integratorme july2013

36

Upload: jns-media-international-mfze

Post on 11-Mar-2016

229 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Integratorme july2013
Page 2: Integratorme july2013

Mobile security, simplified.BYOD (Bring Your Own Device) means employees can work from anywhere, on whatever device they choose. It makes life easier for them, but IT security more complicated for you.

Now there’s a simple solution to BYOD complexity. With Sophos EndUser Protection you get complete mobile, endpoint, data and web security licensed by the user—not the device.

One user, multiple devices, all in one license—start your free trial today.

Sophos Middle East | Alpha building - office #205 | PO box 500469 | Dubai internet city | Dubai | UAE | www.sophos.com

Call +971 4375 4332 or email [email protected]

Page 3: Integratorme july2013

Contents

R. NarayanManaging Editor

Disclaimer: While the publishers have made every attempt possible to get accurate information on published content in this handbook they cannot be held liable for any errors herein.

Published by: JNS Media International MFZEP.O. Box: 121075, Montana Building 404, Zabeel Road, Near GPO, Karama, Dubai-UAETel: 04-3705022 Fax: 04-3706639

Editorial

Founder & CEO: Vivek Sharma Managing Editor: R. NarayanAssistant Editor: David NdichuArt Director: Faiz Ahmed Sr. Sales Manager: R. Subramanyan Sales Coordinator: Smitha Jithesh

The SMB segment’s attitude towards adoption of new Technologies seems to be more assured than in the past

as they look to reap the benefits of IT as a Business enabler and they are willing to look beyond the hype, at the core benefits that these investments will bring them. In moving into the deployment phase of new Technologies such as Big Data, they would need a lot of consultation from their trusted advisors from the channel. There would be certainly many undefined areas which need to be negotiated when it comes to custom designing Big Data solutions like identifying the right data sources pertaining to the actual needs of their Business model.

A Techaisle study reveals that more number of global mid-market companies are in the phase of either evaluating or even investing in Big Data investments. While 43 % of companies in the segment are in either of the two phases, nearly 18% seem to have invested in Big Data deployments already as they realize the significance of extracting the business insights that can give them the competitive edge from examining various data sources.

More and more, Technology companies are turning their attention towards the SMB segment as they design solutions. The momentum will be with companies that come up with innovative solutions that are tailored for the SMB segment. And it goes without saying that there is a great advantage in coming up with an all-in-one plug and play solution that removes the hassle of intensive on site systems support.

In this context, Dell’s unveiling of the PowerEdge VRTX, a converged IT solution designed specifically for remote and small office environments, with enterprise-class capabilities seems a very appropriate introduction. With servers, storage, networking and management converged into a single compact chassis, PowerEdge VRTX uses significantly fewer cables, saves time compared to installing individual task-specific systems and also considerable space.

Technologies gain traction in SMB Cover Feature - 18

Unstoppable BYODWhile BYOD becomes a norm, BYOD programs will be a necessity for even SMB companies lest they incur Business losses due to potential data breaches.

News In Detail - 12

Microsoft and partners highlight SMB opportunities

In Focus - 14

The Inaugural Integrator Gala Awards Ceremony successfully held

Techknow - 24

Future proofing securityJohn Spoor, Regional Manager, WatchGuard, Middle East Africa discusses how WatchGuard is geared to tackle emerging cyber threats with the next generation firewall appliances it provides

Point2Point

An opportune pursuit - 25Sonia Sebastian, Business Unit Head - Security Surveillance at SNB Middle East elaborates on some key trends and the company’s focus

Wifi in the air - 26Khalid Laban, CEO, Oxygen Middle East speaks to The Integrator about the company’s focus on Wifi and BYOD solutions.

Ascending the Growth trajectory - 28Salman AL Kaldari, CEO of Mackeen Technology discusses how the company is forging ahead

Insight - 30

How to Make Big Data ConsumableMike Hibbert, General Manager, Infor Middle East discusses the significance of doing a pilot run before adopting a major Big Data initiative .

Regulars

News BytesEyetechStats & Trends

Page 4: Integratorme july2013

4 | July 2013

News Bytes

Spectrami has entered into an alliance with Actifio to offer a Customer Experience Center (CEC)facility for Actifio’sCopy Data Storage platform. The facility will help Spectrami’schannel partners and end-users in the Middle East region.

The brand new facility in Dubai will work as a point of reference for companies that would like to understand the potential of Copy Data Storage technology, which will enable users to experience the unique simplicity of Actifio managing Copy Data Environments for VMWare, Oracle, SQL and Exchange.

The Customer Experience Center is fully equipped with anexperienced professional team that has the requisite skills, experience and expertise to service the requirements of partners and end-users on Actifio Copy Data Storage platforms.

Ash Ashutosh, CEO, Actifio said, “We have seen a huge momentum for copy data storage solutions in the Middle East region. We have chosen Spectrami as our strategic partner to establish ActifioCustomer Experience Center due to their excellent capabilities, execution and expertise.”

Prologix Distribution has announced the opening of its new division, PrologixComserve, specializing in RF communication services and solutions for telecom operators in the MENA region. PrologixComserve will extend the ongoing relationship with prominent telcos across the region by offering end-to-end solutions and support in the areas of network planning and design solutions, network optimization solutions, benchmarking, in building solutions, EMF testing, passive intermodulation testing, timing synchronization, transmission planning and professional telecom training.

Realizing that telecommunications companies have started shifting their interest towards RF managed services, PrologixComserve has evolved its offerings to cater to these new requirements. The division's RF network planning and design solutions pave the way for telcos to deliver new applications such as point-of-sale, VoIP and video on demand.

Aditya Sahaya, Director-Sales, Prologix LLC says the company has already started building up a healthy pipeline of projects. “PrologixComserve has already been selected by ZTE to install the solar panels in a project for a UAE telecom operator. We have also been chosen by a reputed systems integrator to conduct in-building design and validation for a regional telco. We are very happy with the response and results that we have seen in such a short time frame and can only expect that the booming telecom market will rapidly drive our business growth,” he said.

Imation, a global scalable storage and data security company, has launched its next generation object store, the NexsanAssureon secure automated archive solution. By cost-effectively consolidating storage tiers, securing data and simplifying storage management, the Assureon platform transforms the way organizations deploy and manage data archiving.

The Assureon solution brings advanced, secure automated archiving to mid-sized organizations and enterprises to optimize storage infrastructures and manage regulatory compliance. By deploying the Assureon solution, organizations can automate storage policies to encrypt, self-authenticate, self-manage, self-heal and self-configure storage for unstructured files and content.

Unlike other competitive archiving solutions, Assureon does not require that applications be customized to use proprietary APIs in order to store their data in the archive. Users do not need to learn new processes or change how they access data.

"The Assureon solution offers mid-sized organizations and enterprises a single, highly advanced, automated disk-archiving solution to secure and manage this data,” said Mike Stolz, vice president of marketing for Imation’s Nexsan storage solutions. “Administrators can deploy the Assureon solution to manage their entire data protection architecture, controlling all critical data protection functionality, while shrinking storage infrastructure and its associated costs.”

Spectrami unveils Actifio CEC facility

Prologix Opens New RF Division ‘PrologixComserve’

Imation's next generation Object Store

Page 5: Integratorme july2013

AVOID THE SECURITY PITFALLS OF BYOD

IT is challenged by a BYOD workplaceToday’s workforce increasingly relies on personal devices, including smartphones and laptops, to get the job done. IT departments are called on to adopt and enforce a BYOD strategy to make corporate resources available and maintain security without being the Internet Police.

Knowing that BYOD is here to stay, WatchGuard provides IT administrators with easy-to-use security services that businesses need in order to manage BYOD. WatchGuard enables you to:

• Focus on policy to determine which devices are allowed to access the network and which devices you will support

• Make sure employees understand the rules and the risks and that work life and personal life should be kept separate and IT should monitor activity.

• Define acceptable use in accordance to standard security practices, as it is critical to know in advance what your security policy is with regards to access controls

• Protect corporate data by limiting access using VPN• Application control strategies give more granular control, so it doesn't matter what device

the user is on, or what ports the application uses

WatchGuard solutions allow you to protect, and enforce policy for, your BYOD devices, while they are in your network, and gives you control over how devices are used.

Learn how to effectively secure your network and BYOD ecosystem with WatchGuard. Call us today at +971 55 882 9607 or email: [email protected].

Page 6: Integratorme july2013

6 | July 2013

News Bytes

Ipswitch File Transfer, the

trusted choice for managed file

transfer (MFT) solutions, has seen

increased demand for its secure

file transfer technology in the

region including Saudi Arabia.

The demand is being driven by

two factors: business awareness

of the need to securely manage

and govern data transfers and

protect valuable company

data; and local regulatory and

compliance requirements,

including new guidelines around

the secure transfer of personal

financial user data.

Ipswitch File Transfer’s

solutions are specially designed

to support enterprise application

integration, streamlined data

workflows and managed file

transfers. MOVEit is a managed

file transfer system that transfers

business files reliably and

securely, automates file-based

business workflows and provides

employees with an IT-approved

solution to send files. MOVEit

provides visibility and control

over all file transfer activity

and enables organisations to

confidently meet their SLAs and

compliance requirements.

Ipswitch File Transfer’s local

partner, StarLink — headquartered

in Dubai with an office in Riyadh

is responsible for distributing

Ipswitch File Transfer’s portfolio of

secure solutions in Saudi Arabia

and the Middle East.

Increased demand for Ipswitch File Transfer

ManageEngine, the real-time IT management company, announced the industry’s first enterprise search capability along with other major enhancements are now shipping in its integrated IT management solution, IT360. The latest version of IT360 makes big strides in little data by giving IT teams the power to search databases of any third-party IT management and business application. To push the unified IT management envelope even further, ManageEngine has reinforced IT360 with unified discovery, in-depth application monitoring, IP address management, switch-port mapping and project management features.

Unrelenting change in the business landscape is pressuring IT departments to deliver an unmatched user experience to internal and external customers alike. In response, IT teams need a complete, unified view of their network assets and the health of those assets, regardless of how many IT management applications inform that view.

“Now more than ever, IT departments need a single pane of glass that IT360 provides them to manage their entire IT infrastructure,” said Sridhar Iyengar, vice president of product management at ManageEngine. “The latest version of IT360 builds out our unified IT management vision with industry-leading features such as enterprise search and unified discovery and other functions that reduce operating costs while providing deeper, real-time visibility into the entire IT infrastructure from a single console.”

Cloud Technology experts, BRAMS has announced that it has appointed Prramhod Shetty as its Regional Sales Director, responsible for Sales and Marketing across the Middle East and (English speaking) Africa region. The announcement was made by Brahim Ben Lahmr, CEO, BRAMS, at a special presentation hosted by the company for select CIOs in Dubai.

Speaking on the occasion, Brahim added, “We have only just expanded our operations to the Middle East and set up offices in Dubai. As such, we are looking for experts in cloud computing in the Middle East to join the team. Prramhod fits the bill.”

Prramhod will work with the BRAMS management to help define the company’s Cloud Technology and Enterprise Search sales strategy for the new expanded operations in the Middle East and increase the BRAMS footprint across the region, including channel partnerships in key countries around the region.”

Before joining BRAMS, Prramhod served as Business Unit Head for Cloud Services and Service provider business at FVC.

ManageEngine delivers new version of IT360

BRAMS appoints Prramhod Shetty as Regional Sales Director

Page 7: Integratorme july2013

Original MOBOTIX images

MOBOTIXMOBOTIX

S15D FlexMount Camera

5MPSensor MxBus PoEUSB3MP

Image

Discreet. Flexible. Weatherproof.The Best MOBOTIX Image Quality Of All Time!With the S15D two sensor modules are connected to a concealable camera housing via cables up to two meters long. The latest 5MP image sensor technology used in the camera improves the frame rate and the live zoom feature. The maximum QXGA sensor module resolution (over 2.5 times more detailed than full HD) can also be used in the recording without any additional network load! The camera’s improved light sensitivity allows it to deliver top-quality color images, even at dawn. A black-and-white sensor module with QXGA resolution can be used at night.

• Decentralized complete system including memory, sensors and software (IP65)• State-of-the-art image sensor technology for excellent image quality both day and night• Recording without network load, with maximum QXGA resolution• New MxActivitySensor for camera-integrated motion analysis • Remote control function via iOS device and the free-of-charge MOBOTIX App

mx_Ad_S15_en_130618_200x275_SNB.indd 4 18.06.13 16:09

Page 8: Integratorme july2013

8 | July 2013

News Bytes

StorIT, a leading data storage specialist value added distributor, has signed a Distribution agreement with Supermicro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing. According to the terms of the partnership, StorIT will promote and distribute Supermicro’s complete range of high-performance computing (HPC) solutions across the Middle East and North Africa (MENA) region.

“Our partnership with

Supermicro will enable our reseller

partners to successfully address

the rapidly evolving opportunities

in the areas of Big Data, Cloud

Computing and Enterpise IT

Systems. By leveraging our strong

channel network across MENA,

we plan to grow Supermicro’s

business and market share

across this region,” said Suren

Vedantham, Group Managing

Director, StorIT Distribution fzco.

StorIT has plans for several

road shows and training

workshops for partners in different

cities in the next few months.

Supermicro appoints StorIT as distributor Spusht Technologies has signed a value added

distribution agreement with Spectra Logic, the leading

innovator in data archive and backup storage solutions.

As per the terms of the agreement, Spusht will promote

and distribute Spectra’s entire product range through an

extensive network of channel partners across the Middle

East region.

“Spectra Logic is a leading innovator in backup and

archival solutions and a market leader in tape storage.

We are happy to sign this distribution agreement with

Spectra as their products complement our existing

portfolio and add tremendous value to our solution offerings to our resellers. With this

partnership, we can now provide our channel partners with complete cost effective

and high performance data archiving and protection solutions to meet the needs of

every business. Our customers can also expect great performance, cost reduction and a

greener environment by creating the right balance between disk and tape for all storage

configurations,” says Keith Samuel, CEO Spusht Technologies.

Spectra Logic maintains a strong focus on automated tape library technologies

innovation. Its highly scalable storage systems perfectly align with the movement toward

increased data retention, which is driving the need for data storage systems that exceed

petabyte and exabyte capacities.

Kaspersky Lab announced the appointment of Westcon Middle East, a leading value-add

distributor of convergence, security, networking and mobility products and services,

across the Middle East, Pakistan and North Africa regions , as authorized Corporate

Distributor for Kaspersky Lab’s enterprise products and solutions across the GCC region.

Westcon Middle East will leverage its extensive network of over 1200 resellers

to further reinforce the growth of Kaspersky Lab’s enterprise business; in addition the

company will also represent Kaspersky Lab by extending Kaspersky Lab’s corporate

solutions directly to corporate customers with large networks.

Under this partnership, Westcon Middle East will be responsible for extending

Kaspersky Lab’s leading portfolio of corporate security solutions to an extensive network

of channel partners in the markets of UAE, Saudi Arabia, Kuwait, Qatar, Oman, Bahrain

and Yemen. In addition, Westcon Middle East will also invest in on groundpre-sales,

technical and maintenance resources to effectively support both new and existing

Kaspersky Lab customers in the GCC and Yemen.

Spectra Logic appoints Spusht Technologies as VAD

Kaspersky Lab appoints Westcon to boost Enterprise Business

Page 9: Integratorme july2013
Page 10: Integratorme july2013

10 | July 2013

News In-Detail

Lexmark International has recently been positioned an EMEA ‘Leader’ in the IDC MarketScapereport - EMEA Managed Print Services 2012 Hardcopy Vendor Analysis. The IDC MarketScape vendor analysis model evaluated the competitive fitness of companies offering managed print services (MPS) in the region.

Lexmark’s customer-focused MPS offerings provide an end-to-end approach to improving the enterprise print infrastructure and optimising business processes to enable organizations to become more efficient, effective, and differentiate themselves from the competition. Lexmark claims that seventy percent of the Top Global Retailers and sixty percent of the Top 10 Global Banks are its MPS customers.

“Our MPS offering is unique in that it focuses on our customer’s business and helping them to transform their business processes,” said Mike Rüschenbaum, Vice President & General Manager Lexmark EMEA “We believe IDC’s recognition confirms Lexmark’s MPS leadership, global capabilities and proven track record of providing MPS to the largest companies in EMEA and all over the world. ”

Comguard in association with EnGenius conducted a special training workshop for channel partners in UAE to educate and train on EnGenius wireless networking solutions. The workshop was held on 17th June 2013, at Four Points by Sheraton Hotel, Bur Dubai, Dubai, UAE, which is expected to be attended by 40 leading channel partners from all across the Emirates.

EnGenius iprovides feature-rich, long-range and enhanced wireless communications technology for datacom. The company boosts a wide range of wireless products for home and SMB customers.

Yuhan Wang, the Managing Director of EnGenius addressed the partners and made a presentation on Cost Effective Wireless principles, Project Planning and Implementation. The workshop includedhands on technical training on EnGenius products. The other key focus areas for the workshop was on training partners about system setup and configuration besides educating them about maintenance and troubleshooting. Senior executives from Comguard and EnGenius also updated channel partners on their Warranty and Support Services policies.

Fayaz Ahamed, Head- Wireless Division Comguard, said, “This workshop on EnGenius products and solutions is in line with our corporate policy to educate and enable partners to drive more business and open new streams of revenue for their business. The cost effective solutions from EnGenius offers a great opportunity for channel partners to address the fast growing SOHO and SME market in the country. ”

The enterprise business of Alcatel-Lucent signed a unique deal with Jumbo Electronics to refresh and renovate their Data Centre, LAN infrastructure and Wi-Fi Services. The announcement is a significant step for Alcatel-Lucent as it provides its services to one of the leading electronics retailers in the region.

The agreement will have Alcatel-Lucent upgrade and refresh Jumbo Electronics Data Centres, LAN infrastructure and add Wi-Fi services at their Dubai Headquarters. To complete this end-to-end solutions delivery, Alcatel-Lucent’s Premium business partner, Al Futtaim Technologies was chosen for deployment and maintenance of this network. The agreement is believed to be a major boost for Jumbo Electronics Data Centre, and will contribute to reduced costs, lower energy consumption and improved workflow.

Alcatel-Lucent has implemented the 9702e core switch into their Data Centre, which has all the servers available, The Omniswitch 6900 has been used as the TOR Switch (Top of Rack) to which the servers are connected. In addition there are 6450 switches in the LAN to which the users are connected and a AP105 with a 6000 series Wireless LAN controller, along with an Omnivista Network Management system.

Vikram Dhar, Enterprise Sales Manager, Alcatel-Lucent said, “ We are delighted to have the opportunity to work with Jumbo Electronics in the region. It gives ALUE the opportunity to showcase our innovative technologies especially in the Data Center Space. ”

Lexmark named EMEA Leader in IDC report

Comguard, EnGenius team up to train partners in UAE

Alcatel-Lucent to renovate Jumbo’s Data Centre & LAN Infrastructure

Page 11: Integratorme july2013
Page 12: Integratorme july2013

12 | July 2013

News In-Detail

Product Manager at Dell. The topics discussed

pivoted around how an SMB can increase profitability or expand into new markets by using technology. Panelists shared examples of initiatives and programs available in the UAE to facilitate SMB setup, enhance growth and help startups to succeed in a competitive environment. Some of Microsoft’s key initiatives include the ‘Tech Makeover’ Competition, the ‘Goodbye Windows XP. Hello Windows 8.’ current campaign, which is encouraging SMBs to welcome cloud technologies like Windows 8, Office 365 and Dynamics. The ‘Keep Your Business Moving’ Program provides free mentorship, product innovation updates to its SMB members and

technology, such as Office 365 and subscription-based Office at a reduced rate.

Speaking at the panel, Bruno Delamarre, Microsoft Gulf, said: “In line with the vision of transforming the UAE into one of the best countries in the world by 2021, Microsoft is dedicated to support the growth of the SMB sector here in the region. We believe that Cloud technology provides SMBs with solutions that reduce cost, enable collaboration and enhance productivity. We work closely with Dubai Internet City, Dell and du, our partners, to offer unique solutions that are accessible to startups and SMBs here in the UAE. We are grateful to our partners for their continued support and commitment to delivering

initiatives that support the development of SMBs.”

Cloud technologies, which are becoming increasingly popular with SMBs, offer the best solutions available today to solve critical issues, such as managing cash flow, cutting costs and increasing sales and productivity. Office 365, Microsoft Dynamics and Windows are technology solutions that business-class productivity and collaboration for Small and Medium Business organizations.

Speaking at the panel on the role that technology plays in an SME’s success, Basil Ayass, Regional Marketing Director, Dell Middle East at Dell stated, “Today, the role technology can play in the success of a business is bigger than ever. Dell’s foundation is built on a spirit of entrepreneurship. We have always believed that Technology has always been about enabling human potential. This is one of the key reasons why Dell has several programs in place and solutions on offer to enable the next generation of entrepreneurs to realize their full potential.”

MAKE Business Hub offers a platform of knowledge, which provides the entrepreneurial community with the tools and opportunities to turn their ideas into businesses.

Microsoft in collaboration with MAKE Business

Hub hosted a panel of experts to discuss how technology innovations can support Small and Medium Businesses (SMBs) in the UAE. Microsoft joined forces with industry leaders from Dell, du and Dubai Internet City to address the way that technology supports the specific needs of the mobile worker, entrepreneurs, creative freelancers and experienced SMB owners.

Speaking on the panel were Bruno Delamarre, Small and Medium Solutions and Partners Lead, Microsoft Gulf; Majed Alsuwaidi, Director Business Development Dubai Internet City and Dubai Outsource Zone; Vikram Chadha, Senior Director SME at du and Basil Ayass, Enterprise

Microsoft and partners highlight SMB opportunities

Page 13: Integratorme july2013
Page 14: Integratorme july2013

14 | July 2013

complementing the company’s

established leadership as a

Media company in the volume

channel segment. Earlier in

his brief opening note, R.

Narayan, the Managing Editor

of VAR Magazine, mentioned

the Integrator Awards applaud

the deserving Brands and

companies that excelled over

the year in their respective

domains.

The Awards results were

based on a combination of

results received from an online

poll that was run on www.

varonline.com for nearly a

3 week period as well as

included consensus of the

Editorial think tank.

Microsoft was awarded

the Virtualisation vendor of the

year. Microsoft has played a

key role in providing customers

and partners in the region

to reduce costs and enhance

agility through Cloud and

virtualization solutions.

In the category Enterprise

Storage Vendor of the Year,

Dell, a company that has

been looking at Enterprise

storage as a top priority for the

company in the past several

years was declared the winner.

The SMB Storage Vendor

of the Year was Netgear, a

company whose new storage

systems exemplify the kind

of affordable yet scalable

platforms that SMB customers

need in their virtualized

environments. With a growing

portfolio of SMB solutions,

D-Link emerged the winner of

the category SMB Networking

vendor of the Year. Cisco has

seen undiminished dominance

within the enterprise

networking marketand was

the winner of the Enterprise

Networking Vendor of the

Year category. Avaya, the

winner of the category

Unified Communications

Vendor of the Year, is a

company that offers a full

The inaugural Integrator Gala

Awards Night ceremony

hosted by VAR Magazine

was held at the J.W.Marriott

Marquis on the 19th of June

2013. The event witnessed

winning Brands walking

away with accolades and

was well attended by senior

level executives from winning

Brands. Further, the event also

provided a forum for informal

Business networking on the

sidelines between attending

integrators, Value Add

Distributors and vendors.

Mr. Vivek Sharma, the CEO

of VAR Magazine and Publisher

of The Integrator in his keynote

presentation, highlighted the

ongoing extension of the

company’s commitment to the

value add channel segment,

The Inaugural Integrator Gala Awards Ceremony successfully held

In Focus | The Integrator Awards

Page 15: Integratorme july2013

Mobility First

Suite No 601, Fortune Executive Tower, Jumeirah Lake Towers, Dubai, UAEPhone : +971 4 454 7154 Fax : +971 4 447 3234

Email : [email protected] www.oxygen-me.com

Page 16: Integratorme july2013

16 | July 2013

suite of interoperable unified

communications (UC) solutions.

LifeSize Communications, a

vendor which intends to make

it easier for people to use their

video conferencing technology

at any time and on any

device emerged the winner

in the Video Conferencing

vendor of the year category.

EMC, the winner of the

category Data Management

& Analytics vendor of the

Year is a company whose

goal is to support a broad

range of cloud and Big Data

solutions. Symantec, the

Winner of Disaster Recovery

and Backup Software Vendor

of the Year is a vendor that

has effectively been able to

offer a “no-hardware” disaster

recovery and backup or an

industry standard appliance

based solution,designed for

both virtual and physical

environments

Kaspersky Lab that has

made strong gains in the

consumer security software

market is also emulating that

success and growth in the

Business segment, emerging

with the recognition of the

Client Security Software Vendor

of the Year. Dell SonicWALL,

the winner of the category

Network Security vendor of

the Year has proved able to

deliver a two-fold security

approach by offering universal

protection against emerging

threats across platforms and

perimeters in real time while

enabling higher efficiencies

within the network.

Riverbed Technology,

the winner of the category

WAN Optimisation Vendor of

the Year has come up with

a unique WAN optimization

solution able to span mobile

workers, branch offices, and

data centres, both physical and

virtual, allowing the distributed

workforce to collaborate in real

time.

APC by Schneider Electric,

the winner of the category

Power Solutions Vendor of the

Year is a company that offers

one of the largest portfolios

of products and solutions

for small, medium and large

data center environments

and emerged on top in this

category. On the other hand,

the KVM Solutions Vendor of

the Year is ATEN, a provider of

a comprehensive suite of KVM

connectivity solutions.

In Distribution categories,

APTEC-an Ingram Micro

Company was the winner

in the category Enterprise

VAD of the Year whereas

Mindware Fz LLC was the

winner in the category SMB

VAD of the Year. WestconGroup

comprising of Westcon

Middle East and Comstor,

has successfully brought key

vendors together ensuring a

total 360 degreeintegrated

solution for clients and is

a deserving winner of the

category Networking VAD

of the Year.Offering Best

of class solutions from top

tier vendors that are able to

withstand threats in an ever-

changing IT security landscape,

Computerlinks was the winner

of the Security VAD of the Year.

StorIT Distribution FZCO, a VAD

focused on storage has built up

a suite of solutions & services

that enable enterprises large

and small to store, protect

& manage business critical

data, and harness the value of

information was the winner of

the category Storage VAD of

the Year.

By bringing together a

broad array of communication

products from Brands that

are leaders in their niches,

FVC has over the years built

up a strong credibility as the

leading VAD in the UC space

and not surprisingly, FVC was

the winner of the category UC

Infrastructure VAD of the Year.

Theatro was the winner of the

AV Solutions Distributor of the

Year.

The Emerging VAD of the

Year was conferred on Metra,

a company that is fast building

a strong value add focus

though alliances with leading

Technology vendors.

In the SI categories,

eHOSTING DATAFORT was

the winner in the category

Managed Services Provider

of the Year, boasting of

world-class data centres and

state-of-the-art infrastructure

and with customers across the

globe. Alpha Data, the winner

of the Networking Integrator of

the Year, is one of the largest

multi-disciplined systems

integrators in the region.

CONDO PROTEGO, the

winner of the category

Storage Integrator of the Year

is a company that brings a

consultative approach to the

fore and has alliances with the

top tier Brands in storage.

Intelligent Business

Technologies, a young

company that has swiftly

grown its portfolio of services

over the past few years and

has customers across the

region was chosen Emerging

Systems Integrator the Year.

Spectrami was awarded the

Visionary VAD of the Year for

its focus on taking some of the

niche Technology Brands to the

market.

In Focus | Integrator Awards

Page 17: Integratorme july2013

UCS C24 M3 ServerDescription

UCS C24 M3 SFF 16HDD w/ rail w/o PSU CPU mem HD PCIe

8GB DDR3-1333-MHz RDIMM/PC3-10600/2R/1.35v

300GB 6Gb SAS 10K RPM SFF HDD/hot plug/drive sled mounted MegaRAID 9240-8i RAID 0/1/10/5/50 for C22/C24 Power Cord 250VAC 10A BS1363 Plug (13 A fuse) UK 1.90 GHz E5-2420/95W 6C/15MB Cache/DDR3 1333MHz/NoHeatSink Heat Sink for UCS C22/C24 M3 Rack Server 450W power supply for C-series rack servers

TRACK – SAUDI ARABIAOlaya- Aqaria No.2-Office 405P.O. Box 94609- Riyadh 11614Tel Phone : +966 11 460 4544 Ext: 1807Fax: +966 11 460 3533E-mail : [email protected] : www.tdme.ae

The Cisco UCS C24 M3 is UCS C-Series Rack Servers designed to operate both in standalone environments and as part of Cisco UCS, all Cisco UCS C-Series servers complement and extend Cisco innovation, investment protec-tion, and simplicity. Cisco UCS C-Series servers provide innovations such as a standards-based unified network fabric, Cisco Data Center VM-FEX virtualization support, Cisco UCS Manager software, Cisco fabric extender and fabric interconnect architectures, and Cisco Extended Memory Technology.

Item Specification

Processors • 1 or 2 Intel Xeon processor E5-2400 product family CPUs

Memory • 12 DIMM slots • Support for DDR3 registered DIMMs • Support for DDR3 low-voltage DIMMs • Advanced error-correcting code (ECC) • Mirroring option

PCIe slots • Riser 1: • One x16 PCIe Gen 3 slot, x16 extended connector (Cisco CNIC), half-length, full-height, with NCSI1 and Cisco CNIC2 support. The Cisco 1225 virtual interface card requires an NCSI slot • One x4 PCIe Gen 3 slot, x8 connector, half-length, full-height, no NCSI support • Riser 2: • One x8 PCIe Gen 3 slot, x16 connector, half-length, half-height • One x8 PCIe Gen 3 slot, x8 connector, half-length, half-height • One x8 PCIe Gen 3 slot, x8 connector, half-length, half-height

RAID • RAID 0, 1, 5, 6, 10, 50, and 60 support

Hard drives • Up to 16 or 24 front-accessible, hot-swappable, 2.5-inch SFF (Small Form Factor) SAS or SATA drives • Up to 12 front-accessible, hot-swappable, 3.5-inch LFF (Large Form Factor) SAS or SATA drives

Cisco UCS Integrated Management Controller

• Integrated Emulex Pilot-3 Baseboard Management Controller (BMC) • IPMI 2.0 compliant for management and control • One 10/100/1000 Ethernet out-of-band management interface, or 1 Gigabit Ethernet LOM or Cisco VIC 1225 access • CLI and WebGUI management tool for automated, lights-out management • KVM, vMedia

Front-panel locator LED

Indicator to help direct administrators to specific servers in large data center environments; a front-panel controller provides status indications (LEDs) and control buttons:

Additional rear connectors

Additional interfaces including a VGA video port (DB - 15), 4 USB 2.0 ports, 1 Gigabit Ethernet dedicated management port, dual 1 Gigabit Ethernet ports, a serial port (DB-9)

Physical dimensions (H x W x D)

2RU: 3.45 x 16.93 x 26.0 in (8.76 x 43.0 x 66.05 cm)

Page 18: Integratorme july2013

18 | July 2013

Unstoppable as it looks, BYOD is a testing challenge for corporates

looking to secure their networks. It looks irreversible as well and therefore organisations have to look at having a BYOD policy framework in place.

Thomas Lippert, Senior Product Manager, Sophos says, “The Bring Your Own Device paradigm has rapidly moved from novelty to near inevitability.Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices as employees begin to adopt and leverage their own tablets and smartphones. BYOD is here to stay, and tomorrow’s BYOD will involve even greater diversity in devices, form factors and platforms.”

As organizations continue to implement bring-your-own-device (BYOD) programs, it is projected that 38 percent of companies will stop providing devices to workers by 2017, according to a global survey of chief information officers (CIOs) by IT research firm Gartner. At the same time, BYOD causes significant security concerns: the top 3 security concerns regarding BYOD loss of company data, unauthorized access to company data and malware infection.

“Indeed there is a genuine need for BYOD polices to be enabled in the workspace and the biggest driver here is the goal to achieve employee satisfaction and productivity through the use of new technologies, while reducing their mobile expenses. This BYOD trend is one of the more dramatic results of the consumerization of IT, in which consumer preference, not corporate initiative, drives the adoption of Technologies in the enterprise, “says Khalid Laban, CEO, Oxygen Middle East, a value add distributor that focuses on BYOD solutions.

BYOD is driven by individuals and organisations need to secure their data from possible incursions via guest devices or even employee owned devices that do not meet the requisite security guidelines.

“Since BYOD arises from the customer, policies are the only path that can define

Cover Feature | BYOD

A rising number of employees are now bringing their own devices to work. And while this becomes a norm, BYOD programs will now be a necessity for even SMB companies lest they incur Business losses due to potential data breaches.

Page 19: Integratorme july2013

July 2013 | 19

the scope of mobile usage for employees. One needs to understand that employees tend to bring certain risks with their devices that can threaten enterprise data such as malicious applications and mobile theft. In order to safeguard this data, creating a policy is the best solution and this will avoid any conflict between the employee and employer.”

There is no definite answer to the employees accepting the policy without apprehensions.

"The first step is to make employees aware of the policies and ensure that they fully understand them. Given an increase in the BYOD trend it is imperative for employees to accept policies created by the enterprise if they would like to access the corporate date from their personal devices,” says Mathivanan Venkatachalam, Director of Product Management at ManageEngine.

While BYOD is here to stay, in the near future, there will be a proliferation of even greater diversity in devices, form factors and platforms which will only enhance the challenge to manage. Further threat levels in mobility computing are on the rise. According to Symantec’s annual Internet Security Threat Report, mobile malware increased by 58% in 2012 and 32% of all mobile threats attempted to steal information.

Kenan Abou Lteif, Sales Manager, Gulf & Pakistan, Symantec says, “BYOD lends itself to more productivity and freedom for employees. However, organizations IT

departments are challenged with the need to protect and control corporate information regardless of the device it is on and without hindering the efficiency BYOD enables. Concerns are wide-ranging, from lost and stolen devices, data leakage, unauthorized access to corporate resources and the spread of malware infections from mobile devices to the company network. With mobile devices now delivering critical business processes and data, the cost of security incidents can be significant. “

He adds, “By implementing a BYOD-ready network, there should be a decrease or lack-of security incidents or data loss. A successful implementation is the balance of securing corporate information, while making it accessible to employees on mobile devices.“

Symantec’s 2013 State of Mobility Survey found that there are two different types of organizations – “Innovators” who readily embrace mobility and “Traditionals” who are reluctant to implement it. Eighty four percent of innovators are moving ahead with mobility, motivated by business drivers, and they are experiencing significant benefits. Traditional organizations are implementing mobility more slowly, largely in response to user demand, and are seeing both fewer costs and benefits.

BYOD in the SMB segmentSMB segment companies are responding positively to BYOD but they must also take cognizance of

the accompanying risks. Accordingly, they need to be aware of putting in place firm BYOD policies.

“Since the most important business consideration for SMB is cost saving, BYOD can give them an advantage. But it comes with caveat, SMB have to make sure that stringent policies are applied and emphasize data protection in their priority list,” says Mathivanan.

For SMBs, the small business owner is usually the first to bring in his own device and connect to the network. These owners are realising that with BYOD, employees can use their personal mobile devices for work, so the business doesn’t need to make a big investment in supplying employees with devices.

Kenan says “There is adoption of BYOD in the SMB segment. Many SMEs in the

Middle East do not have the resources or the budget to supply employees with the latest mobile technologies, yet they want to partake of the benefits of an always-connected workforce; making a BYOD approach appealing,“

And while more SMB companies will start encouraging BYOD in the work environments, they will have to stringently review how they can bolster their security infrastructure.

“SMBs must acknowledge the data integrity implications of all the personal smartphones and tablets in the work environment. Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employees, SMBs need to examine the impact on their security models,” says Thomas.

SMB companies may be

Thomas LippertSenior Product Manager

Sophos

Page 20: Integratorme july2013

20 | July 2013

aware but not practive when it comes to putting BYOD policies in place because the budget might be a big factor. However, they could look at affordable cloud based models that will suffice, else they risk incur losses.

Oxygen’s Khalid says, “Small entrepreneurs often do not have enough money to hire large IT security departments, allowing hackers and phishers across the globe to focus their efforts on this market in the form of SMS messages and other nefarious activities usually involving Apps. However, small business owners can now access a variety of affordable and effective tools for BYOD, especially cloud-based MDM. SMB’s need to mitigate risk today, rather than remediate risk after the first attack."

Symantec’s 2012 State of Mobility Survey found that the average losses associated with

mobility that SMEs experienced during 2011 was $126,000. Concerns with mobility in the workplace are device loss, data leakage, unauthorised access to corporate resources and malware infection.

Kenan comments, “Across the Middle East, many SMEs are struggling to find the proper balance between enabling mobility and maintaining a secure IT infrastructure. These simple steps – taking stock of mobile devices, securing with proper tools and policies, and managing through software – are relatively simple ways to strike that balance. Many of the processes, policies, education and technologies that are leveraged for desktops and laptops are also applicable to mobile platforms. SMEs in the region should integrate the management of mobile devices into the overall IT management framework and administer

it in the same way – ideally using compatible solutions and unified policies. This creates operational efficiencies and lowers the total cost of ownership.”

Solutions offer flexibilityVendors have taken different approaches to bringing to market BYOD solutions. Some have integrated BYOD in upgrades of existing products. Leading security vendors are offering a cloud version in addition to local client versions.

Symantec offers the Symantec App Center which is an easy-to-use mobile application and content management solution that secures all corporate data on mobile devices. Symantec also has a unique cloud security platform, the Symantec O3, which provides single sign-on and enforces access control policies across web applications.

Kenan says, “App Center enables user productivity on mobile devices, regardless of the ownership, while protecting enterprise data. The solution provides enterprise grade security on a per-app basis, without requiring any source code changes or SDK embedding. Symantec O3 helps enterprises migrate to Software as a Service (SaaS) applications while ensuring that proper risk management and compliance measures are in place to protect enterprise data and follow regulations. It enables enterprise IT to provide single sign-on and access control security for multiple cloud applications.”

Sophos claims to tackle BYOD requirements comprehensively. The vendor provides the Sophos Mobile Control for managing BYOD. Tablet and Smartphone sales are rapidly increasing, and Sophos has seen significant growth in its mobile security sales in the past year.

Thomas says, “Whether you are deploying BYOD for the first time, or evolving your existing BYOD initiative, Sophos can help you every step of the way. Our global security organization is at users’ service to help solve BYOD problems today, and to prepare for future threats and opportunities, wherever they may arise. Sophos Mobile Control (SMC) secures iPhone, iPad, Android and many more—whether they are company issued or personal devices, chances are they are being used for work. Sophos protects all of these mobile devices and keeps sensitive business data on them safe. And users can choose the delivery model to suit their needs—on-premise or Software as a Service (SaaS).”

BYOD and the channelSymantec has seen the momentum grow in terms of BYOD deployments by its partners. From pilot phases that covered limited users, now there are more users and apps being covered. There are requirements coming up from verticals including Education.

Kenan says, “Many of Symantec’s partners in the region are involved in BYOD projects. Initially such initiatives started within certain organizations for a limited

Cover Feature | BYOD

Mathivanan VenkatachalamDirector, Product Management

ManageEngine

Page 21: Integratorme july2013

July 2013 | 21

number of users, mostly the senior management. However, deployments have since expanded to a larger number and to a wider range of applications. Symantec has also started to see BYOD projects at a large scale, especially in the education sector, where some institutions are looking at allowing students to bring their own devices.”

The channel plays an instrumental role in educating organizations that want to adopt a BYOD strategy to ensure that the convenience of BYOD does not come at the expense of data security.

Mathivanan says, “While the channel can educate the prospects that they deal with, enterprises first need to understand the benefits that BYOD can bring and decide on what is it they have to protect and what policies that they should enforce.”

Finding the balanceWith BYOD deployments,

striking the balance between ensuring privacy and security enforcement is the key. However, security of Business data is a paramount concern.

Khalid says, “It all drills down to proper planning and execution of BYOD and MDM strategy, many companies will be faced with pulling off a balancing act between protecting company data and ensuring BYOD users' privacy isn't trampled. The early pattern has

been to require employees to permit the company to control any functions that could affect company data, as well as reserving the right to manage the phone, applications and selectively wipe only Corporate related data and Access, should it become compromised, lost or stolen without need.”

There are two approaches to BYOD management. Businesses can use mobile device management (MDM) and mobile application management (MAM) tools to help maintain an inventory of the devices connecting to company resources and also make sure employees are adhering to policies.

Kenan adds, “MDM is a viable method to deliver applications to user-owned devices, secure the corporate apps and data on them, and provide the ability to push applications to managed devices. However, using MDM to address these BYOD considerations means enterprises are forced to fully manage user-owned devices. In contrast, MAM enables enterprises to avoid device-level management and instead implement application-level management on user-owned devices. As a result, MAM negates the issues that are associated with fully managing

user-owned devices via MDM by allowing enterprises to “wrap” each of their corporate apps and the data tied to them in their own security and management layers. This gives enterprises control of their apps and data while leaving the rest of the user-owned devices.”

However Thomas opines that the extra layers of security are in fact helpful tools that give users the ability to use their own devices within the workplace, allowing further flexibility and freedom. In addition to applying passcodes and antivirus prevention to devices, one should apply a custom level of application

control to BYODs. He adds, “If applications

are available to employees on the internal network, they should be able to access them offsite through a VPN or email software. A successful BYOD program allows users to be productive outside of their scheduled work hours while also giving them the flexibility to do the things they like to do when they’re not working—like update their status or enjoy playing an interactive game.”

In summary, BYOD implementation needs to be undertaken without hindering the individual’s user experience with the device

he or she uses or owns in the work environment or remotely but striking the balance in terms of the necessary adherence to security guidelines.

"The channel plays an instrumental role in educating organizations that want to adopt a BYOD

strategy to ensure that the convenience of BYOD does not come at the expense of data security."

Kenan AbouLteifSales Manager, Gulf & Pakistan

Symantec

Page 22: Integratorme july2013

22 | July 2013

locations. The threat is continuous - any time the device is in use, outside of the workplace, data breaches can occur.

While a business might want to take corrective measure to salvage a data breach, they have to work within the limitation from the device provider. Users can continue to use their personal items after a breach, which may hold corrupted files and malware which can continue to spread data to a number of outlets.

BYOD security should be at the forefront of business security, as it is a business trend that is only going to evolve and become more prominent. Regardless of the type of information being shared, all business data can be, and should be, classified as sensitive. Traditional security solutions won’t protect enterprises; however there are new products that support cloud and BYOD usage. They work

by alerting the network management of impending issues before they become a serious threat.

Is the Middle East region ready for IPv6 Security-wise?While IPv6 is an invisible system that translates web addresses into a string of numbers and enables devices to communicate intelligently with each other via the internet, the threat from hackers remains the same. IPv6 is not a tool that prevents your networks from malware, phishing, spam and other cyber threats. That’s why companies need to stay on their toes and up-to-date with their security software.

According to a research conducted by Renesys, Middle Eastern IPv4 ASNs grow at a faster pace than global internet (11% vs 9%), Middle Eastern IPv6 ASNs however grow slightly slower than global internet (31% vs 37%).

While the IPv4 currently carries the majority of internet traffic in comparison to IPv6, the latter is designed to eventually replace IPv4.

WatchGuard’sFireware XTM (Extensible Threat Management) v11.4.1 supports a limited set of IPv6 features. The IPv6 support is implemented in XTM through several stages, these stages are aligned with adoption patterns among our customer base.

Current XTM functionality allows IPv6 addressing on external-facing interfaces, allows the device to pass traffic in a mixed IPv4 and IPv6 environment, and enables firewall capabilities including basic filtering and policies, default threat connection, and DHCPv6 client.

Virtual machines seem to be the latest target for malware. How can organizations in the region protect their VM infrastructure?WatchGuard’s unified threat management (UTM) solutions provide the most complete security in their class for fully integrated, multifaceted protection from network threats, including: Viruses, spam,

John Spoor, Regional Manager, WatchGuard, Middle East Africa discusses some of the threats in the emerging landscape and elaborates on how WatchGuard is geared to tackle these with the UTM appliances and next generation firewall appliances it provides

Future proofing security

TechKnow | WatchGuard

Discuss the increasing number of remote workers and the threats they pose when they access corporate networks through unprotected Wi-FiBring your own device (BYOD) is a trend that is here to stay. The use of personal devices also used for business continues to grow as the market and demand for smartphones, tablets and other devices rises.

Employees may think that their personal devices are safe from threats, and that they don’t believe they have been compromised. Businesses aren’t able to monitor the usage of employees’ personal devices outside of work hours, which websites they visit, what they download or whether they connect to unsecure Wi-Fi networks. Malware can live within systems for prolonged amounts of time without detection and feed information to multiple

Joh

n S

poo

r, R

egio

nal M

anag

er, W

atch

Guar

d M

EA

Page 23: Integratorme july2013
Page 24: Integratorme july2013

24 | July 2013

blended threats and policy violations. Organizations can protect their virtual machine infrastructure with Unified Threat Management (UTM) solutions.

Because the threat landscape is always changing, WatchGuard solutions are designed to be able to easily add new network defense capabilities through security subscriptions, so costly hardware upgrades are not necessary.

The region has been a popular target for APTs and other targeted attacks. How can WatchGuard help protect against these sophisticated attacks?Historically, APT attacks have been created by sophisticated hackers using advanced attack techniques and blended threat malware, but it is only a matter of time before “normal” malware criminals learn from these sophisticated hacks and the evolution of the APT speeds up, making organizations of every size a target.

No network security provider can block every APT attack, no matter what they claim. According to Gartner, an estimated $60 billion is invested by corporations and governments in network security systems, yet hackers are still finding ways to sneak past them. By definition, APTs often leverage new techniques, which may not even have a defense yet. However, there are defense strategies that can significantly mitigate the chance of an advanced and persistent infection. WatchGuard supports a variety of reporting and monitoring functions that provide smart and strategic defense against these blended threats.

We’ve outlined a variety of best practices for mitigating risk and monitoring unusual activity across a network that may better detect or stop the next APT. These include Multiple layers of security controls (WatchGuard “defense-in-depth”), Signature-less malware protection (WatchGuard Proactive Malware Detection), an evolving defense framework (WatchGuard XTM),

better manageability through visibility (WatchGuard Firebox System Manager (FSM) and HostWatch), enforcing Standards (WatchGuard Protocol Anomaly Detection (PAD) and Reputation Services (WatchGuard Reputation Enabled Defense (RED).

Because APTs are continually evolving and getting more elusive by the day, no network security solution will be able to anticipate or block every attack. Our advice: Always assume that a network is already breached and then build a security vault using the tools and services noted here. We strongly suggest the utilization of more than just preventative tools – strong visibility tools will help recognize threats and ensure that IT administrators are talking all necessary action to help mitigate them.

BYOD-What threats does BYOD pose and how does WatchGuard help clients face BYOD issue with confidenceUnquestionably, BYOD challenges long-standing IT controls to minimize and mitigate risk. As businesses explore how to adopt BYOD and increase the productivity of employees, this also brings a whole new set of threats and challenges.

The risk of data loss is a threat and challenge. Data loss can vary, and the consequences can be extreme. For example, a recent study estimated that a data breach could cost a company about $200 per compromised record, based upon a variety of factors including the cost of lost business because of an incident; legal fees; disclosure expenses related to customer contact and public response; consulting help; and remediation expenses, such as new security technology and training.

There are risks associated with viruses entering corporate network via personalized devices. Many off-the-shelf, consumer mobile devices lack antivirus and/or antimalware protection.

For example, Android devices are often the subject of media headlines that

tout the virus risks, such as keyloggers, trojans and other forms of malware.

WatchGuard’s new AP100 and AP200 wireless access points secure enterprises’ WLAN from today’s sophisticated, blended threats. This means enterprises are able to accurately and easily apply security policies and changes to both wired and WLAN resources simultaneously, which is critical to enforcing security standards across the entire network infrastructure.

Every UTM out there is being presented as a Next-Gen Firewall. How do WatchGuard’s series of Next-Gen solutions stack up against the best of the competition? Unified threat management (UTM) is an emerging trend in the network security market. UTM appliances have evolved from traditional firewall/VPN products into a solution with many additional capabilities, including spam blocking, Gateway antivirus, spyware prevention, intrusion prevention and URL filtering.

These are functions that previously had been handled by multiple systems. UTM solutions also provide integrated management, monitoring, and logging capabilities to streamline deployment and maintenance. All of our WatchGuard XTM security appliances combine these capabilities for a superior UTM solution.

Moreover, with WatchGuard’s UTM solutions enterprises are provided with the flexibility to add any of our powerful subscriptions, whichever is needed in key industries. The UTM solution can easily be upgraded to a higher appliance model within the line with a software lincense key and simplifies administration tasks including log file management, auditing, and compliance reporting to keep IT productivity high.

While keeping their productivity high, it also allows the IT stass to have more time to focus on other areas of network administration, while also saving money on support and hardware costs.

TechKnow | WatchGuard

Page 25: Integratorme july2013

July 2013 | 25

Is there an increased demand for IP surveillance solutions in the region? Discuss the IP solutions you offer.Security threats are driving the growing demand in the IP Security and Surveillance Market. IP cameras in general offer the same resolution as an analog camera with a built-in video encoder to convert the analog signal into an IP address.

We are distributors for Mobotix. MOBOTIX AG is known as the leading pioneer in network camera technology and its decentralized concept has made high-resolution video systems cost efficient.With Mobotix we are talking about megapixel HiRes Camera solutions which gives over 50 times more detail than images captured with conventional surveillance systems.

SNB Middle East provides end-to-end IP Surveillance solutions inclusive of Cameras, Video Management Software, Networking and Storage, reducing the Total Cost of Ownership of projects.

Apart from different cameras, do you also provide related Data analytics software? SNB offers Axxon soft Enterprise Modular Video Management Suite for Unlimited Scalability & Integration with third party access controls, Fire Alarms, Building Management solutions (BMS), Point of Sales (POS), AMT Security, Video Wall Etc.

They even have Data base integrations for Face Recognition, People Counting and License Plate recognition.

Is demand seen across commercial and residential markets?While the demand has always been strong for Security Surveillance products, in the UAE the growth in the commercial segment is presently stronger relative to the residential segment. However the residential market is also catching up.

Discuss your channel strategy?Being a New generation VAD, We do have a mix of Physical and Traditional Security Integrators. Being a True Value Added Distribution company SNB Middle East FZC works directly and only with our Partners who are Integrator or Resellers. We support and strengthen them by providing technical and commercial expertise. Being committed and relably fulfilling their demands, SNB has seenfavorubale response from the channel in a relatively short time in the market.

What is the growth rate you envisage for the surveillance Business?The Surveillance market share is increasing year on year and percentage wise this is in double digits. Being aligned with future proof manufacturers, our expectations of significant growth are higher.

Along with several

other areas of focus,

IP Surveillance is a

significant growth

opportunity that SNB

Middle East is keenly

pursuing and has a

sizable array of solutions

in the segment. Sonia

Sebastian, Business

Unit Head - Security

Surveillance at the

Distributor elaborates on

some key trends and the

company’s focus

An opportune pursuit

Point2Point | SNB

Sonia SebastianBusiness Unit Head

SNB Middle East

Page 26: Integratorme july2013

26 | July 2013

Point2Point | Oxygen Middle East

WiFi. We live, breath and work only on wifi and delivery of value added applications. We add solutions for Voice from Ascom and Vocera, Video and CCTV from Aventura , RFID tracking from Ekahau and Aeroscout and security solution to manage this new infrastructure from Redseal and Fortinet.

Now with the smart devices strong drive globally, it is in our favour, as these smart devices use Wireless as the only mean of communication. Therefore Oxygen has put a very forward thinking strategy for building a Mobility first solution.

Today Oxygen is the only

VAD in the region focusing on BYOD and Mobility first solution set and has got the strategy together and assembled a strong solution set that fits the mobility first solution requirement today.

What is the growth of demand for wireless deployments in the region across different customer verticals?The Demand for wireless has been increasing and we are expecting a growth rate of about 30% YOY. With our portfolio, we are well placed to tap this growth opportunity.

Which are your key verticals

and markets in terms of regions?The Market is strong and some key ones that are luxurious hotels use professional Wifi set up with Value added solution in order to help them maintain customer satisfaction and we give them differentiation.

In the Education Sector, there is strong demand for BYOD solutions and similarly in the corporatesegment, especially finance. We are seeing growth in these segments.

What are the value add services you offer to your partners?We provide them consultation

Oxygen Middle East is a leading mobility solution provider, focusing on designing, distributing, and implementing high performing, scalable, and secures wireless solutions in the Middle East Region. Founded in 2004, Oxygen Middle East is today a leading distributor for wireless solutions that are based on best mobility products in the Market, including Enterprise wireless products, Home and Small Office wireless products, wireless end-devices and applications.Khalid Laban, CEO speaks to The Integrator about the company’s focus on Wifi and BYOD solutions.

Wifi in the air

Please elaborate on your focus as a VAD in terms of the solutions that you offer in your portfolio. Are Wireless solutions your strongest focus?Oxygen Middle East is the official distributor for several wireless vendors, including Aruba networks, the market leader for enterprise WLAN solutions. Oxygen is also having distribution agreements with active RFID tags venders, and wireless IPT venders.

Oxygen is a company focused and driving the concept ofArchitecture for Voice , Video and integrated Data over a Wireless Solution. So the core of our business is

Khalid LabanCEO

Oxygen Middle East

Page 27: Integratorme july2013

July 2013 | 27

with the design of Architecture for Voice, Video and integrated Data over wireless solution. We also provides technical training in the use and maintenance of all the products we distribute and are also the exclusive ATC Authorized Training Center for Aruba Networks in the Middle East region.

Our Mobility first strategy has been unveiled to enable our partners take advantage of this very important adoption of the new Technologies. We believe the world is going Mobile and we are in a very unique position to take advantage of it. We have some the best solution for BYOD: MDM, MAM and MCM solution based on MoibleIron and we have done some very successful installations to support our vision.

We provide our channel comprehensive Presales and post-sales support which helps them increase and maximize their sales opportunities.

We provide Oxycare Professional service support and service with Next business day delivery in all countries. We provide Door to Door delivery, extended payment plans if required as well.

Discuss your focus on BYOD?OXYGEN is the only VAD in the region having end to end solution to help address the

BYOD challenges this puts us at unique advantage of being able to claim the “BYOD Experts Title. There are unique components in our BYOD vision and strategy that helps provide a comprehensive array of solutions.

What are your solutions for BYOD?An effective BYOD Expert will first start with proper Network Infrastructure planning and

here our Fluke Networks solution helps properly plan, build and manage BYOD deployments, and ensure the network is properly designed to effectively handling influx of devices.

All Smartphone and Tablets are reliant on Wireless which is the core of Mobility today, and here our Enterprise Grade Secure and reliable Wi-Fi solution from Aruba Networks help serve as easily

manageable and scalable core infrastructure for BYOD enablement.

A BYOD solution is incomplete without having fail safe measures

to ensure they have an Enterprise Mobile Management Solution in place, here our MobileIron Solution help tackle the challenges of Data Leakage Prevention, Mobile Device Management, Mobile Application Management and Content Management and above all ensuring IT has means to distinguish Corporate data from Personal Data in case of BYOD deployments.

Enterprises want to empower their employees with greater information access, increased team collaboration, improved productivity and employee engagement. Our Partnership with Acnronis helps deliver Anytime, Anywhere Access – For accessing and syncing files between their devices – laptops, desktops, smartphones and tablets with easy collaboration on files with both internal and external constituents.

Finally the key challenges on how these devices are securely connected to the Enterprise infrastructure, is how we provision Device On-Boarding, Secure Access, Guest Management, Identify Management which we help deliver using Aruba Clear Pass Solution.

We believe the world is going Mobile and we are in a very unique position to take advantage of it.

We have some the best solutions for BYOD and we have done some very successful installations to

support our vision.

Middleware

Systems

Services

Network

Analytics

Identity

MCMMAMMDM

Oxygen vision and Network Design for clients

Page 28: Integratorme july2013

28 | July 2013

do this by drawing from our excellence in finance, teamwork, and solid relations with end users and vendors.

Our targets for Qatar and the region are small, medium and large companies. Our service and product thrusts revolve around IT Infrastructure, IT Services, Physical Security, Document Management, and Data and Applications Hosting. For this year in particular we would like to firmly establish our status as a top provider of monitoring solutions and services through the right team and the right sourcing of products. Our local assembly and R&D teams in

Qatar are highly qualified to assist us in this vision.

As we go from market to market, we will make sure that our channel partners support and uphold our core values of Integrity, Reputation, Added Value, Trust, Respect, Excellence, and Transparency.

What are the recent investments the company has initiated in the regionl? We have made substantial regional investments into infrastructure to ensure that we deliver complete and high-performing enterprise technology and system

integration solutions. Most have been directed towards our core services - Security and Integration, Documents Archiving, ATM Monitoring and Management, IP Telephony and Contact Center Services, and Channel Development and Outsourcing. We continue to build up our capabilities in territories such as KSA and Sudan and we intend to reinforce our infrastructure in other ME growth markets.

In terms of human capital, Mackeen understands the importance of investing in the right employees and their continuous development. We then ensure that our

employees are constantly motivated and provided with professional training.

Quality is an integral part of our commitment to world-class products and customer service. We thus invest heavily on a quality process that verifies and validates both existing and new solutions; researches improvements to further improve quality; actively involves employees and customers; and continuously monitors quality and management.

As Qatar prepares to host the 2022 Football World Cup,

are there projects that you are involved with to assist towards this?Many of Qatar’s economic sectors are gearing up to provide direct and indirect support for the approaching World Cup. Mackeen is involved in several projects with entities such as hotels, banks and health institutions that will be involved in some degree with football’s premier event. Many of our specialties such as CCTV solutions and IP telephony will play key roles during the Cup so we expect more related business to come our way as 2022 draws near.

Face recognition is a

Mackeen Technology is one the fast emerging Technology solutions companies in Qatar and is tapping into several growth segments. Salman AL Kaldari, CEO of Mackeen Technology discusses how the company is forging ahead.

Ascending the Growth trajectoryDiscuss your channel strategy in the region in terms of your go-to market policy Mackeen Technology aims to translate our success as one of the fastest growing technology companies in Qatar to the regional arena. Through our MENA channels we will steadily build a reputation for delivering high-quality and profitable technology solutions – developed and promoted by locals from area to area – that support long-term growth. Given the competitiveness of the regional markets we intend to ensure complete customer satisfaction for all our deliverables. We shall

Sal

man

Al

Kal

dar

i, CE

O, M

akee

n Te

chno

logy

Point2Point | Mackeen Technology

Page 29: Integratorme july2013

July 2013 | 29

technology that is attracting great interest in the region and as a leading developer of security solutions we are looking at how we can help in the regional growth of this important segment. We also have an excellent data disaster recovery team that offers the best response option for any incident that may happen during the World Cup and across the region.

What are your expansion plans outside Qatar?There are many companies in Qatar that are headquartered in other big markets. Mackeen is one of a few companies that are local to Qatar; we consider this one of our key strengths since we get to gain valuable insights into, and considerable knowledge on, the local market and environments. This gives us an edge over the competition in terms of quality and speed of project delivery.

Regional operations are impacted by several factors such as the business friendliness of the local environment, which Dubai excels in, or the size of the market, which is where Saudi Arabia has a big advantage.

Qatar offers the best of both worlds as it is a flexible market to work in and is receptive to mega projects due to its investment-driven vision. Our successes in nearby markets, key regional expansions and strong ties with major IT brands that have chosen us to support their growth plans will drive our

performance further.

Is Cloud computing an area of focus for you?

We are steadily building up our own cloud computing portfolio. We already have a strategic partnership in place with Rackspace, the open cloud company and the world leader in hosting web-based IT systems, to provide local support for Rackspace’s GCC customers. We plan to jointly build and operate a regional data center that will link with other Rackspace data centers around the world. Through our partnership with Rackspace we deliver Managed Hosting, Private Cloud Hosting, and a host of advanced cloud computing services under the Rackspace Cloud platform.

Discuss your infrastructure cabling services in the construction sector and the growth in this segment?Infrastructure development projects worth over USD 350 billion are planned across the GCC countries this year. Qatar will account for USD 45 billion worth of projects, so the construction sector presents high-profit business prospects for Mackeen.

New buildings and building refurbishments require large-scale cabling support, which Mackeen offers through a

number of established partners such as Belconn, an Italian company specializing in voice, video and data network cabling and B3 Cable, the fastest-growing cable manufacturer in the world with a presence in Europe, Asia and the Middle East which provides cabling solutions for instrumentation and control, railways, voice and data, and fire safety systems.

Do you provide technology solutions to other subsidiaries in the group?

Although Mackeen Technology falls under the umbrella of Mackeen Holding, we operate as an independent and standalone company. To date we have not yet executed any project for Mackeen Holding’s other subsidiaries.

Qatar offers a wide playing field for us to explore further expansion so we are focusing our efforts in this market. For the moment we are acting as an IT and infrastructure consultant for our holding group which is currently involved in massive urban projects in countries such as Sudan, KSA and UK. This does give us access to Mackeen Holding developments which could later on require support from the various brands we represent.

Discuss some of your

"Our targets for Qatar and the region are small, medium and large companies. Our service and

product thrusts revolve around IT Infrastructure, IT Services, Physical Security, Document Management,

and Data and Applications Hosting."

solutions in the video surveillance segmentThe video surveillance market has grown by leaps and bounds over the past decades. Vast

technology improvements have made video surveillance systems prevalent even in small businesses and homes. The uses have extended to public monitoring and home and workplace management, among others.

Mackeen offers a number of solutions that leverage the flexibility, efficiency, range and cost effectiveness of video surveillance. One of these is WiEye, which is regarded as the best system for remote video surveillance and management in the world. WiEye can monitor, record, and access any event and feed information through PCs, mobiles and tablets..

We also carry products from GKB Security Corporation GKB’s Video Fire Detection System (VFDS) uses Video Image Detection technology to detect flame and smoke at any time of the day.

The Iris on the Move (IOM) biometric solution also forms part of our comprehensive stable of video surveillance offerings. We also offer advanced high-resolution network camera technologies from German company MOBOTIX AG and digital video surveillance solutions for professional installations from Axis Communications, the world’s leading expert in network video.

Page 30: Integratorme july2013

30 | July 2013

Big data is a technology topic that’s getting a

tremendous amount of headlines. You can hardly visit a technology website or read a publication without coming across an article on the subject. But there’s plenty of good reason for all this attention. We live in a world that is fast becoming overwhelmed by information. Ninety percent of the world’s data was created in just the last two years, and IDC estimates that by 2020,business transactions on the internet, including both business-to-business and business-to-consumer,

will reach 450 billion per day.From software applications and social media to internet search results and the ever-present email, the rate of data creation is growing exponentially with no signs of slowing.

Bizarrely, companies have for years seen information as the Holy Grail of competitive differentiation – begging “if only we had more customer data, if only we knew more about market patterns, if only our equipment could tell us when it was going to fail.”In the blink of an eye, we have gone from thirsting for this information to drowning in it,

leaving us to ask the question “now what”? Many see big data as the answer – and the key to making “if only” a reality.

Despite all the focus, the actual meaning of big data and its application aren’t always clearly articulated, but the concept is actually a fairly simple one. At the most basic level, big data is just as it sounds – volumes of information that are extremely large and growing. That can mean data already being generated within an organization by systems or machines, like manufacturing

InSight | Infor Middle East

output or customer buying patterns; or increasingly, data that’s available for companies to buy, provided from sources like social media vehicles or internet search providers. The issue comes when the volume gets so big that it can’t be effectively managed in a traditional “batch processing” way. If it takes many hours or even days to process large volumes of data, the information quickly loses its value. Enter big data solutions designed to turn this information tsunami into an information goldmine.

Because of this potential

How to Make Big Data Consumable

Mike HibbertGeneral ManagerInfor Middle East

Mike Hibbert, General Manager, Infor Middle East

discusses the significance of how not to be carried

away by the hype but attempt to truly extract the

value of information from data and applications

already available and do a pilot run before adopting

a major Big Data initiative .

Page 31: Integratorme july2013

July 2013 | 31

and all the hype, companies understandably want to make sure they don’t miss out on the big data phenomenon. Truth is, we’re far from reaching a point where more than a small percentage of businesses truly have a big data problem. Big data opportunities, on the other hand, are a zebra of a different stripe. Certainly, the possibility of making information a competitive advantage is a real one, more viable in fact than it has ever been. The question is whether big data holds the key to achieving that goal. For some, the answer will be a resounding yes. For others, however, big data could be end up being a costly and unnecessary distraction.

How do you know where your company falls? Some of the best advice about how to address the big data question can probably be summed by admonitions frequently given to my children:

- Set the table. The first step in any data project (big or otherwise) is to clearly establish what you’re trying to accomplish. Additionally, it can be helpful to establish a visual picture or framework of what you’re trying to accomplish that organizes the business around an end game and breaks down

the problem into consumable, achievable initiatives. With all the excitement around the big data concept, it’s easy to get pulled into an initiative with objectives that are likely to change as you go along. Defining up front what you need helps determine if big data is the answer and puts parameters around what you undertake if it is.

- Eat what we already have in the pantry. Many companies have valuable data ready and waiting to be exploited with the help of business intelligence and analytical tools. Before assuming that an expensive initiative around big data is required, determine what data you have and whether you can accomplish your goals with existing tools. Incremental capabilities can also be incorporated in a non-disruptive way, giving you a big bang for your buck by providing better, more consistent visibility to data and making it more consumable. Analytic applications that surround existing information and transactional systemscan

effectively manage your data while also delivering a host of other benefits, like giving non-technical users simple dashboards that help them target specific problems and opportunities; delivering information directly and automatically to users so they head off problems and make better decisions; and making collaboration a standard part of your work processes.

- Finish what’s on your plate before you ask for more. All of the new data available today can be very tempting. From Amazon to Facebook, we now have an almost dizzying array of choices that seem poised to unlock new and previously untapped opportunities. However, the data you already have can be equally as valuable, if not more so, because of its relevance and quality. At some point, there are diminishing returns on adding more insight into the mix, as too many data sources can create “analysis paralysis,” particularly for the average worker. Improving your ability to deliver a highly focused viewof the business

with targeted workflows is likely to serve you better than focusing time and energy on what can easily turn into a great deal of outside

noise. The best approach is to make sure you fully understand and exploit what’s core to your business and already exists before taking on new, potentially complex and expensive data initiatives.

- Take small bites. When you are ready to start delving into big data, start with a prototype and refine your processes before undertaking a major initiative. Once you have standard approaches in place that capitalize on your internal data and support consistent, streamlined business processes, take a small piece of the business and inject one or two new data sources to see if the benefits outweigh the cost and distraction. Testing the waters – and the results – will help you keep things under control and better assess the true potential return on big data for your business.

Big data has the potential to deliver big value. But the size of that potential and the most effective ways to exploit it are still being explored. Companies that watch, plan, and act when the time is right will be well served.

"Before assuming that an expensive initiative around big data is required, determine what data you have and whether you can accomplish your

goals with existing tools."

Page 32: Integratorme july2013

32 | July 2013

eyetech

ANP-08AV-L – 8 Port Lite managed AVB Bridge

WD’S 5 MM 2.5-INCH HARD DRIVE

Overview:WD is shipping the world’s first ultra-slim 2.5-inch, 5 mm hard drives and solid state hybrid drives (SSHD), which are designed for integration into the slimmest devices and space-constrained computing environments. With 500 GB of storage capacity and models with high performance-enabling solid state hybrid drive technology, this slim product line helps to address the tradeoffs system designers often make between capacity, physical size and performance.

WD designed the new WD Blue and WD Black 5 mm drives to enable new levels of device portability. The new drives are aimed to increase internal storage capacity while enabling it to fit into smaller device slots. In addition, the slimmer and more portable the device, the more vulnerable the hard drive is to user-induced stress. To battle this, WD has designed key enablers to the 5 mm form factor.

Key features:• Thisultra-slimformfactorreducesweightbyupto 36 percent compared with a standard 9.5 mm drive.

• TheWDBlueandWDBlack5mmdrivesdeliver unprecedented operation and non-operation shock specifications with 400 G and 1000G, respectively.

• WDdesignedtheconnectorandboardutilizingcell phone miniaturization technology to maximize the mechanical sway space in the hard drive and ensure shock performance.

• WDBlue5mmharddrivesalsofeaturethefirst application of a new small form factor SFF-8784 edge connector. This new connector receives power from and interfaces with the host I/O bus via the SATA interface connector SFF-8784.

• Themotorshaftis secured at both ends to reduce system- induced vibration and stabilize platters for accurate tracking during read and write operations which enables consistently higher performance.

OverviewThe ANP-08AV-L AVB Bridge has 8 ports, each capable

of accommodating non-blocking wire speed connection

with other AVB ports in full-duplex mode. The ANP-

08AV-L delivers 10/100/1000 automatic speed sensing,

full/half-duplex sensing, and Auto MDI/MDI-X to every

port. This simplifies the combination of 10, 100, and

1000 Mbps devices.

An intuitive web-browser interface / CLI offers

straightforward administrative management for

performance monitoring, port mirroring, port

configuration, VLAN for traffic control, Class of Service

(CoS) for traffic prioritization, port trunking for increased

bandwidth, traffic filtering, and other advanced features.

The ANP-08AV-L is supported by an external 12V

power supply and the small form factor is highly useful

in extending AVB network infrastructure in low density

installations. An optional 3 x ANP-08AV-L rack mount

tray is available which allows the ANP-08AV-L to be

rack mounted.

Key features:• 8PortGigabitAVBNetworkBridge

• AdministrativemanagementviaCLIcommandsand simple web-browser interface

• VLANsupport

• Layer2management

• Universal100-240VAC/50-60Hzexternalpower supply

• Rack-MountTraysystemoptionaltomount3xAVB- 08-L together in 1RU form factor

Page 33: Integratorme july2013

July 2013 | 33

OverviewThe PowerEdge VRTX is a shared infrastructure platform offering extensive performance and capacity with office-level acoustics in a single, compact tower chassis. It is an ideal solution for small and midsize businesses as well as remote and branch offices of large enterprises. The simple, efficient and versatile platform can be rapidly deployed to consolidate and manage business applications in two or three virtualized servers with shared storage and integrated networking. Employing the latest PowerEdge technology and high-availability features, VRTX can help you gain fast application response times, run multiple applications that need performance or low latency, power through peak processing periods and scale for future business growth.

Key features:• Hugeinternalcapacitiesthatsupportextensivegrowth Office-level acoustics, much quieter than traditional aggregations of servers, storage and networking

• FreshAirvalidatedconfigurationsthatallowyoutoavoid the need for special cooling or worry when you turn off the AC during non-business hours

• Standardpowerrequirementsfoundinmostoffices (100V-240V), which allows users to avoid the cost of rewiring for high-line power (typically required for servers and storage)

• Front-accessKVM,USB,LCDdisplayandoptionalDVD-RW• Up to four server nodes

• Featurerich,2-socket,half-height12thGeneration PowerEdge M520 and M620 blade servers that combine superb performance with exceptional flexibility• Flexibleserverconfigurationsthatcanbetailoredtomeet your specific needs• Supportforfuture-generationPowerEdgeM-Seriesblades• DualSDcardsforredundanthypervisors• Hot-plugandswappableHDDs

PowerEdge VRTXAXIS Q1931-E Thermal Network Camera

Key features:•TherobustAXISQ1931-Eisspecificallydesignedfor use in harsh environments such as desert terrain and tough climates.

• Inadditiontoaverycompetitiveprice,theAXIS Q1931-E offers high contrast 384x288 resolution thermal images.

• ItisthefirstthermalcameraofferingAxis’ Corridor Format, which is especially useful for effective perimeter protection of for example industrial facilities or railroad tracks.

• Intelligentvideoisakeycomponentofanythermal camera, and AXIS Q1931-E provides tampering alarm, motion detection, and support for AXIS Camera ApplicationPlatform.

Overview:The new AXIS Q1931-E Thermal Network Camera is an affordable and solid bullet-style camera especially designed for outdoor surveillance in complete darkness and challenging conditions. The out-of-the-box outdoor-ready camera is ideal for monitoring of facilities where early detection of an intrusion attempt is critical. In addition, Axis’ unique Corridor Format allows the camera to deliver a vertical field of view, perfect for situations such as the monitoring of long fences and other perimeters.

Page 34: Integratorme july2013

34 | July 2013

Worldwide IT spending is projected to total $3.7 trillion in 2013, a 2 percent increase from 2012 spending of $3.6

trillion, according to the latest forecast by Gartner, Inc. Last quarter, Gartner's forecast for 2013 IT spending growth in U.S. dollars was 4.1 percent. The 2.1 percentage point reduction mainly reflects the impact of recent fluctuations in U.S. dollar exchange rates; growth in constant currency is forecast at 3.5 percent for 2013, down only slightly from last quarter.

The Gartner Worldwide IT Spending Forecast is the leading indicator of major technology trends across the hardware, software, IT services and telecom markets. For more than a decade, global IT and business executives have been using these highly anticipated quarterly reports to recognize market opportunities and challenges, and base their critical business decisions on proven methodologies rather than guesswork.

"Exchange rate movements, and a reduction in our 2013 forecast for devices, account for the bulk of the downward revision of the 2013 growth," said Richard Gordon, managing vice president at Gartner. "Regionally, 2013 constant-currency spending growth in most regions has been lowered. However, Western Europe's constant-currency growth has been inched up slightly as strategic IT initiatives in the region will continue despite a poor economic outlook."

The forecast for spending on devices in 2013 has been

Stats & Trends

revised down from 7.9 percent growth in Gartner's previous forecast to 2.8 percent (see Table 1). The decline in PC sales, recorded in the first quarter of 2013, continued into the second quarter with little recovery expected during the second half of 2013. While new devices are set to hit the market in the second half of 2013, they will fail to compensate for the underlying weakness of the traditional PC market. The outlook for tablet revenue for 2013 is for growth of 38.9 percent, while mobile phone revenue is projected to increase 9.3 percent this year.

Enterprise software spending is on pace to grow 6.4 percent in 2013. Growth expectations for customer relationship management (CRM) have been raised to reflect expanded coverage into e-commerce, social and mobile. Expectations for digital content creation and operating systems have been reduced as software as a service (SaaS) and changing device demands impact traditional models and markets.

Telecom services spending is forecast to grow 0.9 percent in 2013. Fixed broadband is showing slightly higher than anticipated growth.

The increasing level of security threats has not gone un-noticed among consumers in the Middle East region. A

survey conducted by Cisco in the Middle Eastrevealed that a third of consumers in the region are concerned about the vulnerability of their online information and personal data as well as the possibility of identity theft. As a result, a surprising number of users (50%) prefer that their online browsing is kept strictly private and have high expectations that websites will keep their information confidential. However, there are concerns that in today’s internet era, the age of privacy is over. Over three quarters of respondent’s fear that they are no longer in control of their data online and are worried about how much personal data is being captured and how it is stored.

Worldwide IT Spending on Pace toReach $3.7 Trillion in 2013

The survey findings further revealed that:• 76%ofrespondentsintheMiddleEastmaintain5to9 passwords as opposed to 29% globally• Almosthalf(42%)ofMiddleEastrespondents’“online identity” differs from their “offline identity”. Globally this was 39%. • MorethanhalfofMiddleEastrespondentshavemultiple online identities (55%) as opposed to 44% globally. • IntheMiddleEast50%donotwanttheironlinebrowsing to be tracked. Globally, 40% of respondents agreed with this. • HalfofrespondentsintheMiddleEasttrustveryfewsites to keep their information private and secure (51%). Global respondents were less trusting with 49% distrusting most sites security.

Cisco Survey highlights growing Securityand Privacy Concerns

Worldwide IT Spending Forecast (Billions of U.S. Dollars)

2012 2012 2013 2013 2014 2014Spending Growth (%) Spending Growth (%) Spending Growth (%)

Devices 676 10.9 695 2.8 740 6.5Data Center Systems 140 1.8 143 2.1 149 4.1Enterprise Software 285 4.7 304 6.4 324 6.6IT Services 906 2 926 2.2 968 4.6Telecom Services 1,641 -0.7 1,655 0.9 1,694 2.3Overall IT 3,648 2.5 3,723 2 3,875 4.1

Source: Gartner (July 2013)

Page 35: Integratorme july2013
Page 36: Integratorme july2013

AUTHORIZED DISTRIBUTOR

Aptec - an I ngram M icro Company

P. O. Box 33550Dubai Internet City,Dubai, UAEE-Mail: [email protected]

Tel.: (+971 4) 3697 111Fax: (+971 4) 3697 110www.apteconline.com

SECURE AND SAFEGUARD

YOUR BUSINESS

with D-Link IP Surveillance

www.dlinkmea.com

It’s ideal for small and medium business environments, so whether you are running a shop front, o�ce or a warehouse, with D-Link you’ll enjoy greater peace of mind.

Manage your building and premises security • Keep customers, employees and cash holdings safe • Capture and review your recordings remotely on the go

Providing you with the �nest end-to-end IP Surveillance solutions...

DCS-6010L

Wireless N HD 360 Degree Fisheye Camera

DCS-7010L

Outdoor HD Day/Night Mini Bullet Network Camera

DCS-7513

Full HD WDR Day & Night Outdoor Network Camera

DCS-6113

Full HD Day & Night Dome Network Camera

DCS-6010L DCS-7010L DCS-7513 DCS-6113 DNR-322L

9-Channel 2 Bay mydlink NVR

DNR-322L

Full HD WDR Day & Night Outdoor Network CameraFull HD WDR Day & Night Outdoor Network CameraFull HD WDR Day & Night Outdoor Network CameraFull HD WDR Day & Night Outdoor Network Camera

with3TB/6TB

HDD