SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
the 5G New Calling solution. This
solution harnesses IMS data channel
architecture and provides an enhanced
voice experience with HD, visual, and
interactive services. By using this solu-
tion, operators can refine the 5G ser-
vice experience, satisfy industry cus-
tomer requirements, gain advantages,
and achieve business success.
Issue 53 // March 2021
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa
At MWC Shanghai 2021, the firm also launched the OptiX SuperSite solution for global operators.
Huawei Unveils New Solutions to
Stimulate Growth in the Digital Economy 
the fourth industrial revolution. The
cloud network provides continuous
computing power for numerous in-
dustries, stimulating new growth in
the digital economy. 
 
During the event, Huawei also launched
the OptiX SuperSite solution for glob-
al operators. Richard Jin, President
of  Huawei’s Transmission & Access
Product Line, said, “OptiX SuperSite
is how industry and home users get
connected at a high-speed level. It also
presents an opportunity for operators to
benefit from the enterprise market and
enhance home broadband experience.”
 
Separately, Xinyan Coal Mine, Shanxi
Mobile, and  Huawei  jointly released a
5GtoB kite-like solution for public net-
work integrated non-public networks
(PNI-NPN). The solution provides
high-performance, high reliability 5G
networksthatfunctionthroughacombi-
nation of private and public networks. It
also aims to accelerate the development
of the 5G industry and increase the value
of 5G for businesses, ultimately creating
momentum in the digital economy.
 
Additionally, during the summit, Chi-
na Mobile and Huawei jointly unveiled
>> Continued on page 4
New solution enables secure, scalable cloud services wherever customers need
them, even in the most remote areas of the world.
Oracle Expands Hybrid Cloud Portfolio
with Roving Edge Infrastructure
Kevin Hu, Huawei 
O
racle has expanded its hy-
brid cloud portfolio with
Oracle Roving Edge Infra-
structure,anewofferingthat
brings core infrastructure services to the
edge with Roving Edge Devices (REDs)
– ruggedized, portable, scalable server
nodes. Using Oracle Roving Edge Infra-
structure, organizations can run cloud
workloadswherevertheyneedthem,even
in the world’s most remote locations.
The new service is part of Oracle’s
comprehensive hybrid cloud portfolio,
At MWC Shanghai 2021, Kevin Hu,
President of Huawei Data Communi-
cation Product Line, announced the
‘five ones’ new capabilities of the In-
telligent cloud network solution —one
hop to cloud, one-network wide con-
nection, one-click fast scheduling, one
fiber for multiple purposes, and one-
stop integrated security. This solution
helps carriers build cloud-oriented
service networks and core capabilities
for DICT transformation.
 
According to Kevin Hu, the cloud net-
work is the key enabler in the digital
economy, bringing new impetus for
cloud image
which provides customers with more
flexibility and control over their cloud
deployments than other vendors.
“Customers want choice when it comes
to running workloads in the cloud. Each
customer has different requirements
basedondatasovereignty,scale,orwant-
ing the full experience of a public cloud
on-premises with all of Oracle’s cloud
services. Oracle Roving Edge Infrastruc-
ture is the latest example, delivering core
infrastructure services to remote loca-
tions,” said Clay Magouyrk, Executive
Vice President, Oracle Cloud Infrastruc-
ture. “Oracle’s hybrid cloud portfolio es-
sentially delivers a cloud region wherev-
er and however a customer needs it.”
Oracle Roving Edge Infrastructure
delivers core infrastructure services,
Learn more:
www.intel.com/xeonscalable
How do Intel®Technologies enable better cloud experiences?
The latest Intel innovations start with the processor, but also extend beyond the processor to memory, storage and networking. As a result, 2nd Gen Intel® Xeon® Scalable processor-
based servers integrate end-to-end platform innovations to deliver differentiating cloud performance.
2nd Gen Intel® Xeon®
Scalable processors
Intel® Optane™
SSDs
Intel® Ethernet
solutions
Intel® Optane™ persistent
memory
Deliver outstanding
performance across a wide
array of workloads
Deliver exceptional
storage performance
to speed application
responsiveness
Deliver high throughput
and low latency to speed
data across the
infrastructure
Extends system memory
capacity to maximize
application density per
server and support larger
datasets
And Intel works with leading software vendors to optimize their code and accelerate their
software, operating environments and frameworks on Intel-based platforms.
Intel® technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on systemconfiguration. No product
or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com.
Optimization Notice: Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel® microprocessors. Theseoptimizations include
SSE2, SSE3, and SSSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or e
ffectiveness of any optimization on microprocessors not manufactured by Intel.
Microprocessor-dependent optimizations in this product are intended for use with Intel® microprocessors. Certain optimizations not specificto Intel microarchitecture are reserved for Intel® microprocessors.
Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice. Notice Revision #20110804.
Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries.
Other names and brands may be claimed as the property of others. © Intel Corporation.
Cloud Innovation for
Data-Centric Workloads
Accelerate your time to insight with cloud infrastructure
powered by 2nd Gen Intel®Xeon®Scalable processors
Analytics In-memoryDatabases AI Machine Learning Deep Learning
What are data-centric workloads?
Analytics, in-memory databases, AI, machine learning, deep learning and other workloads are transforming every industry—
empowering companies to uncover valuable insights and intelligence from their massive, ever-growing volumes of data.
What demands do data-centric
workloads place on infrastructure?
Data-centric workloads are often very compute-intensive, but they are also very data-intensive—and that places greater
strains on memory, storage and networking to store more data and to move it faster to and from the CPU so it can be
processed and analyzed.
Store More
MoveFaster
Process Everything
For more information, please write to sales.value@redingtonmea.com
3
Fortinet Delivers Major Updates
to FortiOS Operating System
Cisco Completes Acquisition of IMImobile
FortiOS 7.0 expands the Fortinet Security Fabric’s ability to deliver consistent
security across all networks, endpoints, and clouds.
The combined offering will enable businesses to deliver customer experiences across the entire life cycle by
incorporating cloud contact center, AI, omnichannel communications and programmability for customization.​
Fortinet has announced version 7.0 of
FortiOS, Fortinet’s flagship operating
system. With over 300 new features,
FortiOS 7.0 enhances the Fortinet Se-
curity Fabric and Fortinet’s ability to
deliver consistent security for all net-
works, endpoints, and clouds.
John Maddison, EVP of Products
and CMO at Fortinet, said, “New in-
novations in FortiOS 7.0 continue
Fortinet’s commitment to delivering
a cybersecurity
platform that ex-
pands across the
entire digital at-
tack surface to en-
able security that
is broad, integrat-
ed, and automated
to protect devices,
data, and applica-
tions.”
The Fortinet Secu-
rity Fabric is the
industry’s highest-performing cyber-
security platform, powered by For-
tiOS to enable consistent and flexible
security across the entire attack sur-
face. With more consumption mod-
els than any other vendor – physical,
virtual, cloud, and as-a-Service, across
the largest product portfolio – span-
ning network security and SD-WAN,
switching and wireless access, network
access control, authentication, public
and private cloud security, endpoint
security, and
AI-driven ad-
vanced threat
protection solu-
tions – all built
on a common
operating sys-
tem, Fortinet
empowers orga-
nizations of any
size to secure
and simplify
their IT infra-
structure.
SMS, WhatsApp, Apple Business Chat,
Facebook Messenger and in-app com-
munications. Due to rising customer
expectations, the quality of those in-
teractive experiences is more import-
ant than ever before.
IMImobile orchestrates, automates,
monitors and delivers the customer
interactions that drive the best expe-
riences. By combining IMImobile’s
solution with Webex Contact Center,
Cisco will be able to provide a robust
Customer Experience as a Service
(CXaaS) offer. This new offering will
bring together cloud contact center,
artificial intelligence, experience man-
agement, collaboration and Commu-
nications Platform as-a-Service to
create a single solution that will give
organizations the ability to provide the
exceptional experiences that custom-
ers expect. 
John Maddison, Fortinet
Businesses need to make richer con-
nections with their customers through
the channel of their choice. This
means going beyond email, voice and
chat to enable communications on
the most popular digital channels like
Cisco has announced the completion
of the acquisition of IMImobile. IMI-
mobile is a leading global provider of
cloud communications software and
services that manage business-critical
interactions at scale.
Key features of FortiOS 7.0 among
many include:
• Zero Trust Network Access for
Remote Access and Application
Control:  FortiOS 7.0 enables every
FortiGate customer to employ Zero
Trust Network Access (ZTNA) capa-
bilities out of the box, making For-
tinet the only vendor to enable fire-
wall-based ZTNA. ZTNA enabled by
FortiOS 7.0 improves user experi-
ence by supporting the evolution of
better remote access to replace tradi-
tional VPN.
• Consistent Security Everywhere
with SASE: Fortinet gives enterprises
the flexibility needed to enable their
workforce to work from anywhere
with consistent, enterprise-grade se-
curity delivered on-premises – and
now, via cloud-based SASE consump-
tion (Security-as-a-Service).
• New Self-Healing SD-WAN Ca-
pabilities:  Fortinet’s leading Secure
SD-WAN solution now includes
self-healing capabilities through adap-
tive WAN remediations to make the
application experience more resilient.
• Expanding the LTE Edge with
5G:  Fortinet is extending network
connectivity and security beyond
the WAN Edge with innovations in
5G and LTE that improve wireless
network performance and increase
resiliency. With a diverse Wireless
WAN and LTE offering, organiza-
tions can achieve secure, scalable,
and highly available network con-
nectivity anywhere.
FortiOS 7.0 will be available at the end
of Q1 2021.
“Customer expectations are rising,
proving every interaction matters for
the brand and the end-user experi-
ence. Customers want delightful expe-
riences where they can have two-way
interactions with a business exactly
when they need to, on the channel
they prefer, without having to wait
or jump through hoops to prove who
they are, and without having to repeat
themselves. With the right technology,
world class brands can and must pro-
vide this level of easy and effortless in-
teraction. The addition of IMImobile
to Cisco will be integral to delivering
on the promise of delightful and en-
gaging customer experiences,” said
Jeetu Patel, Senior Vice President and
General Manager of Cisco’s Security
and Application business.
The IMImobile team joins Cisco’s
Contact Center business unit.
New innovations
in FortiOS 7.0
continue Fortinet’s
commitment
to delivering a
cybersecurity
platform that expands
across the entire
digital attack surface.”
For more information, please write to sales.value@redingtonmea.com
4
Cambium Networks Unveils Gigabit
Outdoor Point to Point Solution
Cambium Networks has announced
the new ePMP Force 400 series point
to point system with gigabit speed
fixed wireless connectivity in the
Sub-6 GHz spectrum. Service pro-
viders and enterprises can rapidly
extend connectivity and expand ca-
pacity without the cost of licensed
spectrum, expensive subscriptions or
trenching fiber.
Network operators can extend cover-
age with cost-effective backhaul for
enterprise access, fiber extensions, Wi-
Fi access or CCTV networks with the
ePMP Force 400’s flexible hardware
design, 80 MHz channel support and
improved over the air efficiencies pro-
viding up to 1 Gbps speed. The ePMP
an integrated Small Form-Factor Plug-
gable (SFP) port and optional Gigabit
Passive Optical Networks (GPON)
Optical Network Unit (ONU) module,
the ePMP Force 425 also makes a great
fiber extension to reach places where
fiber cannot be cost justified.
“Cambium Networks listens to ser-
vice providers and enterprise network
operators, and we are pushing the en-
velope to develop affordable gigabit
wireless solutions that deliver a low
total cost of ownership,” said Sakid
Ahmed, General Manager of ePMP
and cnVision business for Cambium
Networks. “The ePMP Force 400 se-
ries, leveraging a   leading 802.11ax
technology platform from Qualcomm
ePMP Force 400 enables service providers and enterprises to rapidly build affordable
gigabit speed wireless bridges and campus area networks using unlicensed spectrum.
Force 425 is ideal for service providers
looking to deliver high-capacity access
services to residential and business
customers. It also serves as a low-cost
backhaul for MicroPoP’s and outdoor
Wi-Fi access points that require high
capacity at moderate range without the
overhead of licensed microwave. With
New specializations, incentives and enablement offer partners
the flexibility to differentiate and meet customers’ needs.
Palo Alto Networks
Launches NextWave 3.0
specializations include corresponding
partner training and certifications.
Enhance partner profitabili-
ty  with three new specialization
incentives  for Prisma SASE,  Prisma
Cloud and Cortex XDR/XSOAR deals,
along with other new incentives, deal
boost and new rebates for its Next-
Wave Diamond Innovator partners. 
Expand partner opportunities  by
boosting existing deal referral incen-
tives on all Palo Alto Networks prod-
ucts, extending partner-delivered sup-
Palo Alto Networks has unveiled
NextWave 3.0, a significant set of en-
hancements, incentives and training
to its NextWave Partner Program.
Designed to help partners leverage
all of Palo Alto Networks technolo-
gies, NextWave 3.0 will help partners
differentiate their services, build new
security expertise and grow profitable
businesses as they meet customers’
needs in a dynamic security market.
  
As digital transformation fuels the
demand for specialized security ex-
pertise and creates a new economy of
services, Palo Alto Networks is com-
mitted to delivering the products,
programs and resources to enable its
NextWave partners. Developed in
consultation with the company’s part-
ners, NextWave 3.0 will:
 
Enable differentiation with new spe-
cializations. Partners can build their
security expertise through three new
Prisma SASE (Prisma Access and
Prisma SD-WAN, formerly CloudGe-
nix), Prisma Cloud and Cortex XDR/
XSOAR specializations. These new
portacrossmoreofPaloAltoNetworks›
technologies and offering new educa-
tion credits. Further, NextWave part-
ners can now resell Prisma Cloud via a
two-tier go-to-market strategy.
Empower partner success. NextWave
3.0 includes a host of new enablement
resources and ways for partners to earn
or maintain NextWave status, expand-
ing Certified Professional Services cer-
tification to include the new special-
izations, Technology Education credits
and technology adoption discounts.
 
“The future of our business and that
of our partners are fundamentally
linked,” said  Karl Soderlund, Senior
Vice President of Worldwide Chan-
nels. “The NextWave partner of tomor-
row will enable digital transformation
for our customers by embracing new
technology, offering product-specific
expertise, and leading with services.
NextWave 3.0 helps our partners do
just that. It is the most sweeping set of
enhancements we have done to help
our partners become security experts
across our entire technology portfolio.”
 
Palo Alto Networks NextWave partner
program includes approximately 6,500
partners who help 80,000 customers
around the world succeed with the
company’s technologies. In FY’20, 900
NextWave partners doubled their busi-
ness through Palo Alto Networks.
>> From page 1
platform software, enterprise grade
security, and applications to the edge
and disconnected locations with
Roving Edge Devices, ruggedized,
portable, scalable server nodes. It
enables customers to operate cloud
applications and workloads in the
field, including machine learning
inference, real-time data integration
and replication, augmented analytics,
and query-intensive data warehouses.
In addition, it delivers cloud comput-
ing and storage services at the edge of
networks for government and enter-
prise organizations, enabling low-la-
tency processing closer to the point of
data generation and ingestion, which
provides timely insights into data.
Oracle Roving Edge Infrastructure is
a fully mobile, connection-indepen-
dent extension of customers’ Oracle
Cloud Infrastructure (OCI) tenancy
with a similar interface and work-
flow to provide a consistent, unified
experience. An Oracle RED device
is equipped with high-performance
hardware including 40 OCPUs, an
NVIDIA T4 Tensor Core GPU, 512
GB RAM, and 61 TB of storage, and
can be clustered into groups of 5 to
15 nodes in a single cluster, starting at
$160 per node per day.
Oracle...
Technologies, builds on top of the
field proven ePMP fixed wireless ar-
chitecture, and expands fixed wire-
less broadband capability without the
overhead of licensed spectrum.”
The ePMP Force 400 is a global prod-
uct supporting specific channels
dependent on local country regula-
tions. The system includes an SFP
port making it easy to extend the
fiber network. With an innovative
optional range extender attachment,
the ePMP Force 425 can offer an addi-
tional 6 dBi of gain without installing
a completely new dish. The new radios 
support  LINKPlanner planning soft-
ware,  cnHeat heatmapping modeling
tool, and the cnMaestro management
system. The radios are IP67 rated for
rugged outdoor environments.
The ePMP Force 400 is available in
two variations: Force 425 – equipped
with a 25 dBi integrated dish antenna
and Force 400C – connectorized with
two RP-SMA RF interfaces for dish or
horn antennas.
The NextWave
partner of tomorrow
will enable digital
transformation for our
customers by embracing
new technology, offering
product-specific
expertise, and leading
with services.”
For more information, please write to sales.value@redingtonmea.com
5
Check Point Software Launches
Unified Security Solution Harmony
Citrix Tackles Employee Well-Being
Check Point Software Technologies
has launched Check Point Harmony,
the first unified solution to enable
secure connectivity to any resource
anywhere and give total endpoint
protection for users on any device. 
Harmony secures both corporate and
BYOD devices, and internet connec-
tions from known and zero-day at-
tacks, while giving Zero-Trust access
to business applications in a single,
easy to manage solution.
Citrix Systems has announced the
availability of new well-being capa-
bilities within  Citrix Workspace  that
companies can use to help employees
better manage the pressures and com-
plexities of the workday so they can be
and do their best.
“Traditionally, companies have fo-
cused on the physical well-being
of their employees and viewed the
other aspects as a bit taboo. But the
pandemic has changed this,” said
Donna Kimmel, Executive Vice Pres-
ident and Chief People Officer, Citrix.
“Companies are now having more
holistic conversations that cover the
mental, spiritual, and emotional as-
new Harmony Browse uniquely pro-
vides secure, fast and private web
browsing by inspecting all SSL traf-
fic directly on the endpoint without
adding latency or re-routing traffic
through a secure web service.
• Secure remote access from any de-
vice, anywhere:  Harmony Connect
securely connects any user or branch
to any resource, supporting client-
less Zero Trust Network Access from
any browser.
• Protects users’ email and produc-
tivity apps: Harmony Email & Office
secures users’ email clients and, gives
complete protection for Microsoft
Office 365, Exchange, Google G Suite
and more.
• Total endpoint and device securi-
ty: Harmony Endpoint protects users’
PCs from ransomware, phishing, and
malware, and minimizes breach im-
pact with autonomous detection and
response capability. Harmony Mobile
secures employees’ mobile devices
against malicious apps and network
or OS attacks.
And there is incentive for them to do
so. The World Health Organization
estimates that depression and anxiety
disorders cost the global economy $1
trillion each year in lost productivity.
With Citrix, companies can create
the space people need to be well and
succeed. Using Citrix Workspace,
they can deliver a secure, reliable and
consistent experience that removes
the noise and distractions from work,
enabling employees to focus, innovate
and create value.
And, leveraging new microapp capa-
bilities within the solution, they can
seamlessly integrate well-being func-
Harmony is the industry’s first unified solution for remote work, providing the highest
level of security protection and eliminating management complexity.
Company extends capabilities within Citrix Workspace to help
organizations create the space people need to be well and succeed.
Check Point Harmony - unified security solution for users, devices and access
Check Point Harmony addresses re-
mote work challenges by unifying
endpoint, browser, email and remote
access security components to protect
all user devices and the enterprise
networks they connect against known
and unknown threats.  Harmony in-
tegrates key security capabilities in a
single solution to deliver:
• Complete web security:  As a
core component of Harmony, the
pects of well-being because they real-
ize that they must create a workspace
that empowers their people to be well
on all fronts.”
“The move to mass remote work-
ing created security gaps in organ-
isations’ security infrastructures
that cannot easily be addressed
with multiple different point prod-
ucts from several different security
vendors,” said  Rafi Kretchmer, VP
Product Marketing  at Check Point
Software. “Harmony closes these
gaps with unified, multi-layered
security and prevention technol-
ogies, blocking against all exploit
techniques across all attack vectors.
This protects the enterprise´s net-
work end to end, ensuring uncom-
promised security for the new ‘work
from anywhere’ enterprise environ-
ment, with easy deployment and
single-console management.”
Check Point Harmony is easy to de-
ploy with a simple per-user pricing
model and is managed via a cloud
service, enabling user-centric securi-
ty policies to be applied across orga-
nizations’ environments.
Harmony closes
these gaps with
unified, multi-layered
security and prevention
technologies, blocking
against all exploit
techniques across all
attack vectors.”
Citrix Workspace
can deliver a secure,
reliable and consistent
experience that
removes the noise and
distractions from work,
enabling employees
to focus, innovate and
create value.
tionality into the workspace and make
it part of how they work. The easy-to-
use, low-code tools enable companies
to automatically surface relevant con-
tent and resources to support employ-
ees and deliver it to any device. And
they can be used to drive vital tasks
associated with well-being and make
it part of the workday such as con-
ducting quick pulse surveys to track
and improve employee happiness and
well-being or sharing positive news to
increase employee morale.
Customers will also be able to add new
functionality through a growing eco-
system of Citrix partners or build new
microapps themselves to adapt the
well-being capabilities to meet chang-
ing needs.
The Citrix well-being capabilities
are available for use with immedi-
ate effect.
For more information, please write to sales.value@redingtonmea.com
6
CrowdStrike Delivers Advanced Threat
Protection for Cloud and Container Workloads
lations with intelligent monitoring
that detects misconfigurations, vul-
nerabilities and threats, and deliv-
ers guided remediation that equips
developers with guardrails to avoid
costly mistakes.  
“We continue to deliver the broad-
est range of cloud security capabili-
ties in a single cloud-native platform
for on-prem, private, public, hybrid
and multi-cloud
environments
that scales,” said
Amol Kulkar-
ni, Chief Prod-
uct Officer for
CrowdSt r i ke.
“CrowdStrike’s
Security Cloud
is one of the
largest deploy-
ments in the
world, providing
CrowdStrike has announced expand-
ed  Cloud Security Posture Manage-
ment  (CSPM) and  Cloud Workload
Protection (CWP) capabilities for the
CrowdStrike Falcon platform to deliver
greater control, visibility and security
for cloud workloads and cloud-native
applications from build to runtime. 
The expanded CSPM and CWP ca-
pabilities for the CrowdStrike Fal-
con platform identify and remediate
vulnerabilities from development to
production for a wide variety of cloud
environments, including containers. 
With the incorporation of frictionless
security and automated protection
early in the continuous integration/
continuous delivery (CI/CD) pipe-
line, DevSec-
Ops teams are
empowered to
deliver produc-
tion-ready ap-
plications with
minimal impact
to build cycles.
A d d i t i o n a l l y,
the new features
will help organi-
zations prevent
compliance vio-
New capabilities bring increased protection for cloud applications, reducing
the attack surface and identifying vulnerabilities before deployment.
a spike in cryptocurrency prices, it may
be more profitable for them to infect
some devices with miners. As a result,
we see that the total number of DDoS
attacks in Q4 remained quite stable.
And we can predict that this trend will
continue in 2021,” said Alexey Kiselev,
Business Development Manager on the
Kaspersky DDoS Protection team.
To stay protected against DDoS at-
tacks, Kaspersky experts offer the fol-
lowing recommendations:
• Maintain web resource operations by
assigning specialists who understand
how to respond to DDoS attacks
• Validate third-party agreements and
contact information, including those
made with internet service providers.
This helps teams quickly access agree-
ments in case of an attack
Kaspersky: DDoS Attacks in Q4 2020
Dropped by a Third Compared to Q3
• Implement professional solu-
tions to safeguard your organi-
zation against DDoS attacks. For
example,  Kaspersky DDoS Protec-
tion combines Kaspersky’s extensive
expertise in combating cyberthreats
and the company’s unique in-house
developments
The number of DDoS attacks detected by Kaspersky DDoS Prevention in Q4 2020 is 31% less compared to Q3
2020. This drop can be connected to the growing interest in cryptocurrency mining, said Kaspersky.
us a unique vantage point in support-
ing organizations’ shift to cloud-na-
tive architectures and their adoption
of development and IT operations
(DevOps). The new capabilities se-
cure development and deployment of
applications in the cloud with greater
speed, efficiency and confidence.”
The new Falcon Horizon CSPM capa-
bilities include cloud-native security
posture management for multi-cloud
environments, monitoring cloud iden-
tities for least privileges and ensuring
continuous compliance.
The new Falcon Cloud Workload
protection capabilities include broad
support for container runtime secu-
rity, identifing security threats prior
to running containers in production,
stopping threats when containers are
most vulnerable, during runtime and
uncovering hidden threats.
As people began to spend more time
online in 2020, it resulted in a boom of
DDoS attacks. And in the fourth quar-
ter, attacks on educational institutions
continued globally.  Online gaming
services also suffered DDoS attacks. 
However, in Q4 2020 there were only
10% more attacks than in Q4 2019.
And compared to Q3 2020, the num-
ber of attacks in Q4 2020 fell by 31%,
while Q3 2020 also saw a drop com-
pared to Q2.
Experts suggest that this can be caused
by a surge in cryptocurrency costs. As a
result, cybercriminals may have had to
‘re-profile’ some botnets so that C&C
servers, that are typically used in DDoS
attacks, could repurpose infected de-
vices and use their computing power
to mine cryptocurrencies instead.
This is further proved by KSN statistics.
Throughout 2019, as well as in the be-
ginning of 2020, the number of cryp-
tominers was dropping. However, from
August 2020 the trend changed, with the
amount of this form of malware increas-
ing slightly and reaching a plateau in Q4.
“The DDoS attack market is currently
affected by two opposite trends. On the
one hand, people still highly rely on
stable work of online resources, which
can make DDoS attacks a common
choice for malefactors. However, with
Amol Kulkarni, CrowdStrike
The new
capabilities secure
development and
deployment of
applications in the
cloud with greater
speed, efficiency and
confidence.”
Maintain
web resource
operations
by assigning
specialists who
understand how to
respond to DDoS
attacks.
For more information, please write to sales.value@redingtonmea.com
7
Nutanix has announced additional
ransomware protections in the compa-
ny’s cloud platform. These include new
threat monitoring and detection, as well
asmoregranulardatareplicationandro-
bust access controls all natively built into
theNutanixstack.Thesenewcapabilities
build on Nutanix’s rich data services for
network security, files and objects stor-
age, virtualization, and business conti-
Nutanix Extends Ransomware Protections to
Help Secure Customers’ IT Environments
leverage the following features as part of
a complete data protection solution:
•Eliminatedowntimeandminimizedata
loss for Tier-1 VMware workloads with
built-in CDP and achieve immediate re-
coveries to a latest state or desired point
in time providing the best recovery point
objectives (RPOs).
• Keep backups safe with immutable,
hardened Linux repositories compliant
with SEC 17a-4(f), FINRA 4511(c) and
CFTC 1.31(c)-(d) regulations, preventing
encryption by ransomware, accidental
or malicious deletions; based on gener-
al-purposeservers,withoutanyhardware
lock-in.
• Reduce the costs of long-term data ar-
chival and retention by up to 20 times
and replace manual tape management
New Veeam Backup &
Replication v11 Now Available
ments that are prime targets for initial
ransomware infection and spread.
Closer to the application layer, the Nu-
tanix cloud platform now also includes
native ransomware detection for file
storage services within Nutanix Files.
File analytics, which is a feature includ-
ed with Files, now detects abnormal and
suspicious access patterns and identifies
known ransomware signatures to block
data access in real-time.
To further protect application data from
ransomware attacks, the Nutanix cloud
platform now includes new features
within the object storage solution, Nu-
tanix Objects. Objects includes more
granular permissions to access object
data for primary and secondary storage.
Specifically, Nutanix Objects now offers
the ability to configure Write Once Read
Many (WORM) policies for individual
files and objects selected by an IT team
to help guard against unauthorized de-
letion or encryption of data, thwarting
nuity to help enterprises prevent, detect
and recover against ransomware attacks
across multiple cloud environments. At
a time when attacks are becoming even
more common due to the rise of remote
work, these capabilities make it easier to
implement security and business conti-
nuity best practices at the infrastructure
level, rather than rely on a complex ma-
trix of bolt-on security products.
The Nutanix cloud platform now deliv-
ersanomalydetectionbasedonmachine
learning and IP reputation services with
the company’s security networking op-
erations and monitoring solution, Flow
Security Central, a feature with Nutanix
Flow. Flow Security Central helps iden-
tify known attack vectors, including po-
tential ransomware, at the network level
before reaching the application and data
layers.. Flow Security Central also moni-
tors endpoints to identify traffic coming
from disreputable locations, something
especially helpful for defending Virtual
Desktop Infrastructure (VDI) deploy-
Hybrid and multicloud leader strengthens networking, storage and virtualization services.
New 4-in-1 solution ​
combines backup, replication, storage
snapshots and now, Continuous Data Protection (CDP).
Rajiv Mirani, Nutanix
Danny Allan, Veeam
life cycle, while handling all the com-
plexities of a multi-cloud environment
for AWS, Microsoft Azure and Google
Cloud Platform.
“Veeam released V10 with more than
150 new enhancements just 12 months
ago, and now has more than 700,000
downloads. Being able to launch the
next version — Veeam Backup & Rep-
lication v11 — with an additional 200
new and powerful backup, cloud, DR,
security and automation enhancements
speaks volumes to Veeam’s speed of in-
novation, as well as our strong commit-
ment to the needs and data reliability
demands of our customers and part-
ners,” said Danny Allan, Chief Technol-
ogy Officer and Senior Vice President of
Product Strategy at Veeam.
New Veeam V11 enables businesses to
Veeam Software has announced gen-
eral availability of new Veeam Backup
& Replication v11, enabling the most
advanced data protection solution for
cloud, virtual, physical and enterprise
workloads. With more than 200 new
features and enhancements, the sin-
gle solution for comprehensive data
management is powerful and flexible
enough to protect each phase of the data
with new native support for Amazon
S3 Glacier (including Glacier Deep Ar-
chive) and Microsoft Azure Archive
Storage through end-to-end backup life
cycle management with Veeam Scale-out
Backup Repository Archive Tier.
• New support for Google Cloud Storage
for Veeam Scale-out Backup Repository
Capacity Tier, providing greater choice of
hot cloud object storage targets.
• Achieve the lowest recovery time objec-
tives(RTOs)with powerfulinstantrecov-
ery for Microsoft SQL, Oracle databases
and  NAS file shares from  the  pioneer
of Instant VM Recovery.
• Delivers end-user data backup for any
macOS device, joining existing Veeam
Agents  for Microsoft Windows,  Linux,
IBM AIX and Oracle Solaris.
• Leverage the services, solutions and ex-
pertise needed to maximize the value of
V11 by teaming up with Veeam-powered
service providers for a fully managed
backup experience.
New Veeam Backup & Replication v11 is
now available for download.
many common ransomware attacks.
Lastly, the Nutanix platform now deliv-
ers support for Microsoft Windows Cre-
dential Guard for virtual machines and
virtual desktops running on the AHV
hypervisor. Credential Guard adds op-
erating system (OS) protection from
malware using credential theft attacks
on Microsoft OS environments, a com-
mon vector used by ransomware to gain
administrative privileges.
Rajiv Mirani, Chief Technology Officer
at Nutanix, said, “Enterprises need a
defense in depth approach to security,
starting with their IT infrastructure.
However, the right security tools need
to also be simple and seamless to imple-
ment. Nutanix delivers a strengthened
cloud platform out of the box, with an
even richer set of ransomware protec-
tions available now.”
All new features are currently available
to customers.
For more information, please write to sales.value@redingtonmea.com
8
Veritas Technologies has announced
the launch of Veritas NetBackup 9.
NetBackup 9 delivers significant new
features to provide customers with ad-
ditional choices for deployment across
edge, core and cloud, while increasing
operational simplicity.
NetBackup 9 has been designed to
answer the needs of customers op-
erating demanding multi-cloud data
centers with heterogenous environ-
ments that require a data protection
platform without compromise. With
NetBackup 9, Veritas now adds Flex
Scale, offering customers a scale-out
deployment option based on Veritas’
validated reference design. This new
architecture provides a hypercon-
verged approach to data protection
that delivers cloud-like simplicity
and scalability in an on-premises data
center. With NetBackup Flex Scale,
businesses no longer need to forecast
capacity needs and provision in antic-
ipation of future growth. Instead, they
are able to simply add more nodes as
required. By empowering enterpris-
es to extend their standardization on
Veritas to include scale-out, customers
can be freed from the management
complexity associated with disparate
point solutions for data protection.
Deepak Mohan, Executive Vice Presi-
dent, Products Organization at Veritas,
said,“VeritasNetBackup9withFlexScale
gives customers freedom of choice with
the most flexible deployment models in
the industry today by empowering them
to protect over 800 workloads in a scale-
out, scale-up, or cloud storage model.”
NetBackup 9 is already available in
more flexible deployment modes than
is offered by any player in the industry.
With the inclusion of its new scale-out
VMware Refreshes vRealize Cloud Management
Veritas Introduces NetBackup 9
hyperconverged mode, Veritas contin-
ues to expand customer choice while
reducing complexity, cost and risk.
The launch of NetBackup 9 further
reinforces Veritas’ focus on abstract-
ing the complexity of enterprise IT.
NetBackup streamlines management
of the most dynamic environments
through orchestrated automation of
discovery, protection, and recovery.
NetBackup 9 also includes new fea-
tures to simplify enterprise data pro-
tection for mission-critical OpenStack
environments. Utilizing OpenStack
native APIs, NetBackup 9 delivers
seamless integration, multi-tenant
controls, and intuitive self-service
management. In addition to offering
scalability and performance benefits,
NetBackup 9 can dramatically reduce
costs and the burden of administrative
management while ensuring high-per-
formance backup and recovery opera-
tions for OpenStack, both on-premise
and in public clouds.
NetBackup 9 is available now.
ize Log Insight Cloud, and VMware vRe-
alize Network Insight Cloud.
VMware vRealize Automation 8.3 de-
livers enhanced solutions for custom-
ers’ most critical automation use cases
including self-service multi-clouds,
network automation, and DevOps
with actionable insights, greater secu-
rity and improved performance
Powered by AI and predictive analytics,
vRealize Operations delivers continuous
performance, capacity and cost optimi-
zation, proactive planning, intelligent
remediation and integrated compliance
VMware vRealize Log Insight Cloud in-
troduces enhanced machine learning
(ML) analytics for errors and Knowl-
edge Base (KB) correlation, ERI-FIPS
compliance, VMware HCX and VM-
ware Site Recovery Manager log integra-
tion, and native data archiving support.
VMware  vRealize Network Insight
6.1 and VMware vRealize Network In-
sight Cloud provide an end-to-end net-
work view by learning from multiple
data sources across virtual and physical
infrastructure. Using ML for applica-
tion discovery as well as assurance and
verification capabilities, vRealize Net-
work Insight makes it easier to plan,
build, and manage complex networks
VMware Skyline  provides proactive
intelligence across customers’  VM-
ware  environments to help prevent
issues and unscheduled downtime.
The latest release of Skyline Advisor
provides expanded visibility into the
vulnerabilities Skyline identifies and
improved Support Request visibility
enables easier use of the Log Assist au-
tomated log upload feature
VMware vRealize Automation 8.3,
VMware vRealize Operations 8.3, VM-
ware vRealize Log Insight 8.3, VMware
vRealize Suite Lifecycle Manager 8.3
VMware vRealize Network Insight 6.1
and Skyline Advisor are available. The
new capabilities and enhancements to
VMware vRealize Operations Cloud,
VMware vRealize Log Insight Cloud
and VMware vRealize Network Insight
Cloud are also available.
Purnima Padmanabhan, Senior Vice
President and General Manager, Cloud
Management Business Unit, VMware.
“As more businesses pursue cloud as an
agility strategy, vRealize Cloud Man-
agement helps customers run their ap-
plications anywhere while maintaining
consistent operations and common
governance across all environments.”
VMware vRealize Cloud Management
enables customers to consistently deploy
and operate their applications, infra-
structure, and platform services, from
the data center to the cloud to the edge.
It helps them accelerate innovation with
quick and easy access to services, gain ef-
ficiency by improving visibility and auto-
mation, and improve control while mit-
igating risk through unified operations
and governance. Vmware has also intro-
duced new releases including VMware
vRealize Automation 8.3, VMware vRe-
alize Operations 8.3, VMware vRealize
Log Insight 8.3, vRealize Suite Lifecycle
Manager 8.3 VMware vRealize Network
Insight 6.1 and VMware Skyline; along
withenhancementsacrossVMwarevRe-
alize Operations Cloud, VMware vReal-
VMware vRealize Cloud Management enables customers to consistently deploy and operate their
applications, infrastructure, and platform services, from the data center to the cloud to the edge.
NetBackup 9 has been designed to answer the needs of customers operating
demanding multi-cloud data centers with heterogenous environments that
require a data protection platform without compromise.
Vmware has announced innovations
across its  VMware vRealize Cloud
Managementportfolio of on-premises
and Software as a Service (SaaS) solu-
tions. The new and enhanced capabil-
ities combine to enable customers to
more securely deploy and operate their
hybrid and multi-cloud environments.
“In today’s uncertain world, enterpris-
es are seeking to increase agility and
efficiencies to remain competitive and
to drive faster business growth,” said
Deepak Mohan, Veritas
Purnima Padmanabhan, VMware
For more information, please write to sales.value@redingtonmea.com
9
14 million devices today, which are
used to modernize supply chain and
warehousing operations. As part of this,
Ivanti Wavelink has validated over 50
enterprise rugged mobile devices with
10 device manufacturers, including Ze-
bra, Honeywell, Apple, Samsung, Point
Mobile, CypherLab, and JLT Mobile.
Ivanti Wavelink, the supply chain busi-
ness unit of Ivanti, has announced the
launch of Ivanti Wavelink Velocity
Solutions Directory. The new directo-
ry enables device manufacturers offer-
ing solutions for the supply chain and
warehousing industries to now rapidly
validate their solutions for the Ivanti
Wavelink Velocity platform. It also pro-
Ivanti Wavelink Expands Velocity Platform
General Manager, Ivanti Wavelink.
“This is a competitive advantage we
extend to device manufacturers that
accelerates engagement and improves
their time-to-revenue by eliminating
what is typically a lengthy validation
process. Now, partners and customers
are able to immediately leverage their
Ivanti Wavelink Velocity validated de-
vices within their environments.”
Through the Ivanti Wavelink Solutions
Directory, hardware and device man-
ufacturers can rapidly validate their
rugged industrial and consumer-grade
devices running Android, iOS or Win-
dows-based operating systems.
For solution provider partners and
customers, the Ivanti Wavelink Veloc-
ity Solutions Directory provides a sin-
gle portal for accessing fully validated
Ivanti Wavelink devices. Ivanti Wave-
link Velocity is deployed on more than
vides a centralized portal where Ivanti
Wavelink solution partners and cus-
tomers can gain access to information
on validated devices.
“Ivanti Wavelink is proud to be the first
to offer this type of solutions directory
to our partners and customers,” said
Brandon Black, Vice President and
New Solutions Directory and Rapid Validation Capabilities enable device manufacturers
serving the supply chain and warehousing industries to self-validate solutions.
CyberArk Delivers New Identity Security
Offerings to Drive Customer Success
Company introduces new subscriptions, programs and tools to complement the
industry’s most comprehensive identity cecurity capabilities.
• CyberArk Identity Security As-
sessment Tool – The Assessment
Tool is fully aligned to the CyberArk
Blueprint so organizations can assess
and track their level of alignment
with Identity Security best practices
and compare their program maturity
with peers across multiple parameters
such as industry, region and organi-
zation size.
Identity Security Customer Success
Plans – Success Plans are strategically
packaged resources, guidance and ex-
pertise to help customers successfully
execute an Identity Security program
while getting the most value from
their solutions as quickly as possible.
Udi Mokady, Chairman and CEO,
CyberArk, said, “CyberArk’s privi-
lege-led approach to Identity Security
is designed to help enterprises adapt
and embrace a risk-based strategy
for defending against identity-based
attacks as they support a distributed
workforce, embrace the cloud and
new cloud technologies, and deliver
positive customer experiences.”
With CyberArk Identity Security, or-
ganizations can secure access across
any device, anywhere, at just the right
time through:
• CyberArk Privileged Access solu-
tions secure privileged credentials
wherever they exist – defending
against advanced attacks, speeding
digital transformation and helping
achieve compliance.
• CyberArk Workforce Identity and
Customer Identity solutions contin-
uously monitor behavioral signals
to make sure users are who they say
they are.
• CyberArk Secrets Management
solutions enable applications and
automation tools to securely access
sensitive resources at scale – without
burdening developers.
individual identities – human or ma-
chine – throughout the cycle of access-
ing critical assets.
The new announcements include:
• Identity Security Subscription
Offerings – Available in three new
subscription offerings, customers can
benefit from the combined power of
Identity as a Service (IDaaS) and the
industry’s leading Privileged Access
Management solution in offerings that
make the most sense for their specific
users: Workforce User, External Ven-
dor or Privileged User.
• CyberArk Blueprint for Identity
Security Success – The CyberArk
Blueprint has evolved to expand
prescriptive guidance across all
identities and is centered on core
Identity Security best practices
gained through years of hands-on
customer engagements.
CyberArk has announced the avail-
ability of new subscriptions, programs
and tools designed to accelerate or-
ganisations’ Identity Security initia-
tives and time to business impact.
These new offerings complement Cy-
berArk’s Identity Security portfolio,
which is centered on Privileged Access
Management and focuses on securing
Through the
Ivanti Wavelink
Solutions Directory,
hardware and device
manufacturers can
rapidly validate their
rugged industrial
and consumer-grade
devices running
Android, iOS or
Windows-based
operating systems.
For more information, please write to sales.value@redingtonmea.com
10
For more information, please write to sales.value@redingtonmea.com
09 / 2020 | 11
@redingtonvalue
For more information, please write to sales.value@redingtonmea.com
11
For more information, please write to sales.value@redingtonmea.com
09 / 2020 | 11
@redingtonvalue
Empowering remote work with
Microsoft Teams
With more people working from home, fostering virtual connection is crucial.
Empower your team to stay connected and keep business running
smoothly using Microsoft Teams.
EMBRACE ONLINE
SHARE CONTENT
STAY FOCUSED
STAY CONNECTED
Include an
online link
Share your
screen
Be mindful
and inclusive
Collaborate on
ideas
Turn on
video
Make up for
missed
hallway talk
Blur your
background
Bring the
team
together
Record the
meeting
Have fun!
www.redingtonvalue.com sales.value@redingtonmea.com H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE

Más contenido relacionado

La actualidad más candente

I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaAccenture Italia
 
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery ScenariosACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery ScenariosAccenture Italia
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture Italia
 
Smart Enterprise Drivers 2020 - Strategic Realities Reshaping the Smart Enter...
Smart Enterprise Drivers 2020 - Strategic Realities Reshaping the Smart Enter...Smart Enterprise Drivers 2020 - Strategic Realities Reshaping the Smart Enter...
Smart Enterprise Drivers 2020 - Strategic Realities Reshaping the Smart Enter...InteractiveNEC
 
Microsoft Telecommunications Industry News | October 2020
Microsoft Telecommunications Industry News | October 2020Microsoft Telecommunications Industry News | October 2020
Microsoft Telecommunications Industry News | October 2020Rick Lievano
 
Industry edge communications edition spring 2013
Industry edge communications edition spring 2013Industry edge communications edition spring 2013
Industry edge communications edition spring 2013Jeff Edlund
 
Microsoft Telecommunications Newsletter | October 2021
Microsoft Telecommunications Newsletter | October 2021Microsoft Telecommunications Newsletter | October 2021
Microsoft Telecommunications Newsletter | October 2021Rick Lievano
 
Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Rick Lievano
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insightsVU
 
FourNet Microsoft Teams Direct Routing and Contact Centre Integration
FourNet Microsoft Teams Direct Routing and Contact Centre IntegrationFourNet Microsoft Teams Direct Routing and Contact Centre Integration
FourNet Microsoft Teams Direct Routing and Contact Centre IntegrationJoshua Bundy ACIM
 
Bhadale group of companies hybrid cloud services catalogue
Bhadale group of companies hybrid cloud services catalogueBhadale group of companies hybrid cloud services catalogue
Bhadale group of companies hybrid cloud services catalogueVijayananda Mohire
 
Bhadale group of companies 5G converged networks services catalogue
Bhadale group of companies 5G converged networks services catalogueBhadale group of companies 5G converged networks services catalogue
Bhadale group of companies 5G converged networks services catalogueVijayananda Mohire
 
Red Hat and Microsoft Partnership
Red Hat and Microsoft PartnershipRed Hat and Microsoft Partnership
Red Hat and Microsoft PartnershipKevin McCauley
 

La actualidad más candente (20)

I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
 
Redington Value Journal - January 2019
Redington Value Journal - January 2019Redington Value Journal - January 2019
Redington Value Journal - January 2019
 
Redington Value Journal - July 2018
Redington Value Journal - July 2018Redington Value Journal - July 2018
Redington Value Journal - July 2018
 
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery ScenariosACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
 
Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
 
Smart Enterprise Drivers 2020 - Strategic Realities Reshaping the Smart Enter...
Smart Enterprise Drivers 2020 - Strategic Realities Reshaping the Smart Enter...Smart Enterprise Drivers 2020 - Strategic Realities Reshaping the Smart Enter...
Smart Enterprise Drivers 2020 - Strategic Realities Reshaping the Smart Enter...
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
 
Microsoft Telecommunications Industry News | October 2020
Microsoft Telecommunications Industry News | October 2020Microsoft Telecommunications Industry News | October 2020
Microsoft Telecommunications Industry News | October 2020
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
Industry edge communications edition spring 2013
Industry edge communications edition spring 2013Industry edge communications edition spring 2013
Industry edge communications edition spring 2013
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 
Redington Value Journal - December 2016
Redington Value Journal - December 2016Redington Value Journal - December 2016
Redington Value Journal - December 2016
 
Microsoft Telecommunications Newsletter | October 2021
Microsoft Telecommunications Newsletter | October 2021Microsoft Telecommunications Newsletter | October 2021
Microsoft Telecommunications Newsletter | October 2021
 
Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insights
 
FourNet Microsoft Teams Direct Routing and Contact Centre Integration
FourNet Microsoft Teams Direct Routing and Contact Centre IntegrationFourNet Microsoft Teams Direct Routing and Contact Centre Integration
FourNet Microsoft Teams Direct Routing and Contact Centre Integration
 
Bhadale group of companies hybrid cloud services catalogue
Bhadale group of companies hybrid cloud services catalogueBhadale group of companies hybrid cloud services catalogue
Bhadale group of companies hybrid cloud services catalogue
 
Bhadale group of companies 5G converged networks services catalogue
Bhadale group of companies 5G converged networks services catalogueBhadale group of companies 5G converged networks services catalogue
Bhadale group of companies 5G converged networks services catalogue
 
Red Hat and Microsoft Partnership
Red Hat and Microsoft PartnershipRed Hat and Microsoft Partnership
Red Hat and Microsoft Partnership
 

Similar a Value Journal - March 2021

Nec smart enterprise_trends_2014-slides
Nec smart enterprise_trends_2014-slidesNec smart enterprise_trends_2014-slides
Nec smart enterprise_trends_2014-slidesTodd Landry
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingAmazon Web Services
 
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet ArchitecturesRA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet ArchitecturesRockwell Automation
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323Les Williams
 
Supercharging the Cloud for an Agile Enterprise
Supercharging the Cloud  for an Agile EnterpriseSupercharging the Cloud  for an Agile Enterprise
Supercharging the Cloud for an Agile EnterprisePatrick Bouillaud
 
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docxAbdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docxannetnash8266
 
securematics_vendor_line_card 2015
securematics_vendor_line_card 2015securematics_vendor_line_card 2015
securematics_vendor_line_card 2015Nelson Venezia
 
28701-FGB1010554_EN_A_PDFV1R1
28701-FGB1010554_EN_A_PDFV1R128701-FGB1010554_EN_A_PDFV1R1
28701-FGB1010554_EN_A_PDFV1R1Jason Hoffman
 
Ericsson introduces a hyperscale cloud solution
Ericsson introduces a hyperscale cloud solutionEricsson introduces a hyperscale cloud solution
Ericsson introduces a hyperscale cloud solutionEricsson
 
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 201721 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017Kudzai Manditereza
 
Why century link and savvis
Why century link and savvisWhy century link and savvis
Why century link and savvisdickcraigson
 
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware
 
White Paper smaller
White Paper smallerWhite Paper smaller
White Paper smallerJonny Sharp
 
New Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV Solutions
New Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV SolutionsNew Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV Solutions
New Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV SolutionsADVA
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveRodrigo Martini
 
Enterprise agility for the Cloud
Enterprise agility for the CloudEnterprise agility for the Cloud
Enterprise agility for the CloudSteven_Jackson
 
Achieving Cloud Enterprise Agility
Achieving Cloud Enterprise AgilityAchieving Cloud Enterprise Agility
Achieving Cloud Enterprise AgilitySteven_Jackson
 

Similar a Value Journal - March 2021 (20)

Nec smart enterprise_trends_2014-slides
Nec smart enterprise_trends_2014-slidesNec smart enterprise_trends_2014-slides
Nec smart enterprise_trends_2014-slides
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
 
Redington Value Journal - July 2017
Redington Value Journal - July 2017Redington Value Journal - July 2017
Redington Value Journal - July 2017
 
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet ArchitecturesRA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
RA TechED 2019 - NT03 - Building Converged Plantwide Ethernet Architectures
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
 
Supercharging the Cloud for an Agile Enterprise
Supercharging the Cloud  for an Agile EnterpriseSupercharging the Cloud  for an Agile Enterprise
Supercharging the Cloud for an Agile Enterprise
 
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docxAbdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
Abdulrahman AlzaidCell 424-230-4189[email protected]OBJ.docx
 
securematics_vendor_line_card 2015
securematics_vendor_line_card 2015securematics_vendor_line_card 2015
securematics_vendor_line_card 2015
 
Redington Value Journal - November 2017
Redington Value Journal - November 2017Redington Value Journal - November 2017
Redington Value Journal - November 2017
 
28701-FGB1010554_EN_A_PDFV1R1
28701-FGB1010554_EN_A_PDFV1R128701-FGB1010554_EN_A_PDFV1R1
28701-FGB1010554_EN_A_PDFV1R1
 
Ericsson introduces a hyperscale cloud solution
Ericsson introduces a hyperscale cloud solutionEricsson introduces a hyperscale cloud solution
Ericsson introduces a hyperscale cloud solution
 
21 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 201721 Innovative IoT Products To Watch at Hannover Messe 2017
21 Innovative IoT Products To Watch at Hannover Messe 2017
 
Why century link and savvis
Why century link and savvisWhy century link and savvis
Why century link and savvis
 
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud Era
 
White Paper smaller
White Paper smallerWhite Paper smaller
White Paper smaller
 
New Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV Solutions
New Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV SolutionsNew Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV Solutions
New Breed of Carrier Chooses ADVA Ensemble for Intel-Powered NFV Solutions
 
Simplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - AerohiveSimplificando a Rede Wireless - Aerohive
Simplificando a Rede Wireless - Aerohive
 
Enterprise agility for the Cloud
Enterprise agility for the CloudEnterprise agility for the Cloud
Enterprise agility for the Cloud
 
Achieving Cloud Enterprise Agility
Achieving Cloud Enterprise AgilityAchieving Cloud Enterprise Agility
Achieving Cloud Enterprise Agility
 

Más de Redington Value Distribution

Más de Redington Value Distribution (20)

Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
 
Value journal September_2019
Value journal September_2019 Value journal September_2019
Value journal September_2019
 
Redington Value journal - August 2019
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
 
Redington Value Journal - July 2019
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
 
Redington Value Journal - June 2019
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Redington Value Journal - April 2019
Redington Value Journal - April 2019Redington Value Journal - April 2019
Redington Value Journal - April 2019
 
Redington Value Journal - November 2018
Redington Value Journal - November 2018Redington Value Journal - November 2018
Redington Value Journal - November 2018
 
Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018
 

Último

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Anamikakaur10
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceDamini Dixit
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPanhandleOilandGas
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 

Último (20)

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLJAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
JAYNAGAR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
Call Now ☎️🔝 9332606886🔝 Call Girls ❤ Service In Bhilwara Female Escorts Serv...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Value Journal - March 2021

  • 1. the 5G New Calling solution. This solution harnesses IMS data channel architecture and provides an enhanced voice experience with HD, visual, and interactive services. By using this solu- tion, operators can refine the 5G ser- vice experience, satisfy industry cus- tomer requirements, gain advantages, and achieve business success. Issue 53 // March 2021 Redington Value is a value added distributor for the following brands in parts of Middle East & Africa At MWC Shanghai 2021, the firm also launched the OptiX SuperSite solution for global operators. Huawei Unveils New Solutions to Stimulate Growth in the Digital Economy  the fourth industrial revolution. The cloud network provides continuous computing power for numerous in- dustries, stimulating new growth in the digital economy.    During the event, Huawei also launched the OptiX SuperSite solution for glob- al operators. Richard Jin, President of  Huawei’s Transmission & Access Product Line, said, “OptiX SuperSite is how industry and home users get connected at a high-speed level. It also presents an opportunity for operators to benefit from the enterprise market and enhance home broadband experience.”   Separately, Xinyan Coal Mine, Shanxi Mobile, and  Huawei  jointly released a 5GtoB kite-like solution for public net- work integrated non-public networks (PNI-NPN). The solution provides high-performance, high reliability 5G networksthatfunctionthroughacombi- nation of private and public networks. It also aims to accelerate the development of the 5G industry and increase the value of 5G for businesses, ultimately creating momentum in the digital economy.   Additionally, during the summit, Chi- na Mobile and Huawei jointly unveiled >> Continued on page 4 New solution enables secure, scalable cloud services wherever customers need them, even in the most remote areas of the world. Oracle Expands Hybrid Cloud Portfolio with Roving Edge Infrastructure Kevin Hu, Huawei  O racle has expanded its hy- brid cloud portfolio with Oracle Roving Edge Infra- structure,anewofferingthat brings core infrastructure services to the edge with Roving Edge Devices (REDs) – ruggedized, portable, scalable server nodes. Using Oracle Roving Edge Infra- structure, organizations can run cloud workloadswherevertheyneedthem,even in the world’s most remote locations. The new service is part of Oracle’s comprehensive hybrid cloud portfolio, At MWC Shanghai 2021, Kevin Hu, President of Huawei Data Communi- cation Product Line, announced the ‘five ones’ new capabilities of the In- telligent cloud network solution —one hop to cloud, one-network wide con- nection, one-click fast scheduling, one fiber for multiple purposes, and one- stop integrated security. This solution helps carriers build cloud-oriented service networks and core capabilities for DICT transformation.   According to Kevin Hu, the cloud net- work is the key enabler in the digital economy, bringing new impetus for cloud image which provides customers with more flexibility and control over their cloud deployments than other vendors. “Customers want choice when it comes to running workloads in the cloud. Each customer has different requirements basedondatasovereignty,scale,orwant- ing the full experience of a public cloud on-premises with all of Oracle’s cloud services. Oracle Roving Edge Infrastruc- ture is the latest example, delivering core infrastructure services to remote loca- tions,” said Clay Magouyrk, Executive Vice President, Oracle Cloud Infrastruc- ture. “Oracle’s hybrid cloud portfolio es- sentially delivers a cloud region wherev- er and however a customer needs it.” Oracle Roving Edge Infrastructure delivers core infrastructure services,
  • 2. Learn more: www.intel.com/xeonscalable How do Intel®Technologies enable better cloud experiences? The latest Intel innovations start with the processor, but also extend beyond the processor to memory, storage and networking. As a result, 2nd Gen Intel® Xeon® Scalable processor- based servers integrate end-to-end platform innovations to deliver differentiating cloud performance. 2nd Gen Intel® Xeon® Scalable processors Intel® Optane™ SSDs Intel® Ethernet solutions Intel® Optane™ persistent memory Deliver outstanding performance across a wide array of workloads Deliver exceptional storage performance to speed application responsiveness Deliver high throughput and low latency to speed data across the infrastructure Extends system memory capacity to maximize application density per server and support larger datasets And Intel works with leading software vendors to optimize their code and accelerate their software, operating environments and frameworks on Intel-based platforms. Intel® technologies’ features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on systemconfiguration. No product or component can be absolutely secure. Check with your system manufacturer or retailer or learn more at intel.com. Optimization Notice: Intel's compilers may or may not optimize to the same degree for non-Intel microprocessors for optimizations that are not unique to Intel® microprocessors. Theseoptimizations include SSE2, SSE3, and SSSE3 instruction sets and other optimizations. Intel does not guarantee the availability, functionality, or e ffectiveness of any optimization on microprocessors not manufactured by Intel. Microprocessor-dependent optimizations in this product are intended for use with Intel® microprocessors. Certain optimizations not specificto Intel microarchitecture are reserved for Intel® microprocessors. Please refer to the applicable product User and Reference Guides for more information regarding the specific instruction sets covered by this notice. Notice Revision #20110804. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others. © Intel Corporation. Cloud Innovation for Data-Centric Workloads Accelerate your time to insight with cloud infrastructure powered by 2nd Gen Intel®Xeon®Scalable processors Analytics In-memoryDatabases AI Machine Learning Deep Learning What are data-centric workloads? Analytics, in-memory databases, AI, machine learning, deep learning and other workloads are transforming every industry— empowering companies to uncover valuable insights and intelligence from their massive, ever-growing volumes of data. What demands do data-centric workloads place on infrastructure? Data-centric workloads are often very compute-intensive, but they are also very data-intensive—and that places greater strains on memory, storage and networking to store more data and to move it faster to and from the CPU so it can be processed and analyzed. Store More MoveFaster Process Everything
  • 3. For more information, please write to sales.value@redingtonmea.com 3 Fortinet Delivers Major Updates to FortiOS Operating System Cisco Completes Acquisition of IMImobile FortiOS 7.0 expands the Fortinet Security Fabric’s ability to deliver consistent security across all networks, endpoints, and clouds. The combined offering will enable businesses to deliver customer experiences across the entire life cycle by incorporating cloud contact center, AI, omnichannel communications and programmability for customization.​ Fortinet has announced version 7.0 of FortiOS, Fortinet’s flagship operating system. With over 300 new features, FortiOS 7.0 enhances the Fortinet Se- curity Fabric and Fortinet’s ability to deliver consistent security for all net- works, endpoints, and clouds. John Maddison, EVP of Products and CMO at Fortinet, said, “New in- novations in FortiOS 7.0 continue Fortinet’s commitment to delivering a cybersecurity platform that ex- pands across the entire digital at- tack surface to en- able security that is broad, integrat- ed, and automated to protect devices, data, and applica- tions.” The Fortinet Secu- rity Fabric is the industry’s highest-performing cyber- security platform, powered by For- tiOS to enable consistent and flexible security across the entire attack sur- face. With more consumption mod- els than any other vendor – physical, virtual, cloud, and as-a-Service, across the largest product portfolio – span- ning network security and SD-WAN, switching and wireless access, network access control, authentication, public and private cloud security, endpoint security, and AI-driven ad- vanced threat protection solu- tions – all built on a common operating sys- tem, Fortinet empowers orga- nizations of any size to secure and simplify their IT infra- structure. SMS, WhatsApp, Apple Business Chat, Facebook Messenger and in-app com- munications. Due to rising customer expectations, the quality of those in- teractive experiences is more import- ant than ever before. IMImobile orchestrates, automates, monitors and delivers the customer interactions that drive the best expe- riences. By combining IMImobile’s solution with Webex Contact Center, Cisco will be able to provide a robust Customer Experience as a Service (CXaaS) offer. This new offering will bring together cloud contact center, artificial intelligence, experience man- agement, collaboration and Commu- nications Platform as-a-Service to create a single solution that will give organizations the ability to provide the exceptional experiences that custom- ers expect.  John Maddison, Fortinet Businesses need to make richer con- nections with their customers through the channel of their choice. This means going beyond email, voice and chat to enable communications on the most popular digital channels like Cisco has announced the completion of the acquisition of IMImobile. IMI- mobile is a leading global provider of cloud communications software and services that manage business-critical interactions at scale. Key features of FortiOS 7.0 among many include: • Zero Trust Network Access for Remote Access and Application Control:  FortiOS 7.0 enables every FortiGate customer to employ Zero Trust Network Access (ZTNA) capa- bilities out of the box, making For- tinet the only vendor to enable fire- wall-based ZTNA. ZTNA enabled by FortiOS 7.0 improves user experi- ence by supporting the evolution of better remote access to replace tradi- tional VPN. • Consistent Security Everywhere with SASE: Fortinet gives enterprises the flexibility needed to enable their workforce to work from anywhere with consistent, enterprise-grade se- curity delivered on-premises – and now, via cloud-based SASE consump- tion (Security-as-a-Service). • New Self-Healing SD-WAN Ca- pabilities:  Fortinet’s leading Secure SD-WAN solution now includes self-healing capabilities through adap- tive WAN remediations to make the application experience more resilient. • Expanding the LTE Edge with 5G:  Fortinet is extending network connectivity and security beyond the WAN Edge with innovations in 5G and LTE that improve wireless network performance and increase resiliency. With a diverse Wireless WAN and LTE offering, organiza- tions can achieve secure, scalable, and highly available network con- nectivity anywhere. FortiOS 7.0 will be available at the end of Q1 2021. “Customer expectations are rising, proving every interaction matters for the brand and the end-user experi- ence. Customers want delightful expe- riences where they can have two-way interactions with a business exactly when they need to, on the channel they prefer, without having to wait or jump through hoops to prove who they are, and without having to repeat themselves. With the right technology, world class brands can and must pro- vide this level of easy and effortless in- teraction. The addition of IMImobile to Cisco will be integral to delivering on the promise of delightful and en- gaging customer experiences,” said Jeetu Patel, Senior Vice President and General Manager of Cisco’s Security and Application business. The IMImobile team joins Cisco’s Contact Center business unit. New innovations in FortiOS 7.0 continue Fortinet’s commitment to delivering a cybersecurity platform that expands across the entire digital attack surface.”
  • 4. For more information, please write to sales.value@redingtonmea.com 4 Cambium Networks Unveils Gigabit Outdoor Point to Point Solution Cambium Networks has announced the new ePMP Force 400 series point to point system with gigabit speed fixed wireless connectivity in the Sub-6 GHz spectrum. Service pro- viders and enterprises can rapidly extend connectivity and expand ca- pacity without the cost of licensed spectrum, expensive subscriptions or trenching fiber. Network operators can extend cover- age with cost-effective backhaul for enterprise access, fiber extensions, Wi- Fi access or CCTV networks with the ePMP Force 400’s flexible hardware design, 80 MHz channel support and improved over the air efficiencies pro- viding up to 1 Gbps speed. The ePMP an integrated Small Form-Factor Plug- gable (SFP) port and optional Gigabit Passive Optical Networks (GPON) Optical Network Unit (ONU) module, the ePMP Force 425 also makes a great fiber extension to reach places where fiber cannot be cost justified. “Cambium Networks listens to ser- vice providers and enterprise network operators, and we are pushing the en- velope to develop affordable gigabit wireless solutions that deliver a low total cost of ownership,” said Sakid Ahmed, General Manager of ePMP and cnVision business for Cambium Networks. “The ePMP Force 400 se- ries, leveraging a   leading 802.11ax technology platform from Qualcomm ePMP Force 400 enables service providers and enterprises to rapidly build affordable gigabit speed wireless bridges and campus area networks using unlicensed spectrum. Force 425 is ideal for service providers looking to deliver high-capacity access services to residential and business customers. It also serves as a low-cost backhaul for MicroPoP’s and outdoor Wi-Fi access points that require high capacity at moderate range without the overhead of licensed microwave. With New specializations, incentives and enablement offer partners the flexibility to differentiate and meet customers’ needs. Palo Alto Networks Launches NextWave 3.0 specializations include corresponding partner training and certifications. Enhance partner profitabili- ty  with three new specialization incentives  for Prisma SASE,  Prisma Cloud and Cortex XDR/XSOAR deals, along with other new incentives, deal boost and new rebates for its Next- Wave Diamond Innovator partners.  Expand partner opportunities  by boosting existing deal referral incen- tives on all Palo Alto Networks prod- ucts, extending partner-delivered sup- Palo Alto Networks has unveiled NextWave 3.0, a significant set of en- hancements, incentives and training to its NextWave Partner Program. Designed to help partners leverage all of Palo Alto Networks technolo- gies, NextWave 3.0 will help partners differentiate their services, build new security expertise and grow profitable businesses as they meet customers’ needs in a dynamic security market.    As digital transformation fuels the demand for specialized security ex- pertise and creates a new economy of services, Palo Alto Networks is com- mitted to delivering the products, programs and resources to enable its NextWave partners. Developed in consultation with the company’s part- ners, NextWave 3.0 will:   Enable differentiation with new spe- cializations. Partners can build their security expertise through three new Prisma SASE (Prisma Access and Prisma SD-WAN, formerly CloudGe- nix), Prisma Cloud and Cortex XDR/ XSOAR specializations. These new portacrossmoreofPaloAltoNetworks› technologies and offering new educa- tion credits. Further, NextWave part- ners can now resell Prisma Cloud via a two-tier go-to-market strategy. Empower partner success. NextWave 3.0 includes a host of new enablement resources and ways for partners to earn or maintain NextWave status, expand- ing Certified Professional Services cer- tification to include the new special- izations, Technology Education credits and technology adoption discounts.   “The future of our business and that of our partners are fundamentally linked,” said  Karl Soderlund, Senior Vice President of Worldwide Chan- nels. “The NextWave partner of tomor- row will enable digital transformation for our customers by embracing new technology, offering product-specific expertise, and leading with services. NextWave 3.0 helps our partners do just that. It is the most sweeping set of enhancements we have done to help our partners become security experts across our entire technology portfolio.”   Palo Alto Networks NextWave partner program includes approximately 6,500 partners who help 80,000 customers around the world succeed with the company’s technologies. In FY’20, 900 NextWave partners doubled their busi- ness through Palo Alto Networks. >> From page 1 platform software, enterprise grade security, and applications to the edge and disconnected locations with Roving Edge Devices, ruggedized, portable, scalable server nodes. It enables customers to operate cloud applications and workloads in the field, including machine learning inference, real-time data integration and replication, augmented analytics, and query-intensive data warehouses. In addition, it delivers cloud comput- ing and storage services at the edge of networks for government and enter- prise organizations, enabling low-la- tency processing closer to the point of data generation and ingestion, which provides timely insights into data. Oracle Roving Edge Infrastructure is a fully mobile, connection-indepen- dent extension of customers’ Oracle Cloud Infrastructure (OCI) tenancy with a similar interface and work- flow to provide a consistent, unified experience. An Oracle RED device is equipped with high-performance hardware including 40 OCPUs, an NVIDIA T4 Tensor Core GPU, 512 GB RAM, and 61 TB of storage, and can be clustered into groups of 5 to 15 nodes in a single cluster, starting at $160 per node per day. Oracle... Technologies, builds on top of the field proven ePMP fixed wireless ar- chitecture, and expands fixed wire- less broadband capability without the overhead of licensed spectrum.” The ePMP Force 400 is a global prod- uct supporting specific channels dependent on local country regula- tions. The system includes an SFP port making it easy to extend the fiber network. With an innovative optional range extender attachment, the ePMP Force 425 can offer an addi- tional 6 dBi of gain without installing a completely new dish. The new radios  support  LINKPlanner planning soft- ware,  cnHeat heatmapping modeling tool, and the cnMaestro management system. The radios are IP67 rated for rugged outdoor environments. The ePMP Force 400 is available in two variations: Force 425 – equipped with a 25 dBi integrated dish antenna and Force 400C – connectorized with two RP-SMA RF interfaces for dish or horn antennas. The NextWave partner of tomorrow will enable digital transformation for our customers by embracing new technology, offering product-specific expertise, and leading with services.”
  • 5. For more information, please write to sales.value@redingtonmea.com 5 Check Point Software Launches Unified Security Solution Harmony Citrix Tackles Employee Well-Being Check Point Software Technologies has launched Check Point Harmony, the first unified solution to enable secure connectivity to any resource anywhere and give total endpoint protection for users on any device.  Harmony secures both corporate and BYOD devices, and internet connec- tions from known and zero-day at- tacks, while giving Zero-Trust access to business applications in a single, easy to manage solution. Citrix Systems has announced the availability of new well-being capa- bilities within  Citrix Workspace  that companies can use to help employees better manage the pressures and com- plexities of the workday so they can be and do their best. “Traditionally, companies have fo- cused on the physical well-being of their employees and viewed the other aspects as a bit taboo. But the pandemic has changed this,” said Donna Kimmel, Executive Vice Pres- ident and Chief People Officer, Citrix. “Companies are now having more holistic conversations that cover the mental, spiritual, and emotional as- new Harmony Browse uniquely pro- vides secure, fast and private web browsing by inspecting all SSL traf- fic directly on the endpoint without adding latency or re-routing traffic through a secure web service. • Secure remote access from any de- vice, anywhere:  Harmony Connect securely connects any user or branch to any resource, supporting client- less Zero Trust Network Access from any browser. • Protects users’ email and produc- tivity apps: Harmony Email & Office secures users’ email clients and, gives complete protection for Microsoft Office 365, Exchange, Google G Suite and more. • Total endpoint and device securi- ty: Harmony Endpoint protects users’ PCs from ransomware, phishing, and malware, and minimizes breach im- pact with autonomous detection and response capability. Harmony Mobile secures employees’ mobile devices against malicious apps and network or OS attacks. And there is incentive for them to do so. The World Health Organization estimates that depression and anxiety disorders cost the global economy $1 trillion each year in lost productivity. With Citrix, companies can create the space people need to be well and succeed. Using Citrix Workspace, they can deliver a secure, reliable and consistent experience that removes the noise and distractions from work, enabling employees to focus, innovate and create value. And, leveraging new microapp capa- bilities within the solution, they can seamlessly integrate well-being func- Harmony is the industry’s first unified solution for remote work, providing the highest level of security protection and eliminating management complexity. Company extends capabilities within Citrix Workspace to help organizations create the space people need to be well and succeed. Check Point Harmony - unified security solution for users, devices and access Check Point Harmony addresses re- mote work challenges by unifying endpoint, browser, email and remote access security components to protect all user devices and the enterprise networks they connect against known and unknown threats.  Harmony in- tegrates key security capabilities in a single solution to deliver: • Complete web security:  As a core component of Harmony, the pects of well-being because they real- ize that they must create a workspace that empowers their people to be well on all fronts.” “The move to mass remote work- ing created security gaps in organ- isations’ security infrastructures that cannot easily be addressed with multiple different point prod- ucts from several different security vendors,” said  Rafi Kretchmer, VP Product Marketing  at Check Point Software. “Harmony closes these gaps with unified, multi-layered security and prevention technol- ogies, blocking against all exploit techniques across all attack vectors. This protects the enterprise´s net- work end to end, ensuring uncom- promised security for the new ‘work from anywhere’ enterprise environ- ment, with easy deployment and single-console management.” Check Point Harmony is easy to de- ploy with a simple per-user pricing model and is managed via a cloud service, enabling user-centric securi- ty policies to be applied across orga- nizations’ environments. Harmony closes these gaps with unified, multi-layered security and prevention technologies, blocking against all exploit techniques across all attack vectors.” Citrix Workspace can deliver a secure, reliable and consistent experience that removes the noise and distractions from work, enabling employees to focus, innovate and create value. tionality into the workspace and make it part of how they work. The easy-to- use, low-code tools enable companies to automatically surface relevant con- tent and resources to support employ- ees and deliver it to any device. And they can be used to drive vital tasks associated with well-being and make it part of the workday such as con- ducting quick pulse surveys to track and improve employee happiness and well-being or sharing positive news to increase employee morale. Customers will also be able to add new functionality through a growing eco- system of Citrix partners or build new microapps themselves to adapt the well-being capabilities to meet chang- ing needs. The Citrix well-being capabilities are available for use with immedi- ate effect.
  • 6. For more information, please write to sales.value@redingtonmea.com 6 CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads lations with intelligent monitoring that detects misconfigurations, vul- nerabilities and threats, and deliv- ers guided remediation that equips developers with guardrails to avoid costly mistakes.   “We continue to deliver the broad- est range of cloud security capabili- ties in a single cloud-native platform for on-prem, private, public, hybrid and multi-cloud environments that scales,” said Amol Kulkar- ni, Chief Prod- uct Officer for CrowdSt r i ke. “CrowdStrike’s Security Cloud is one of the largest deploy- ments in the world, providing CrowdStrike has announced expand- ed  Cloud Security Posture Manage- ment  (CSPM) and  Cloud Workload Protection (CWP) capabilities for the CrowdStrike Falcon platform to deliver greater control, visibility and security for cloud workloads and cloud-native applications from build to runtime.  The expanded CSPM and CWP ca- pabilities for the CrowdStrike Fal- con platform identify and remediate vulnerabilities from development to production for a wide variety of cloud environments, including containers.  With the incorporation of frictionless security and automated protection early in the continuous integration/ continuous delivery (CI/CD) pipe- line, DevSec- Ops teams are empowered to deliver produc- tion-ready ap- plications with minimal impact to build cycles. A d d i t i o n a l l y, the new features will help organi- zations prevent compliance vio- New capabilities bring increased protection for cloud applications, reducing the attack surface and identifying vulnerabilities before deployment. a spike in cryptocurrency prices, it may be more profitable for them to infect some devices with miners. As a result, we see that the total number of DDoS attacks in Q4 remained quite stable. And we can predict that this trend will continue in 2021,” said Alexey Kiselev, Business Development Manager on the Kaspersky DDoS Protection team. To stay protected against DDoS at- tacks, Kaspersky experts offer the fol- lowing recommendations: • Maintain web resource operations by assigning specialists who understand how to respond to DDoS attacks • Validate third-party agreements and contact information, including those made with internet service providers. This helps teams quickly access agree- ments in case of an attack Kaspersky: DDoS Attacks in Q4 2020 Dropped by a Third Compared to Q3 • Implement professional solu- tions to safeguard your organi- zation against DDoS attacks. For example,  Kaspersky DDoS Protec- tion combines Kaspersky’s extensive expertise in combating cyberthreats and the company’s unique in-house developments The number of DDoS attacks detected by Kaspersky DDoS Prevention in Q4 2020 is 31% less compared to Q3 2020. This drop can be connected to the growing interest in cryptocurrency mining, said Kaspersky. us a unique vantage point in support- ing organizations’ shift to cloud-na- tive architectures and their adoption of development and IT operations (DevOps). The new capabilities se- cure development and deployment of applications in the cloud with greater speed, efficiency and confidence.” The new Falcon Horizon CSPM capa- bilities include cloud-native security posture management for multi-cloud environments, monitoring cloud iden- tities for least privileges and ensuring continuous compliance. The new Falcon Cloud Workload protection capabilities include broad support for container runtime secu- rity, identifing security threats prior to running containers in production, stopping threats when containers are most vulnerable, during runtime and uncovering hidden threats. As people began to spend more time online in 2020, it resulted in a boom of DDoS attacks. And in the fourth quar- ter, attacks on educational institutions continued globally.  Online gaming services also suffered DDoS attacks.  However, in Q4 2020 there were only 10% more attacks than in Q4 2019. And compared to Q3 2020, the num- ber of attacks in Q4 2020 fell by 31%, while Q3 2020 also saw a drop com- pared to Q2. Experts suggest that this can be caused by a surge in cryptocurrency costs. As a result, cybercriminals may have had to ‘re-profile’ some botnets so that C&C servers, that are typically used in DDoS attacks, could repurpose infected de- vices and use their computing power to mine cryptocurrencies instead. This is further proved by KSN statistics. Throughout 2019, as well as in the be- ginning of 2020, the number of cryp- tominers was dropping. However, from August 2020 the trend changed, with the amount of this form of malware increas- ing slightly and reaching a plateau in Q4. “The DDoS attack market is currently affected by two opposite trends. On the one hand, people still highly rely on stable work of online resources, which can make DDoS attacks a common choice for malefactors. However, with Amol Kulkarni, CrowdStrike The new capabilities secure development and deployment of applications in the cloud with greater speed, efficiency and confidence.” Maintain web resource operations by assigning specialists who understand how to respond to DDoS attacks.
  • 7. For more information, please write to sales.value@redingtonmea.com 7 Nutanix has announced additional ransomware protections in the compa- ny’s cloud platform. These include new threat monitoring and detection, as well asmoregranulardatareplicationandro- bust access controls all natively built into theNutanixstack.Thesenewcapabilities build on Nutanix’s rich data services for network security, files and objects stor- age, virtualization, and business conti- Nutanix Extends Ransomware Protections to Help Secure Customers’ IT Environments leverage the following features as part of a complete data protection solution: •Eliminatedowntimeandminimizedata loss for Tier-1 VMware workloads with built-in CDP and achieve immediate re- coveries to a latest state or desired point in time providing the best recovery point objectives (RPOs). • Keep backups safe with immutable, hardened Linux repositories compliant with SEC 17a-4(f), FINRA 4511(c) and CFTC 1.31(c)-(d) regulations, preventing encryption by ransomware, accidental or malicious deletions; based on gener- al-purposeservers,withoutanyhardware lock-in. • Reduce the costs of long-term data ar- chival and retention by up to 20 times and replace manual tape management New Veeam Backup & Replication v11 Now Available ments that are prime targets for initial ransomware infection and spread. Closer to the application layer, the Nu- tanix cloud platform now also includes native ransomware detection for file storage services within Nutanix Files. File analytics, which is a feature includ- ed with Files, now detects abnormal and suspicious access patterns and identifies known ransomware signatures to block data access in real-time. To further protect application data from ransomware attacks, the Nutanix cloud platform now includes new features within the object storage solution, Nu- tanix Objects. Objects includes more granular permissions to access object data for primary and secondary storage. Specifically, Nutanix Objects now offers the ability to configure Write Once Read Many (WORM) policies for individual files and objects selected by an IT team to help guard against unauthorized de- letion or encryption of data, thwarting nuity to help enterprises prevent, detect and recover against ransomware attacks across multiple cloud environments. At a time when attacks are becoming even more common due to the rise of remote work, these capabilities make it easier to implement security and business conti- nuity best practices at the infrastructure level, rather than rely on a complex ma- trix of bolt-on security products. The Nutanix cloud platform now deliv- ersanomalydetectionbasedonmachine learning and IP reputation services with the company’s security networking op- erations and monitoring solution, Flow Security Central, a feature with Nutanix Flow. Flow Security Central helps iden- tify known attack vectors, including po- tential ransomware, at the network level before reaching the application and data layers.. Flow Security Central also moni- tors endpoints to identify traffic coming from disreputable locations, something especially helpful for defending Virtual Desktop Infrastructure (VDI) deploy- Hybrid and multicloud leader strengthens networking, storage and virtualization services. New 4-in-1 solution ​ combines backup, replication, storage snapshots and now, Continuous Data Protection (CDP). Rajiv Mirani, Nutanix Danny Allan, Veeam life cycle, while handling all the com- plexities of a multi-cloud environment for AWS, Microsoft Azure and Google Cloud Platform. “Veeam released V10 with more than 150 new enhancements just 12 months ago, and now has more than 700,000 downloads. Being able to launch the next version — Veeam Backup & Rep- lication v11 — with an additional 200 new and powerful backup, cloud, DR, security and automation enhancements speaks volumes to Veeam’s speed of in- novation, as well as our strong commit- ment to the needs and data reliability demands of our customers and part- ners,” said Danny Allan, Chief Technol- ogy Officer and Senior Vice President of Product Strategy at Veeam. New Veeam V11 enables businesses to Veeam Software has announced gen- eral availability of new Veeam Backup & Replication v11, enabling the most advanced data protection solution for cloud, virtual, physical and enterprise workloads. With more than 200 new features and enhancements, the sin- gle solution for comprehensive data management is powerful and flexible enough to protect each phase of the data with new native support for Amazon S3 Glacier (including Glacier Deep Ar- chive) and Microsoft Azure Archive Storage through end-to-end backup life cycle management with Veeam Scale-out Backup Repository Archive Tier. • New support for Google Cloud Storage for Veeam Scale-out Backup Repository Capacity Tier, providing greater choice of hot cloud object storage targets. • Achieve the lowest recovery time objec- tives(RTOs)with powerfulinstantrecov- ery for Microsoft SQL, Oracle databases and  NAS file shares from  the  pioneer of Instant VM Recovery. • Delivers end-user data backup for any macOS device, joining existing Veeam Agents  for Microsoft Windows,  Linux, IBM AIX and Oracle Solaris. • Leverage the services, solutions and ex- pertise needed to maximize the value of V11 by teaming up with Veeam-powered service providers for a fully managed backup experience. New Veeam Backup & Replication v11 is now available for download. many common ransomware attacks. Lastly, the Nutanix platform now deliv- ers support for Microsoft Windows Cre- dential Guard for virtual machines and virtual desktops running on the AHV hypervisor. Credential Guard adds op- erating system (OS) protection from malware using credential theft attacks on Microsoft OS environments, a com- mon vector used by ransomware to gain administrative privileges. Rajiv Mirani, Chief Technology Officer at Nutanix, said, “Enterprises need a defense in depth approach to security, starting with their IT infrastructure. However, the right security tools need to also be simple and seamless to imple- ment. Nutanix delivers a strengthened cloud platform out of the box, with an even richer set of ransomware protec- tions available now.” All new features are currently available to customers.
  • 8. For more information, please write to sales.value@redingtonmea.com 8 Veritas Technologies has announced the launch of Veritas NetBackup 9. NetBackup 9 delivers significant new features to provide customers with ad- ditional choices for deployment across edge, core and cloud, while increasing operational simplicity. NetBackup 9 has been designed to answer the needs of customers op- erating demanding multi-cloud data centers with heterogenous environ- ments that require a data protection platform without compromise. With NetBackup 9, Veritas now adds Flex Scale, offering customers a scale-out deployment option based on Veritas’ validated reference design. This new architecture provides a hypercon- verged approach to data protection that delivers cloud-like simplicity and scalability in an on-premises data center. With NetBackup Flex Scale, businesses no longer need to forecast capacity needs and provision in antic- ipation of future growth. Instead, they are able to simply add more nodes as required. By empowering enterpris- es to extend their standardization on Veritas to include scale-out, customers can be freed from the management complexity associated with disparate point solutions for data protection. Deepak Mohan, Executive Vice Presi- dent, Products Organization at Veritas, said,“VeritasNetBackup9withFlexScale gives customers freedom of choice with the most flexible deployment models in the industry today by empowering them to protect over 800 workloads in a scale- out, scale-up, or cloud storage model.” NetBackup 9 is already available in more flexible deployment modes than is offered by any player in the industry. With the inclusion of its new scale-out VMware Refreshes vRealize Cloud Management Veritas Introduces NetBackup 9 hyperconverged mode, Veritas contin- ues to expand customer choice while reducing complexity, cost and risk. The launch of NetBackup 9 further reinforces Veritas’ focus on abstract- ing the complexity of enterprise IT. NetBackup streamlines management of the most dynamic environments through orchestrated automation of discovery, protection, and recovery. NetBackup 9 also includes new fea- tures to simplify enterprise data pro- tection for mission-critical OpenStack environments. Utilizing OpenStack native APIs, NetBackup 9 delivers seamless integration, multi-tenant controls, and intuitive self-service management. In addition to offering scalability and performance benefits, NetBackup 9 can dramatically reduce costs and the burden of administrative management while ensuring high-per- formance backup and recovery opera- tions for OpenStack, both on-premise and in public clouds. NetBackup 9 is available now. ize Log Insight Cloud, and VMware vRe- alize Network Insight Cloud. VMware vRealize Automation 8.3 de- livers enhanced solutions for custom- ers’ most critical automation use cases including self-service multi-clouds, network automation, and DevOps with actionable insights, greater secu- rity and improved performance Powered by AI and predictive analytics, vRealize Operations delivers continuous performance, capacity and cost optimi- zation, proactive planning, intelligent remediation and integrated compliance VMware vRealize Log Insight Cloud in- troduces enhanced machine learning (ML) analytics for errors and Knowl- edge Base (KB) correlation, ERI-FIPS compliance, VMware HCX and VM- ware Site Recovery Manager log integra- tion, and native data archiving support. VMware  vRealize Network Insight 6.1 and VMware vRealize Network In- sight Cloud provide an end-to-end net- work view by learning from multiple data sources across virtual and physical infrastructure. Using ML for applica- tion discovery as well as assurance and verification capabilities, vRealize Net- work Insight makes it easier to plan, build, and manage complex networks VMware Skyline  provides proactive intelligence across customers’  VM- ware  environments to help prevent issues and unscheduled downtime. The latest release of Skyline Advisor provides expanded visibility into the vulnerabilities Skyline identifies and improved Support Request visibility enables easier use of the Log Assist au- tomated log upload feature VMware vRealize Automation 8.3, VMware vRealize Operations 8.3, VM- ware vRealize Log Insight 8.3, VMware vRealize Suite Lifecycle Manager 8.3 VMware vRealize Network Insight 6.1 and Skyline Advisor are available. The new capabilities and enhancements to VMware vRealize Operations Cloud, VMware vRealize Log Insight Cloud and VMware vRealize Network Insight Cloud are also available. Purnima Padmanabhan, Senior Vice President and General Manager, Cloud Management Business Unit, VMware. “As more businesses pursue cloud as an agility strategy, vRealize Cloud Man- agement helps customers run their ap- plications anywhere while maintaining consistent operations and common governance across all environments.” VMware vRealize Cloud Management enables customers to consistently deploy and operate their applications, infra- structure, and platform services, from the data center to the cloud to the edge. It helps them accelerate innovation with quick and easy access to services, gain ef- ficiency by improving visibility and auto- mation, and improve control while mit- igating risk through unified operations and governance. Vmware has also intro- duced new releases including VMware vRealize Automation 8.3, VMware vRe- alize Operations 8.3, VMware vRealize Log Insight 8.3, vRealize Suite Lifecycle Manager 8.3 VMware vRealize Network Insight 6.1 and VMware Skyline; along withenhancementsacrossVMwarevRe- alize Operations Cloud, VMware vReal- VMware vRealize Cloud Management enables customers to consistently deploy and operate their applications, infrastructure, and platform services, from the data center to the cloud to the edge. NetBackup 9 has been designed to answer the needs of customers operating demanding multi-cloud data centers with heterogenous environments that require a data protection platform without compromise. Vmware has announced innovations across its  VMware vRealize Cloud Managementportfolio of on-premises and Software as a Service (SaaS) solu- tions. The new and enhanced capabil- ities combine to enable customers to more securely deploy and operate their hybrid and multi-cloud environments. “In today’s uncertain world, enterpris- es are seeking to increase agility and efficiencies to remain competitive and to drive faster business growth,” said Deepak Mohan, Veritas Purnima Padmanabhan, VMware
  • 9. For more information, please write to sales.value@redingtonmea.com 9 14 million devices today, which are used to modernize supply chain and warehousing operations. As part of this, Ivanti Wavelink has validated over 50 enterprise rugged mobile devices with 10 device manufacturers, including Ze- bra, Honeywell, Apple, Samsung, Point Mobile, CypherLab, and JLT Mobile. Ivanti Wavelink, the supply chain busi- ness unit of Ivanti, has announced the launch of Ivanti Wavelink Velocity Solutions Directory. The new directo- ry enables device manufacturers offer- ing solutions for the supply chain and warehousing industries to now rapidly validate their solutions for the Ivanti Wavelink Velocity platform. It also pro- Ivanti Wavelink Expands Velocity Platform General Manager, Ivanti Wavelink. “This is a competitive advantage we extend to device manufacturers that accelerates engagement and improves their time-to-revenue by eliminating what is typically a lengthy validation process. Now, partners and customers are able to immediately leverage their Ivanti Wavelink Velocity validated de- vices within their environments.” Through the Ivanti Wavelink Solutions Directory, hardware and device man- ufacturers can rapidly validate their rugged industrial and consumer-grade devices running Android, iOS or Win- dows-based operating systems. For solution provider partners and customers, the Ivanti Wavelink Veloc- ity Solutions Directory provides a sin- gle portal for accessing fully validated Ivanti Wavelink devices. Ivanti Wave- link Velocity is deployed on more than vides a centralized portal where Ivanti Wavelink solution partners and cus- tomers can gain access to information on validated devices. “Ivanti Wavelink is proud to be the first to offer this type of solutions directory to our partners and customers,” said Brandon Black, Vice President and New Solutions Directory and Rapid Validation Capabilities enable device manufacturers serving the supply chain and warehousing industries to self-validate solutions. CyberArk Delivers New Identity Security Offerings to Drive Customer Success Company introduces new subscriptions, programs and tools to complement the industry’s most comprehensive identity cecurity capabilities. • CyberArk Identity Security As- sessment Tool – The Assessment Tool is fully aligned to the CyberArk Blueprint so organizations can assess and track their level of alignment with Identity Security best practices and compare their program maturity with peers across multiple parameters such as industry, region and organi- zation size. Identity Security Customer Success Plans – Success Plans are strategically packaged resources, guidance and ex- pertise to help customers successfully execute an Identity Security program while getting the most value from their solutions as quickly as possible. Udi Mokady, Chairman and CEO, CyberArk, said, “CyberArk’s privi- lege-led approach to Identity Security is designed to help enterprises adapt and embrace a risk-based strategy for defending against identity-based attacks as they support a distributed workforce, embrace the cloud and new cloud technologies, and deliver positive customer experiences.” With CyberArk Identity Security, or- ganizations can secure access across any device, anywhere, at just the right time through: • CyberArk Privileged Access solu- tions secure privileged credentials wherever they exist – defending against advanced attacks, speeding digital transformation and helping achieve compliance. • CyberArk Workforce Identity and Customer Identity solutions contin- uously monitor behavioral signals to make sure users are who they say they are. • CyberArk Secrets Management solutions enable applications and automation tools to securely access sensitive resources at scale – without burdening developers. individual identities – human or ma- chine – throughout the cycle of access- ing critical assets. The new announcements include: • Identity Security Subscription Offerings – Available in three new subscription offerings, customers can benefit from the combined power of Identity as a Service (IDaaS) and the industry’s leading Privileged Access Management solution in offerings that make the most sense for their specific users: Workforce User, External Ven- dor or Privileged User. • CyberArk Blueprint for Identity Security Success – The CyberArk Blueprint has evolved to expand prescriptive guidance across all identities and is centered on core Identity Security best practices gained through years of hands-on customer engagements. CyberArk has announced the avail- ability of new subscriptions, programs and tools designed to accelerate or- ganisations’ Identity Security initia- tives and time to business impact. These new offerings complement Cy- berArk’s Identity Security portfolio, which is centered on Privileged Access Management and focuses on securing Through the Ivanti Wavelink Solutions Directory, hardware and device manufacturers can rapidly validate their rugged industrial and consumer-grade devices running Android, iOS or Windows-based operating systems.
  • 10. For more information, please write to sales.value@redingtonmea.com 10 For more information, please write to sales.value@redingtonmea.com 09 / 2020 | 11 @redingtonvalue
  • 11. For more information, please write to sales.value@redingtonmea.com 11 For more information, please write to sales.value@redingtonmea.com 09 / 2020 | 11 @redingtonvalue
  • 12. Empowering remote work with Microsoft Teams With more people working from home, fostering virtual connection is crucial. Empower your team to stay connected and keep business running smoothly using Microsoft Teams. EMBRACE ONLINE SHARE CONTENT STAY FOCUSED STAY CONNECTED Include an online link Share your screen Be mindful and inclusive Collaborate on ideas Turn on video Make up for missed hallway talk Blur your background Bring the team together Record the meeting Have fun! www.redingtonvalue.com sales.value@redingtonmea.com H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE