with well-being and make
it part of the workday such as con-
ducting quick pulse surveys to track
and improve employee happiness and
well-being or sharing positive news to
increase employee morale.
Customers will also be able to add new
functionality through a growing eco-
system of Citrix partners or build new
microapps themselves to adapt the
well-being capabilities to meet chang-
ing needs.
The Citrix well-being capabilities
are available for use with immedi-
ate effect.
6. For more information, please write to sales.value@redingtonmea.com
6
CrowdStrike Delivers Advanced Threat
Protection for Cloud and Container Workloads
lations with intelligent monitoring
that detects misconfigurations, vul-
nerabilities and threats, and deliv-
ers guided remediation that equips
developers with guardrails to avoid
costly mistakes.
“We continue to deliver the broad-
est range of cloud security capabili-
ties in a single cloud-native platform
for on-prem, private, public, hybrid
and multi-cloud
environments
that scales,” said
Amol Kulkar-
ni, Chief Prod-
uct Officer for
CrowdSt r i ke.
“CrowdStrike’s
Security Cloud
is one of the
largest deploy-
ments in the
world, providing
CrowdStrike has announced expand-
ed Cloud Security Posture Manage-
ment (CSPM) and Cloud Workload
Protection (CWP) capabilities for the
CrowdStrike Falcon platform to deliver
greater control, visibility and security
for cloud workloads and cloud-native
applications from build to runtime.
The expanded CSPM and CWP ca-
pabilities for the CrowdStrike Fal-
con platform identify and remediate
vulnerabilities from development to
production for a wide variety of cloud
environments, including containers.
With the incorporation of frictionless
security and automated protection
early in the continuous integration/
continuous delivery (CI/CD) pipe-
line, DevSec-
Ops teams are
empowered to
deliver produc-
tion-ready ap-
plications with
minimal impact
to build cycles.
A d d i t i o n a l l y,
the new features
will help organi-
zations prevent
compliance vio-
New capabilities bring increased protection for cloud applications, reducing
the attack surface and identifying vulnerabilities before deployment.
a spike in cryptocurrency prices, it may
be more profitable for them to infect
some devices with miners. As a result,
we see that the total number of DDoS
attacks in Q4 remained quite stable.
And we can predict that this trend will
continue in 2021,” said Alexey Kiselev,
Business Development Manager on the
Kaspersky DDoS Protection team.
To stay protected against DDoS at-
tacks, Kaspersky experts offer the fol-
lowing recommendations:
• Maintain web resource operations by
assigning specialists who understand
how to respond to DDoS attacks
• Validate third-party agreements and
contact information, including those
made with internet service providers.
This helps teams quickly access agree-
ments in case of an attack
Kaspersky: DDoS Attacks in Q4 2020
Dropped by a Third Compared to Q3
• Implement professional solu-
tions to safeguard your organi-
zation against DDoS attacks. For
example, Kaspersky DDoS Protec-
tion combines Kaspersky’s extensive
expertise in combating cyberthreats
and the company’s unique in-house
developments
The number of DDoS attacks detected by Kaspersky DDoS Prevention in Q4 2020 is 31% less compared to Q3
2020. This drop can be connected to the growing interest in cryptocurrency mining, said Kaspersky.
us a unique vantage point in support-
ing organizations’ shift to cloud-na-
tive architectures and their adoption
of development and IT operations
(DevOps). The new capabilities se-
cure development and deployment of
applications in the cloud with greater
speed, efficiency and confidence.”
The new Falcon Horizon CSPM capa-
bilities include cloud-native security
posture management for multi-cloud
environments, monitoring cloud iden-
tities for least privileges and ensuring
continuous compliance.
The new Falcon Cloud Workload
protection capabilities include broad
support for container runtime secu-
rity, identifing security threats prior
to running containers in production,
stopping threats when containers are
most vulnerable, during runtime and
uncovering hidden threats.
As people began to spend more time
online in 2020, it resulted in a boom of
DDoS attacks. And in the fourth quar-
ter, attacks on educational institutions
continued globally. Online gaming
services also suffered DDoS attacks.
However, in Q4 2020 there were only
10% more attacks than in Q4 2019.
And compared to Q3 2020, the num-
ber of attacks in Q4 2020 fell by 31%,
while Q3 2020 also saw a drop com-
pared to Q2.
Experts suggest that this can be caused
by a surge in cryptocurrency costs. As a
result, cybercriminals may have had to
‘re-profile’ some botnets so that C&C
servers, that are typically used in DDoS
attacks, could repurpose infected de-
vices and use their computing power
to mine cryptocurrencies instead.
This is further proved by KSN statistics.
Throughout 2019, as well as in the be-
ginning of 2020, the number of cryp-
tominers was dropping. However, from
August 2020 the trend changed, with the
amount of this form of malware increas-
ing slightly and reaching a plateau in Q4.
“The DDoS attack market is currently
affected by two opposite trends. On the
one hand, people still highly rely on
stable work of online resources, which
can make DDoS attacks a common
choice for malefactors. However, with
Amol Kulkarni, CrowdStrike
The new
capabilities secure
development and
deployment of
applications in the
cloud with greater
speed, efficiency and
confidence.”
Maintain
web resource
operations
by assigning
specialists who
understand how to
respond to DDoS
attacks.
7. For more information, please write to sales.value@redingtonmea.com
7
Nutanix has announced additional
ransomware protections in the compa-
ny’s cloud platform. These include new
threat monitoring and detection, as well
asmoregranulardatareplicationandro-
bust access controls all natively built into
theNutanixstack.Thesenewcapabilities
build on Nutanix’s rich data services for
network security, files and objects stor-
age, virtualization, and business conti-
Nutanix Extends Ransomware Protections to
Help Secure Customers’ IT Environments
leverage the following features as part of
a complete data protection solution:
•Eliminatedowntimeandminimizedata
loss for Tier-1 VMware workloads with
built-in CDP and achieve immediate re-
coveries to a latest state or desired point
in time providing the best recovery point
objectives (RPOs).
• Keep backups safe with immutable,
hardened Linux repositories compliant
with SEC 17a-4(f), FINRA 4511(c) and
CFTC 1.31(c)-(d) regulations, preventing
encryption by ransomware, accidental
or malicious deletions; based on gener-
al-purposeservers,withoutanyhardware
lock-in.
• Reduce the costs of long-term data ar-
chival and retention by up to 20 times
and replace manual tape management
New Veeam Backup &
Replication v11 Now Available
ments that are prime targets for initial
ransomware infection and spread.
Closer to the application layer, the Nu-
tanix cloud platform now also includes
native ransomware detection for file
storage services within Nutanix Files.
File analytics, which is a feature includ-
ed with Files, now detects abnormal and
suspicious access patterns and identifies
known ransomware signatures to block
data access in real-time.
To further protect application data from
ransomware attacks, the Nutanix cloud
platform now includes new features
within the object storage solution, Nu-
tanix Objects. Objects includes more
granular permissions to access object
data for primary and secondary storage.
Specifically, Nutanix Objects now offers
the ability to configure Write Once Read
Many (WORM) policies for individual
files and objects selected by an IT team
to help guard against unauthorized de-
letion or encryption of data, thwarting
nuity to help enterprises prevent, detect
and recover against ransomware attacks
across multiple cloud environments. At
a time when attacks are becoming even
more common due to the rise of remote
work, these capabilities make it easier to
implement security and business conti-
nuity best practices at the infrastructure
level, rather than rely on a complex ma-
trix of bolt-on security products.
The Nutanix cloud platform now deliv-
ersanomalydetectionbasedonmachine
learning and IP reputation services with
the company’s security networking op-
erations and monitoring solution, Flow
Security Central, a feature with Nutanix
Flow. Flow Security Central helps iden-
tify known attack vectors, including po-
tential ransomware, at the network level
before reaching the application and data
layers.. Flow Security Central also moni-
tors endpoints to identify traffic coming
from disreputable locations, something
especially helpful for defending Virtual
Desktop Infrastructure (VDI) deploy-
Hybrid and multicloud leader strengthens networking, storage and virtualization services.
New 4-in-1 solution
combines backup, replication, storage
snapshots and now, Continuous Data Protection (CDP).
Rajiv Mirani, Nutanix
Danny Allan, Veeam
life cycle, while handling all the com-
plexities of a multi-cloud environment
for AWS, Microsoft Azure and Google
Cloud Platform.
“Veeam released V10 with more than
150 new enhancements just 12 months
ago, and now has more than 700,000
downloads. Being able to launch the
next version — Veeam Backup & Rep-
lication v11 — with an additional 200
new and powerful backup, cloud, DR,
security and automation enhancements
speaks volumes to Veeam’s speed of in-
novation, as well as our strong commit-
ment to the needs and data reliability
demands of our customers and part-
ners,” said Danny Allan, Chief Technol-
ogy Officer and Senior Vice President of
Product Strategy at Veeam.
New Veeam V11 enables businesses to
Veeam Software has announced gen-
eral availability of new Veeam Backup
& Replication v11, enabling the most
advanced data protection solution for
cloud, virtual, physical and enterprise
workloads. With more than 200 new
features and enhancements, the sin-
gle solution for comprehensive data
management is powerful and flexible
enough to protect each phase of the data
with new native support for Amazon
S3 Glacier (including Glacier Deep Ar-
chive) and Microsoft Azure Archive
Storage through end-to-end backup life
cycle management with Veeam Scale-out
Backup Repository Archive Tier.
• New support for Google Cloud Storage
for Veeam Scale-out Backup Repository
Capacity Tier, providing greater choice of
hot cloud object storage targets.
• Achieve the lowest recovery time objec-
tives(RTOs)with powerfulinstantrecov-
ery for Microsoft SQL, Oracle databases
and NAS file shares from the pioneer
of Instant VM Recovery.
• Delivers end-user data backup for any
macOS device, joining existing Veeam
Agents for Microsoft Windows, Linux,
IBM AIX and Oracle Solaris.
• Leverage the services, solutions and ex-
pertise needed to maximize the value of
V11 by teaming up with Veeam-powered
service providers for a fully managed
backup experience.
New Veeam Backup & Replication v11 is
now available for download.
many common ransomware attacks.
Lastly, the Nutanix platform now deliv-
ers support for Microsoft Windows Cre-
dential Guard for virtual machines and
virtual desktops running on the AHV
hypervisor. Credential Guard adds op-
erating system (OS) protection from
malware using credential theft attacks
on Microsoft OS environments, a com-
mon vector used by ransomware to gain
administrative privileges.
Rajiv Mirani, Chief Technology Officer
at Nutanix, said, “Enterprises need a
defense in depth approach to security,
starting with their IT infrastructure.
However, the right security tools need
to also be simple and seamless to imple-
ment. Nutanix delivers a strengthened
cloud platform out of the box, with an
even richer set of ransomware protec-
tions available now.”
All new features are currently available
to customers.
8. For more information, please write to sales.value@redingtonmea.com
8
Veritas Technologies has announced
the launch of Veritas NetBackup 9.
NetBackup 9 delivers significant new
features to provide customers with ad-
ditional choices for deployment across
edge, core and cloud, while increasing
operational simplicity.
NetBackup 9 has been designed to
answer the needs of customers op-
erating demanding multi-cloud data
centers with heterogenous environ-
ments that require a data protection
platform without compromise. With
NetBackup 9, Veritas now adds Flex
Scale, offering customers a scale-out
deployment option based on Veritas’
validated reference design. This new
architecture provides a hypercon-
verged approach to data protection
that delivers cloud-like simplicity
and scalability in an on-premises data
center. With NetBackup Flex Scale,
businesses no longer need to forecast
capacity needs and provision in antic-
ipation of future growth. Instead, they
are able to simply add more nodes as
required. By empowering enterpris-
es to extend their standardization on
Veritas to include scale-out, customers
can be freed from the management
complexity associated with disparate
point solutions for data protection.
Deepak Mohan, Executive Vice Presi-
dent, Products Organization at Veritas,
said,“VeritasNetBackup9withFlexScale
gives customers freedom of choice with
the most flexible deployment models in
the industry today by empowering them
to protect over 800 workloads in a scale-
out, scale-up, or cloud storage model.”
NetBackup 9 is already available in
more flexible deployment modes than
is offered by any player in the industry.
With the inclusion of its new scale-out
VMware Refreshes vRealize Cloud Management
Veritas Introduces NetBackup 9
hyperconverged mode, Veritas contin-
ues to expand customer choice while
reducing complexity, cost and risk.
The launch of NetBackup 9 further
reinforces Veritas’ focus on abstract-
ing the complexity of enterprise IT.
NetBackup streamlines management
of the most dynamic environments
through orchestrated automation of
discovery, protection, and recovery.
NetBackup 9 also includes new fea-
tures to simplify enterprise data pro-
tection for mission-critical OpenStack
environments. Utilizing OpenStack
native APIs, NetBackup 9 delivers
seamless integration, multi-tenant
controls, and intuitive self-service
management. In addition to offering
scalability and performance benefits,
NetBackup 9 can dramatically reduce
costs and the burden of administrative
management while ensuring high-per-
formance backup and recovery opera-
tions for OpenStack, both on-premise
and in public clouds.
NetBackup 9 is available now.
ize Log Insight Cloud, and VMware vRe-
alize Network Insight Cloud.
VMware vRealize Automation 8.3 de-
livers enhanced solutions for custom-
ers’ most critical automation use cases
including self-service multi-clouds,
network automation, and DevOps
with actionable insights, greater secu-
rity and improved performance
Powered by AI and predictive analytics,
vRealize Operations delivers continuous
performance, capacity and cost optimi-
zation, proactive planning, intelligent
remediation and integrated compliance
VMware vRealize Log Insight Cloud in-
troduces enhanced machine learning
(ML) analytics for errors and Knowl-
edge Base (KB) correlation, ERI-FIPS
compliance, VMware HCX and VM-
ware Site Recovery Manager log integra-
tion, and native data archiving support.
VMware vRealize Network Insight
6.1 and VMware vRealize Network In-
sight Cloud provide an end-to-end net-
work view by learning from multiple
data sources across virtual and physical
infrastructure. Using ML for applica-
tion discovery as well as assurance and
verification capabilities, vRealize Net-
work Insight makes it easier to plan,
build, and manage complex networks
VMware Skyline provides proactive
intelligence across customers’ VM-
ware environments to help prevent
issues and unscheduled downtime.
The latest release of Skyline Advisor
provides expanded visibility into the
vulnerabilities Skyline identifies and
improved Support Request visibility
enables easier use of the Log Assist au-
tomated log upload feature
VMware vRealize Automation 8.3,
VMware vRealize Operations 8.3, VM-
ware vRealize Log Insight 8.3, VMware
vRealize Suite Lifecycle Manager 8.3
VMware vRealize Network Insight 6.1
and Skyline Advisor are available. The
new capabilities and enhancements to
VMware vRealize Operations Cloud,
VMware vRealize Log Insight Cloud
and VMware vRealize Network Insight
Cloud are also available.
Purnima Padmanabhan, Senior Vice
President and General Manager, Cloud
Management Business Unit, VMware.
“As more businesses pursue cloud as an
agility strategy, vRealize Cloud Man-
agement helps customers run their ap-
plications anywhere while maintaining
consistent operations and common
governance across all environments.”
VMware vRealize Cloud Management
enables customers to consistently deploy
and operate their applications, infra-
structure, and platform services, from
the data center to the cloud to the edge.
It helps them accelerate innovation with
quick and easy access to services, gain ef-
ficiency by improving visibility and auto-
mation, and improve control while mit-
igating risk through unified operations
and governance. Vmware has also intro-
duced new releases including VMware
vRealize Automation 8.3, VMware vRe-
alize Operations 8.3, VMware vRealize
Log Insight 8.3, vRealize Suite Lifecycle
Manager 8.3 VMware vRealize Network
Insight 6.1 and VMware Skyline; along
withenhancementsacrossVMwarevRe-
alize Operations Cloud, VMware vReal-
VMware vRealize Cloud Management enables customers to consistently deploy and operate their
applications, infrastructure, and platform services, from the data center to the cloud to the edge.
NetBackup 9 has been designed to answer the needs of customers operating
demanding multi-cloud data centers with heterogenous environments that
require a data protection platform without compromise.
Vmware has announced innovations
across its VMware vRealize Cloud
Managementportfolio of on-premises
and Software as a Service (SaaS) solu-
tions. The new and enhanced capabil-
ities combine to enable customers to
more securely deploy and operate their
hybrid and multi-cloud environments.
“In today’s uncertain world, enterpris-
es are seeking to increase agility and
efficiencies to remain competitive and
to drive faster business growth,” said
Deepak Mohan, Veritas
Purnima Padmanabhan, VMware
9. For more information, please write to sales.value@redingtonmea.com
9
14 million devices today, which are
used to modernize supply chain and
warehousing operations. As part of this,
Ivanti Wavelink has validated over 50
enterprise rugged mobile devices with
10 device manufacturers, including Ze-
bra, Honeywell, Apple, Samsung, Point
Mobile, CypherLab, and JLT Mobile.
Ivanti Wavelink, the supply chain busi-
ness unit of Ivanti, has announced the
launch of Ivanti Wavelink Velocity
Solutions Directory. The new directo-
ry enables device manufacturers offer-
ing solutions for the supply chain and
warehousing industries to now rapidly
validate their solutions for the Ivanti
Wavelink Velocity platform. It also pro-
Ivanti Wavelink Expands Velocity Platform
General Manager, Ivanti Wavelink.
“This is a competitive advantage we
extend to device manufacturers that
accelerates engagement and improves
their time-to-revenue by eliminating
what is typically a lengthy validation
process. Now, partners and customers
are able to immediately leverage their
Ivanti Wavelink Velocity validated de-
vices within their environments.”
Through the Ivanti Wavelink Solutions
Directory, hardware and device man-
ufacturers can rapidly validate their
rugged industrial and consumer-grade
devices running Android, iOS or Win-
dows-based operating systems.
For solution provider partners and
customers, the Ivanti Wavelink Veloc-
ity Solutions Directory provides a sin-
gle portal for accessing fully validated
Ivanti Wavelink devices. Ivanti Wave-
link Velocity is deployed on more than
vides a centralized portal where Ivanti
Wavelink solution partners and cus-
tomers can gain access to information
on validated devices.
“Ivanti Wavelink is proud to be the first
to offer this type of solutions directory
to our partners and customers,” said
Brandon Black, Vice President and
New Solutions Directory and Rapid Validation Capabilities enable device manufacturers
serving the supply chain and warehousing industries to self-validate solutions.
CyberArk Delivers New Identity Security
Offerings to Drive Customer Success
Company introduces new subscriptions, programs and tools to complement the
industry’s most comprehensive identity cecurity capabilities.
• CyberArk Identity Security As-
sessment Tool – The Assessment
Tool is fully aligned to the CyberArk
Blueprint so organizations can assess
and track their level of alignment
with Identity Security best practices
and compare their program maturity
with peers across multiple parameters
such as industry, region and organi-
zation size.
Identity Security Customer Success
Plans – Success Plans are strategically
packaged resources, guidance and ex-
pertise to help customers successfully
execute an Identity Security program
while getting the most value from
their solutions as quickly as possible.
Udi Mokady, Chairman and CEO,
CyberArk, said, “CyberArk’s privi-
lege-led approach to Identity Security
is designed to help enterprises adapt
and embrace a risk-based strategy
for defending against identity-based
attacks as they support a distributed
workforce, embrace the cloud and
new cloud technologies, and deliver
positive customer experiences.”
With CyberArk Identity Security, or-
ganizations can secure access across
any device, anywhere, at just the right
time through:
• CyberArk Privileged Access solu-
tions secure privileged credentials
wherever they exist – defending
against advanced attacks, speeding
digital transformation and helping
achieve compliance.
• CyberArk Workforce Identity and
Customer Identity solutions contin-
uously monitor behavioral signals
to make sure users are who they say
they are.
• CyberArk Secrets Management
solutions enable applications and
automation tools to securely access
sensitive resources at scale – without
burdening developers.
individual identities – human or ma-
chine – throughout the cycle of access-
ing critical assets.
The new announcements include:
• Identity Security Subscription
Offerings – Available in three new
subscription offerings, customers can
benefit from the combined power of
Identity as a Service (IDaaS) and the
industry’s leading Privileged Access
Management solution in offerings that
make the most sense for their specific
users: Workforce User, External Ven-
dor or Privileged User.
• CyberArk Blueprint for Identity
Security Success – The CyberArk
Blueprint has evolved to expand
prescriptive guidance across all
identities and is centered on core
Identity Security best practices
gained through years of hands-on
customer engagements.
CyberArk has announced the avail-
ability of new subscriptions, programs
and tools designed to accelerate or-
ganisations’ Identity Security initia-
tives and time to business impact.
These new offerings complement Cy-
berArk’s Identity Security portfolio,
which is centered on Privileged Access
Management and focuses on securing
Through the
Ivanti Wavelink
Solutions Directory,
hardware and device
manufacturers can
rapidly validate their
rugged industrial
and consumer-grade
devices running
Android, iOS or
Windows-based
operating systems.
10. For more information, please write to sales.value@redingtonmea.com
10
For more information, please write to sales.value@redingtonmea.com
09 / 2020 | 11
@redingtonvalue
11. For more information, please write to sales.value@redingtonmea.com
11
For more information, please write to sales.value@redingtonmea.com
09 / 2020 | 11
@redingtonvalue
12. Empowering remote work with
Microsoft Teams
With more people working from home, fostering virtual connection is crucial.
Empower your team to stay connected and keep business running
smoothly using Microsoft Teams.
EMBRACE ONLINE
SHARE CONTENT
STAY FOCUSED
STAY CONNECTED
Include an
online link
Share your
screen
Be mindful
and inclusive
Collaborate on
ideas
Turn on
video
Make up for
missed
hallway talk
Blur your
background
Bring the
team
together
Record the
meeting
Have fun!
www.redingtonvalue.com sales.value@redingtonmea.com H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE