Redington Value Journal - May 2018

Redington Value Distribution
Redington Value DistributionRedington Value Distribution

Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives. Key stories from the May Edition: • Dell EMC takes open networking to the edge for next-generation access. • Microsoft announces new intelligent security innovations • Powering partners’ transformation - Pradeep Kumar, Principal Consultant, Security, Redington Value. • Redington Value signs new vendor partnerships. • Fortinet delivers integrated NOC-SOC solution. • HPE to acquire Cape Networks. • Malwarebytes introduces endpoint protection and response solution. • Mimecast offers cyber resilience for email with new capabilities. • SonicWall announces Capture Cloud Platform. • Veritas revamps channel program to drive partner growth. • Red Hat announces availability of Red Hat Storage One. • AWS announces Amazon S3 One Zone-Infrequent Access(Z-IA).

Continued on page 3
Dell EMC has introduced its Virtual Edge
Platform (VEP) family, the first-to-market
software-defined wide area network solution
(SD-WAN) with the new Intel Xeon D-2100
processor, to help speed digital transformation
by connecting the enterprise edge to the cloud
via universal Customer Premise Equipment
(uCPE). The new virtualized solutions will
enhance or displace expensive fixed-function
access hardware.
As a leading use case, the Dell EMC
VEP provides next-generation access to the
network via SD-WAN. By enhancing WAN
operations and economics, service providers
and enterprise customers can drive growth,
strengthen competitive differentiation and
improve the end-user experience.
Built with advanced intelligence for
network virtualization and software-defined
architecture, the Dell EMC VEP4600
provides an open Intel architecture-based
platform to support multiple simultaneous
virtual network functions (VNF). Numerous
proprietary physical devices can be
consolidated into this
overall security benchmark score.
It will also let organizations
compare their results to those
with similar profiles using
built-in machine learning.
Attack Simulator, a part of Office
365 Threat Intelligence, lets
security teams run simulated
attacks to event-test their
employees’ responses and tune
configurations accordingly.
Also available with the
upcoming Windows 10 update,
are new automated investigation
and remediation capabilities in
Windows
Issue 22 // May 2018
New platform family and software bundles enhance SD-WAN to speed digital transformation and expand opportunities for
service providers and enterprises.
DELL EMC TAKES OPEN NETWORKING TO
THE EDGE FOR NEXT-GENERATION ACCESS
Continued on page 3
emerging threats aimed at IoT
and edge devices.
Microsoft is introducing Azure
Sphere, the industry’s first holistic
platform for creating highly
secured, connected MCU devices
on the intelligent edge. Featuring
an entirely new class of MCUs with
more than five times the power of
legacy MCUs, an OS custom built
for IoT security, and a turnkey
cloud security service that guards
every Azure Sphere device. With
Azure Sphere, Microsoft extends
the boundaries of the intelligent
edge, to power and secure an
entirely new category of devices.
The firm has introduced several
new intelligent security features for
its Microsoft 365 commercial cloud
offering designed to help IT and
security professionals simplify how
they manage security across their
enterprises.
Microsoft has released
Microsoft Secure Score and
Attack Simulator. Secure Score
makes it easier for organizations
to determine which controls to
enable to help protect users, data
and devices by quickly assessing
readiness and providing an
Microsoft has announced several
new intelligent security tools and
technologies to help enterprises
more easily secure their data
and networks against today’s
biggest threats as well as address
 Microsoft announces new intelligent
security innovations
The new security features enable enterprises to secure their data and networks more easily.
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:
For more information, please write to sales.value@redingtonmea.com
www.redingtonvalue.com sales.value@redingtonmea.com H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE
3
Redington Value signs new
vendor partnerships
The regional distributor has partnered with IoT vendor PTC and cybersecurity leader Imperva.
Redington Value has signed
a Middle East and Africa
distribution agreement with PTC,
a renowned global Internet of
Things (IoT) solutions provider.
According to the terms of the
agreement, Redington will enable
its extensive partner network to
deliver PTC solutions to enterprise
customers in the region.
“Redington’s ecosystem of
partners can capitalise on PTC’s
promise of physical digital
convergence today and drive
the future of innovation,” said
Georges Millet, EMEA Channel
Sales Vice President at PTC.
“Combining the world-class
components of ThingWorx with
Redington’s knowledge and
network of partners will offer
IoT innovation and adoption to
customers within MEA.”
The distributor has also signed
a distribution agreement with
Imperva, a cybersecurity leader
that delivers solutions to protect
data and applications in the cloud
and on-premises.
The distributor will offer
Imperva solutions including web
application firewall and DDoS
protection offering to its partners
across the Middle East.
“We are excited to work
with Imperva as this crucial
relationship helps us to
expand and develop our
security offerings. Through
this relationship, our in-region
partners have access to the
winning combination of Imperva’s
best-in-class security portfolio
and our outstanding services,
training and sales support
capabilities,” said Ramkumar
Balakrishnan, president,
Redington Gulf, Value
Distribution.
From page 1From page 1
Microsoft
announces
Dell EMC takes...
We are in an industry that is at
high risk of disruption by new
digital technologies. It is of prime
importance that resellers employ
a continuing skillset development
program for their technical folks.
Security is still a new skill set, one
that is highly specialized and in high
demand.
As a VAD, we offer many avenues
for our reseller partners to up
and hone their security skill set.
For example, we conduct product
trainings, technical hands-on
training, Shadow Pre-Sales and Post
Sales, Webinars and ATC programs.
Another important initiative we have
taken is the Red Vault – which is a
state-of-the-art customer experience
and learning center.
We will extend any support
needed to our partners to help
transform and make themselves
relevant for the years to come. But
for this to happen resellers must
become agile in their business,
focus on building expertise, have a
strategy in place to scale and more
importantly are willing to embrace
latest technologies.
We have also developed a few
programs for our partners to help
in their transformation. Here we
employ our consultants to conduct
workshops and help design
strategies and time bound plans
for our partners to transform their
business and embrace the change.
We will continue investing in
equipping our channel partners
to bring emerging tech to main
stream, introduce vertical-based
business outcome solutions and
build ‘Strategy-to-Execution’
capability on cloud computing,
IIOT and Data Analytics. .
Poweringpartners’
transformation
By Pradeep Kumar, Principal Consultant,
Security, Redington Value
COLUMN: REDefined
single uCPE while maintaining
the high performance levels
needed to host many. The
modular design includes
room to grow with front panel
expandability so the platform can
be easily upgraded or serviced in
the field as needed. 
The VEP 4600 is powered by
the new Intel Xeon D-2100 product
family, Intel QuickAssist Technology
(Intel QAT), and Data Plane
Development Kit (DPDK). These
features help optimise compute
resources and provide efficiency for
growing security workloads.  
 The Intel Xeon Processor
D-2100 product family’s
performance, power and
form factor have been tuned
for higher performance-per-
watt for SD-WAN and uCPE.
It delivers more than 1.5x
faster CPU performance, up
to 2x improvement in packet
processing, 2x memory
bandwidth and up to 4x memory
capacity. These processors enable
complex packet processing and
Defender ATP, leveraging artificial
intelligence and machine learning
to quickly detect and respond
to threats on endpoints, within
seconds, at scale.
Microsoft also announced a
preview of a new security API for
connecting Microsoft Intelligent
Security Graph-enabled products
as well as intelligence from
solutions built by customers and
technology partners to greatly
enhance the fidelity of intelligence.
Microsoft also is announcing a
new Microsoft Intelligent Security
Association for security technology
partners so they can benefit from,
and contribute to, the Intelligent
Security Graph and Microsoft
security products. Members of the
association will be able to create
more integrated solutions for
customers that provide greater
protection and detect attacks
more quickly. Palo Alto Networks
and Anomali join PwC and other
existing partners as founding
members of the new association.
Ramkumar Balakrishnan, Redington Value
other scale-out workloads with
responsiveness and low latency.
 The cost- and power-
efficient Dell EMC VEP4600
expands upon Dell EMC’s Open
Networking initiative that offers
customers choice and the ability
to protect their investment.
 To help service providers speed
time to market and enterprises
simplify deployments, Dell EMC
offers three validated solutions
using the VEP4600. These
solutions provide turnkey SD-WAN
capabilities with pre-validated
and pre-integrated configurations
combining Dell EMC infrastructure
and support services with industry-
leading SD-WAN software from
Silver Peak Systems, VeloCloud
Networks and Versa Networks.
Architected and tested to Dell EMC
standards, these offerings enable
customers to quickly deploy cost
effective SD-WAN solutions or
managed services.
 The Dell EMC VEP4600 has
begun shipping worldwide from
April 24, 2018.
For more information, please write to sales.value@redingtonmea.com
4
Hewlett Packard Enterprise has
announced a definitive agreement
to purchase privately-held Cape
Networks based in Cape Town,
South Africa, and San Francisco.
Cape Networks will become a
part of Aruba, a Hewlett Packard
Enterprise company, and
will expand Aruba’s Artificial
Intelligence (AI) powered
networking capabilities with a
sensor-based service assurance
solution that gives customers a
simple, proactive, and network-
agnostic tool for measuring and
monitoring SaaS, application, and
network services. The solution
helps organizations deliver the
Cape Networks’ solution
complements Aruba NetInsight, and
together will deliver comprehensive
AI-powered analytics and assurance
so that customers can quickly
adapt to changes in the user,
device, application, and network
environments.
“Cape Networks strengthens
and further differentiates the
Aruba Mobile First Architecture
with a simple and intuitive, yet
powerful, approach to optimizing
the end-user experience,” said
Partha Narasimhan, CTO,
Aruba, a Hewlett Packard
Enterprise company. “With Cape
Networks, IT can easily deploy
HPE to acquire Cape Networks
Acquisition expands Aruba’s AI-powered analytics and assurance capabilities.      
and use a network of sensors
to proactively optimize and
remotely troubleshoot end user
experiences for on-premises and
cloud applications such as SAP,
Salesforce.com, Microsoft Office
and Wi-Fi captive portals.”
best possible end user experience
by enabling IT to get ahead of
service quality issues before
they occur, accelerate time to
resolution, and lower cost of
operations.
By applying a sensor-based and
network agnostic approach to
service assurance, Cape Networks
proactively tests the availability
and performance of services
and applications, alerting IT
professionals of issues before they
impact the user or the business.
Cape Networks delivers easy-to-
use insights with a simple and
intuitive dashboard that helps
eliminate the guesswork for IT.
Fortinet has announced the
industry’s first purpose-
built NOC-SOC solution that
bridges workflows, analysis
and automated response
across operational and
security processes.
Building on the Fortinet
Security Fabric architecture,
Fortinet has combined the latest
capabilities of FortiManager 6.0,
FortiAnalyzer 6.0 and
FortiSIEM 5.0 to offer a unique
NOC-SOC management and
analytics solution.
NOC-SOC approach
to management enables
Fortinet delivers integrated
NOC-SOC solution
New management and analytics solution integrates Network Operations Center (NOC) and Security
Operations Center (SOC) to bridge gap across silos
uncovering compromised hosts.
John Maddison, senior
vice president, Products and
Solutions, Fortinet, says, “As
the industry faces a cyber talent
shortage and the pressure to
maintain operational efficiency
and security efficacy is critical for
digital business, a new approach
is needed that brings visibility
and control into the NOC
with workflow and response
automation in the SOC. Fortinet
is introducing a customized
NOC-SOC solution that bridges
the gap across IT disciplines to
achieve broad and automated
security response.”
IT Service Management (ITSM)
integration.
Integration across security
disciplines – not merely products
– enables a greater level of
visibility, control and operational
management. Fortinet’s new
NOC-SOC solution combines
the latest capabilities of
FortiManager, FortiAnalyzer
and FortiSIEM, coalescing
the operational context of the
NOC, such as appliance status,
network performance and
application availability, with
the security insights of the SOC,
including breach identification,
stopping data exfiltration, and
Fortinet is introducing a customized
NOC-SOC solution that bridges the gap
across IT disciplines to achieve broad
and automated security response.”
John Maddison, Fortinet
Partha Narasimhan, Aruba, a Hewlett
Packard Enterprise company
enhanced security operations
visibility with a new graphical
Security Fabric topology
view and extensions into
both private and public cloud
environments, with dynamic
policy objects.
New Security Rating
feature combines analytics
from FortiGate, FortiAnalyzer
and FortiManager with
threat intelligence services
from FortiGuard to provide
enterprises with a quantifiable
security posture. Rating
includes expanded audit rules,
risk scoring and industry
benchmarking with customized
auditing based on network
environments.
New Incident Response (IR)
tracking capabilities allow users
to automate responses across
silos based either on predefined
triggers (system events, threat
alerts, user and device status)
or through direct ServiceNow
For more information, please write to sales.value@redingtonmea.com
555
Ed Jennings, Mimecast
Mimecast offers cyber resilience
for email with new capabilities
53 percent predict their organization will suffer from an email-borne attack in 2018
percent of the 800 IT-decision
makers who responded said they
saw an increase of these types of
attacks over the past 12 months.
Impersonation Protect,
from Mimecast, will offer supply
chain impersonation protection to
guard companies against similar or
lookalike third party email domains,
helping to stop these attacks before
they could cause any issue.
Mimecast has incorporated new
capabilities within Impersonation
Protect and URL Protect that are
designed to use new algorithms to
protect internal users from similar
or lookalike domains.
New real-time data feeds have
also been added to Impersonation
Protect engineered to better
identify newly observed and
registered domains to further
enhance Mimecast’s ability to
detect security threats.
“Cybercriminals are constantly
looking for new ways to be stealthy
and trick users, which was the key
driver for us to enhance Targeted
Threat Protection with these new
capabilities,” said Ed Jennings,
Chief Operating Officer.
Available in June 2018, these
new features will be delivered
through Mime|OS, a 100 percent
single cloud platform that underpins
the Mimecast services, and via a
single administration console with a
simple to use user interface.
Mimecast has announced
enhancements to its Targeted
Threat Protection services -
Impersonation Protect, URL
Protect, and Internal Email
Protect – engineered to combat
and remediate the evolving threat
landscape. New features include
supply chain impersonation
protection, similar domain
detection, the integration of new
automated intelligence feeds,
as well as the introduction of
automated threat remediation
capabilities. New research
from Mimecast and Vanson
Bourne revealed that organizations
are not only facing a variety of
different threats, but the volume
and frequency of these attacks
continue their upward trajectory.
Malwarebytes
Endpoint Protection
and Response
provides proven
endpoint protection
with integrated
detection
and response
capabilities via a
single agent.”
In fact, 53 percent expect a negative
business impact from these email-
borne threats in 2018.
Impersonation attacks
commonly use social engineering,
and are designed to trick users
such as finance managers,
executive assistants, and HR
representatives into making
wire transfers or providing
information which can be
monetized by cybercriminals.
Normally, these attacks target
people from within the same
company; however, attackers have
started to impersonate senders
from so called trusted third
parties that the target company
does business with regularly.
New Mimecast and Vanson
Bourne research found that 40
Malwarebytes has announced the
release of Malwarebytes Endpoint
Protection and Response.
Marcin Kleczynski, CEO,
Malwarebytes, said, “Malwarebytes
Endpoint Protection and Response
provides proven endpoint
protection with integrated detection
and response capabilities via a
single agent, so organizations of
all sizes can easily protect their
endpoints from targeted attacks,
thoroughly remediate systems and
rollback ransomware.”
Malwarebytes introduces endpoint
protection and response solution
Malwarebytes Endpoint Protection and Response allows organizations to proactively hunt for malware across all of their
endpoints without the need for a dedicated resource.
Key features include:
• Cloud-based single
management console and a
unified agent.
• Continuous monitoring
and visibility of endpoints
– Endpoint Protection and
Response’s flight recorder
provides continuous monitoring
and visibility into Windows
desktops to obtain powerful
insight.
• Multi-layered protection
– Malwarebytes Endpoint
Protection and Response’s
multi-vector protection (MVP)
uses a seven-layered approach,
which includes both static and
dynamic detection techniques.
• Rapid identification and
three modes of endpoint
isolation – When an endpoint
is compromised, Malwarebytes
stops the bleeding by isolating
the endpoint. Endpoint
Protection and Response is the
first product to offer three ways
to isolate an endpoint. Network
isolation restricts which
processes can communicate.
Process isolation controls which
processes are allowed to keep
functioning. Desktop isolation
alerts the end user and halts
further interaction to limit
damage.
• Complete remediation
and ransomware rollback
– Malwarebytes proprietary
Linking Engine provides
complete and thorough
remediation to rapidly return
an endpoint to a healthy state
and minimize impact to the
end-user, post-compromise.
Rollback technology winds
back the clock up to 72
hours, negating the impact of
ransomware with just-in-time
backups prior to infection.
Malwarebytes Endpoint
Protection and Response allows
organizations to proactively hunt
for malware across all of their
endpoints without the need for a
dedicated resource.
Marcin Kleczynski, Malwarebytes
For more information, please write to sales.value@redingtonmea.com
6
SonicWall, the trusted security
partner protecting more than
1 million networks worldwide,
introduces the SonicWall Capture
Cloud Platform, which tightly
integrates security, network,
email, mobile and cloud security
products. SonicWall also is
introducing new and enhanced
products in its portfolio of
SonicWall announces
Capture Cloud Platform
SonicWall Capture Cloud Platform delivers integrated security, management, analytics and
control across entire SonicWall portfolio.
Toaidorganizationsinmitigating
growingvolumesandvariantsof
cyberattacks,theSonicWallCapture
CloudPlatformprovidesintelligence,
managementandanalyticsto
supplementSonicWall’scomplete
portfolioofcybersecurityhardware,
virtualappliancesandendpoint
clientsforanefficient,easy-to-use
andconnectedcustomerexperience.
Thenewlyannouncedcloudplatform
includescapturesecuritycenter,
captureAdvancedThreatProtection
(ATP),captureclient,hostedemail
securityandcaptureLabsThreat
Network.
One of the cornerstones of the
SonicWall Capture Cloud Platform
is the SonicWall Capture Security
Center, originally released as
SonicWall Cloud GMS. Delivered
as a cost-effective service offering,
the SonicWall Capture Security
Center offers the ultimate in
visibility, agility and capacity to
govern entire SonicWall security
operations and services with
greater clarity, precision and speed
— all from a single pane of glass.
Bill Conner, President and
CEO, SonicWall, said, “The new
SonicWall Capture Cloud Platform
ensures organizations are always
protected by the absolute latest
information — updates, signatures
and alerts — to automatically
defend their networks from the
most advanced cyberattacks.”
ThenewSonicWallCaptureCloudPlatform
ensuresorganizationsarealwaysprotected
bytheabsolutelatestinformationto
automaticallydefendtheirnetworksfrom
themostadvancedcyberattacks.”
Veritas Technologies has
debuted an enriched partner
program focused on helping
the channel drive growth and
profitability. The new Veritas
Partner Force program is
designed to create higher
earnings potential for more
than 10,000 global partners
who want to capitalize on
Veritas’ 360 data management
Veritas revamps channel program
to drive partner growth
Theredesignedprogramenablespartnerstoaddressandbenefitfromincreasedcustomerdemandfordatamanagementsolutions
portfolio and multi-cloud data
management solutions.
The Veritas Partner Force
program is dramatically
simplified, making it much
easier for partners to reap
more benefits and rewards.
Additionally, partners will
have access to a plethora of
educational offerings that will
empower them to help customers
solve some of their biggest data
management challenges. The
revamped program also offers
expanded revenue opportunities
to attract a new generation of
worldwide resellers, service
providers, system integrators
and distributors.
“The channel continues to
evolve as many of our partners
are developing more of their
own intellectual property
and are focused on selling
business solutions versus
point-products,” said Barbara
Spicek, Vice President, Global
Channels and Alliances,
Veritas. “Recognizing the
changing needs of the channel,
Veritas is increasing technical
assets, deepening skills and
enhancing opportunities to
make it easier for our broad
ecosystem of partners to help
customers harness the power of
their data on-premises and in
multi-cloud environments.”
Key new components of the
Veritas Partner Force program
include increasing opportunities
for existing partners with greater
earnings potential, building new
revenue streams for partners
selling to commercial and mid-
market accounts, expanding the
company’s Global Distribution
Program to drive growth and
innovation and boosting partner
resources for a faster path to
revenue and success.
Partners can also choose
from a variety of new
accreditation courses and
skills evaluations, based
on their business practices.
Online courses such as Veritas
NetBackup Architecture,
Challenges in Backup
and Recovery, and Risk
Mitigation and Compliance are
offered as part of the redesign.
New e-learning courses will be
added regularly to address newly
introduced Veritas offerings as
well as customer challenges.
Bill Conner, SonicWall
Barbara Spicek, Veritas
hardware, virtual appliances and
endpoint clients.
The SonicWall Capture Cloud
Platform identified more than
49,800 new attack variants in the
first quarter, with SonicWall Real-
Time Deep Memory InspectionTM
(RTDMI) identifying 3,500 never-
before-seen variants.
For more information, please write to sales.value@redingtonmea.com
7
Accelerate your Digital Transformation with
Red Hat and Barq Systems - Riyadh - 30 April
Fortinet NSE 5 Technical Workshop -
Dubai - 25-26 April
Palo Alto cloud Workshop -
Dubai - 24 April
Fortinet NSE 4 Technical Workshop -
Dubai - 23-24 April
Fortinet NSE 4 Technical Workshop -
Dubai - 23-24 April
Fortinet NSE 4 Technical Workshop -
Dubai - 29-30 April
Microsoft Azure Technical Training on Deployment
and Migration - Dubai - 21-23 April
Barracuda Customer Executive Workshop -
Dubai - 1-5 April
Fortinet Partner Day with partner
OCS Infotech - Oman - 30 April
Palo Alto cloud Workshop -
Egypt - 30 April
Dell EMC Partner Enablement Session -
Jeddah - 15 April
HPE Channel Seminar -
Oman - 25 April
Palo Alto TRAPS workshop with
BARQ Systems - Riyadh - 25 April
For more information, please write to sales.value@redingtonmea.com
8
Palo Alto cloud Workshop - Dubai - 24 April
Red Hat Partner Awards powered by
Redington Value - Dubai - 22 April
SonicWall Get Secured Seminar - Dubai - 3 April
Splunk Partner Immersion Training Session - Dubai - 3 April
Splunk Partner Conference 2018 - Emerging Markets - Dubai - 17 April
Redington Value empowering the Channel Community
at the Fortinet Partner Sync - Dubai - 11 April
Redington Value Proud Partner of Nutanix
.Next Forum - Dubai - 10 April
Splunk SE1 Bootcamp - Dubai - 2 April
StorageCraft Data Management Workshop -
Dubai - 2 April
Red Hat Partner Awards powered by Redington Value - Dubai - 22 April-1
For more information, please write to sales.value@redingtonmea.com
9
Cambium Networks - Partner Enablement Session -
Kenya - 12 & 13 April
Microsoft - Partner Roundtable - Kenya - 26 April
Tripplite - Lunch & Learn Partner Session -
Kenya - 19 April
Cisco - Hyperflex Partner Workshop -
Nigeria - 25 April
Cisco - NPL Orientation & Acceleration
Sessions - Nigeria - 5 April
Cisco - Partner Enablement Session -
Nigeria - 11 April
Cisco - End User Event With Carrel Technologies - South Sudan - 18 April
Microsoft - Partner Roundtable - Nigeria - 12 April Microsoft - Partner Roundtable - Nigeria - 26 April
Cisco - End User Event With CATS Tanzania -
Tanzania - 13 April
Microsoft - Partner Roundtable -
Kenya - 12 April
For more information, please write to sales.value@redingtonmea.com
10
Amazon S3’s new lowest cost storage class offers a single Availability Zone storage option for infrequently
accessed data such as copies of data, backups, off-site compliance, and disaster recovery.
Amazon Web Services (AWS),
an Amazon.com company has
announced Amazon Simple
Storage Service (Amazon S3) One
Zone-Infrequent Access (Z-IA),
a new Amazon S3 storage class
that stores objects in a single
Availability Zone. Amazon S3
Z-IA is designed for customers
who want a lower-cost option
for infrequently accessed data,
but do not require the multiple
Availability Zone data resilience
model of the S3 Standard
and S3 Standard-Infrequent
Access storage classes. S3 Z-IA
is intended for use cases with
infrequently accessed data that is
also re-creatable, such as storing
secondary backup copies of on-
premises data, or for storage that
AWSannouncesAmazon S3 One
Zone-Infrequent Access(Z-IA)
is already replicated in another
AWS Region for compliance
or disaster recovery purposes.
S3 Z-IA is available today in all
commercial AWS Regions.
AWS Regions are comprised
of Availability Zones, which refer
to technology infrastructure in
separate and distinct geographic
locations with enough distance
to significantly reduce the risk
of a single event impacting
availability, yet near enough for
business continuity applications
that require rapid failover.
Amazon S3 object storage
classes (S3 Standard and S3
Standard-IA) and Amazon
Glacier store data across multiple
geographically-separated
Availability Zones to offer the
highest level of resilience. With
Amazon S3 Z-IA, customers
can now store infrequently
accessed data within a single
Availability Zone at 20 percent
lower cost than S3 Standard-
IA. In addition, S3 Z-IA offers
customers higher availability and
durability than self-managed
physical data centers, with the
added benefit of having to pay
only for what they use.
Mai-Lan Tomsen Bukovec,
Vice President, Amazon S3,
AWS, said, “Amazon S3 Z-IA is
ideal for customers who want
storage for infrequently accessed
objects, don’t need the durability
of multiple Availability Zones,
and want to save cost with our
lowest priced storage tier in
Amazon S3.”
A single Amazon S3 bucket
can store a mixture of S3 Z-IA,
S3 Standard, and S3 Standard-
IA storage classes, letting
storage administrators make
decisions based on the nature of
the data, data access patterns,
and cost without having to
change any applications.
Red Hat has announced the
general availability of Red Hat
Storage One, a new approach
to web-scale enterprise
storage aimed at providing
customers the convenience of
hardware-optimized systems
while preserving the flexibility
and scale of software-defined
storage.
Red Hat announces availability
of Red Hat Storage One
Red Hat Storage One is a platform of pre-engineered systems, created in close
collaboration with Red Hat’s server hardware partners.
hardware, and support of the
solution.
With rapidly increasing data
volumes, many organizations
are facing pressure to modernize
traditional systems. As a result,
many enterprises now want the
benefits of software-defined
storage without investing in the
deep skill sets that may be required
to configure and tune the systems.
Unlike many proprietary,
monolithic storage systems that
are labeled software-defined
storage only in name, Red Hat
Storage One offers an open,
flexible, and modular solution
that can easily be extended
to meet the evolving needs of
the modern enterprise. Red
Hat Storage One can help
customers get the flexibility of
software-defined storage and
the convenience of storage
appliances, with features such as
ease of installation, workload and
hardware optimization, flexible
scalability and cost effective.
Ranga Rangachari, Vice
President and general Manager,
Red Hat Storage, said, “Many
of our storage customers are
looking to purchase and deploy
a packaged solution that
requires little customization.
We are excited to bring together
the flexible, software-defined
power of Red Hat Storage with
resilient hardware from our
partner ecosystem to make
software-defined storage more
appealing.”
Mai-Lan Tomsen Bukovec, AWS
Ranga Rangachari, Red Hat Storage
Red Hat Storage One is
designed to provide more of a
plug-and-play approach to the
procurement, deployment, and
performance tuning of software-
defined storage, ushering in a
new wave of enterprise storage
to meet the varying demands
of modern workloads. Red Hat
Storage One is a platform of
pre-engineered systems, created
in close collaboration with Red
Hat’s server hardware partners,
that delivers tightly packaged
workload-optimized storage
solutions. The fulfillment and
support is offered via Red Hat’s
hardware partner ecosystem.
Supermicro is the first Red
Hat server partner offering a
single part number for software,
For more information, please write to sales.value@redingtonmea.com
Cloud Services
Appliance-Based Products
Barracuda Email Protection
Comprehensive, elegantly simple
protection against email-borne threats
to your users, brand, and business.
ESS
ESG
PL
MA
SENBarracuda
Essentials
Barracuda
Email security
Gateway
Barracuda
PhishLine
Barracuda
Message Archiver
Barracuda
Sentinel
For more details contact: MarketingMET_Team@barracuda.com
Redington Value Journal - May 2018

Mais conteúdo relacionado

Mais procurados(18)

Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
Redington Value Distribution278 visualizações
Redington Value Journal - January 2017Redington Value Journal - January 2017
Redington Value Journal - January 2017
Redington Value Distribution424 visualizações
Redington Value Journal - July 2018Redington Value Journal - July 2018
Redington Value Journal - July 2018
Redington Value Distribution859 visualizações
Chapter 1Chapter 1
Chapter 1
Eba Tolesa56 visualizações
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
Redington Value Distribution190 visualizações
Accenture: ACIC Rome & Commvault Accenture: ACIC Rome & Commvault
Accenture: ACIC Rome & Commvault
Accenture Italia4.6K visualizações
Deloitte Software As A Service   Deloitte SeminarDeloitte Software As A Service   Deloitte Seminar
Deloitte Software As A Service Deloitte Seminar
Theo Slaats3.3K visualizações
Cloud Insights from 110 ProjectsCloud Insights from 110 Projects
Cloud Insights from 110 Projects
None557 visualizações
Achieving Cloud Enterprise AgilityAchieving Cloud Enterprise Agility
Achieving Cloud Enterprise Agility
Steven_Jackson540 visualizações
Cisco ONE Software Delivers Better Business OutcomesCisco ONE Software Delivers Better Business Outcomes
Cisco ONE Software Delivers Better Business Outcomes
John Brigden3.2K visualizações
Democratizing IT Automation in a Multi-Cloud WorldDemocratizing IT Automation in a Multi-Cloud World
Democratizing IT Automation in a Multi-Cloud World
Enterprise Management Associates91 visualizações
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
Paulo Renato139 visualizações
Hyper-V improves appliance manufacturer’s productivityHyper-V improves appliance manufacturer’s productivity
Hyper-V improves appliance manufacturer’s productivity
Microsoft Private Cloud1.8K visualizações
AcXess saves U.S.$5 million in hardware with Hyper VAcXess saves U.S.$5 million in hardware with Hyper V
AcXess saves U.S.$5 million in hardware with Hyper V
Microsoft Private Cloud1.1K visualizações
Asigra Product Marketing StrategyAsigra Product Marketing Strategy
Asigra Product Marketing Strategy
Jas Mann2.2K visualizações
Supercharging the Cloud  for an Agile EnterpriseSupercharging the Cloud  for an Agile Enterprise
Supercharging the Cloud for an Agile Enterprise
Patrick Bouillaud1.6K visualizações

Similar a Redington Value Journal - May 2018

Accenture  & CommvaultAccenture  & Commvault
Accenture & CommvaultAccenture Italia
4.3K visualizações16 slides
Comguard expanding-portfolioComguard expanding-portfolio
Comguard expanding-portfolioxband
133 visualizações2 slides

Similar a Redington Value Journal - May 2018(20)

Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
Redington Value Distribution90 visualizações
Redington Value Journal - November 2017Redington Value Journal - November 2017
Redington Value Journal - November 2017
Redington Value Distribution218 visualizações
Accenture  & CommvaultAccenture  & Commvault
Accenture & Commvault
Accenture Italia4.3K visualizações
Redington Value Journal - July 2017Redington Value Journal - July 2017
Redington Value Journal - July 2017
Redington Value Distribution1.4K visualizações
securematics_vendor_line_card 2015securematics_vendor_line_card 2015
securematics_vendor_line_card 2015
Nelson Venezia134 visualizações
Comguard expanding-portfolioComguard expanding-portfolio
Comguard expanding-portfolio
xband133 visualizações
Company ProfileCompany Profile
Company Profile
ITB001313 visualizações
Redington Value Journal - December 2017Redington Value Journal - December 2017
Redington Value Journal - December 2017
Redington Value Distribution508 visualizações
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
Redington Value Distribution193 visualizações
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
Redington Value Distribution145 visualizações
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
Redington Value Distribution459 visualizações
Contrail Launch: Capitalize on SDN and Cloud. Now.Contrail Launch: Capitalize on SDN and Cloud. Now.
Contrail Launch: Capitalize on SDN and Cloud. Now.
Juniper Networks3.2K visualizações
Redington Value Journal - August 2016Redington Value Journal - August 2016
Redington Value Journal - August 2016
Redington Value Distribution184 visualizações
Redington Value Journal - April 2018Redington Value Journal - April 2018
Redington Value Journal - April 2018
Redington Value Distribution284 visualizações
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
Redington Value Distribution224 visualizações
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
Redington Value Distribution54 visualizações
Redington Value Journal - June 2016Redington Value Journal - June 2016
Redington Value Journal - June 2016
Redington Value Distribution748 visualizações
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World566 visualizações
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
Nazneen Sheikh727 visualizações

Mais de Redington Value Distribution

Mais de Redington Value Distribution(18)

Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
Redington Value Distribution942 visualizações
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
Redington Value Distribution227 visualizações
Value journal June 2020Value journal June 2020
Value journal June 2020
Redington Value Distribution421 visualizações
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
Redington Value Distribution279 visualizações
Value journal March2020Value journal March2020
Value journal March2020
Redington Value Distribution396 visualizações
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
Redington Value Distribution266 visualizações
Value journal November_2019Value journal November_2019
Value journal November_2019
Redington Value Distribution172 visualizações
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
Redington Value Distribution620 visualizações
Value journal October_2019 Value journal October_2019
Value journal October_2019
Redington Value Distribution217 visualizações
Value journal September_2019 Value journal September_2019
Value journal September_2019
Redington Value Distribution348 visualizações
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
Redington Value Distribution151 visualizações
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
Redington Value Distribution221 visualizações
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
Redington Value Distribution454 visualizações
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
Redington Value Distribution93 visualizações
Redington Value Journal - April 2019Redington Value Journal - April 2019
Redington Value Journal - April 2019
Redington Value Distribution1.5K visualizações
Redington Value Journal - January 2019Redington Value Journal - January 2019
Redington Value Journal - January 2019
Redington Value Distribution978 visualizações
Redington Value Journal - November 2018Redington Value Journal - November 2018
Redington Value Journal - November 2018
Redington Value Distribution339 visualizações
Value Stories - 2nd issue - October 2018Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018
Redington Value Distribution548 visualizações

Último(20)

Micron CXL product and architecture updateMicron CXL product and architecture update
Micron CXL product and architecture update
CXL Forum23 visualizações
TE Connectivity: Card Edge InterconnectsTE Connectivity: Card Edge Interconnects
TE Connectivity: Card Edge Interconnects
CXL Forum95 visualizações
CXL at OCPCXL at OCP
CXL at OCP
CXL Forum203 visualizações
Liqid: Composable CXL PreviewLiqid: Composable CXL Preview
Liqid: Composable CXL Preview
CXL Forum120 visualizações
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
METHOD AND SYSTEM FOR PREDICTING OPTIMAL LOAD FOR WHICH THE YIELD IS MAXIMUM ...
Prity Khastgir IPR Strategic India Patent Attorney Amplify Innovation24 visualizações
MemVerge: Memory Viewer SoftwareMemVerge: Memory Viewer Software
MemVerge: Memory Viewer Software
CXL Forum117 visualizações

Redington Value Journal - May 2018

  • 1. Continued on page 3 Dell EMC has introduced its Virtual Edge Platform (VEP) family, the first-to-market software-defined wide area network solution (SD-WAN) with the new Intel Xeon D-2100 processor, to help speed digital transformation by connecting the enterprise edge to the cloud via universal Customer Premise Equipment (uCPE). The new virtualized solutions will enhance or displace expensive fixed-function access hardware. As a leading use case, the Dell EMC VEP provides next-generation access to the network via SD-WAN. By enhancing WAN operations and economics, service providers and enterprise customers can drive growth, strengthen competitive differentiation and improve the end-user experience. Built with advanced intelligence for network virtualization and software-defined architecture, the Dell EMC VEP4600 provides an open Intel architecture-based platform to support multiple simultaneous virtual network functions (VNF). Numerous proprietary physical devices can be consolidated into this overall security benchmark score. It will also let organizations compare their results to those with similar profiles using built-in machine learning. Attack Simulator, a part of Office 365 Threat Intelligence, lets security teams run simulated attacks to event-test their employees’ responses and tune configurations accordingly. Also available with the upcoming Windows 10 update, are new automated investigation and remediation capabilities in Windows Issue 22 // May 2018 New platform family and software bundles enhance SD-WAN to speed digital transformation and expand opportunities for service providers and enterprises. DELL EMC TAKES OPEN NETWORKING TO THE EDGE FOR NEXT-GENERATION ACCESS Continued on page 3 emerging threats aimed at IoT and edge devices. Microsoft is introducing Azure Sphere, the industry’s first holistic platform for creating highly secured, connected MCU devices on the intelligent edge. Featuring an entirely new class of MCUs with more than five times the power of legacy MCUs, an OS custom built for IoT security, and a turnkey cloud security service that guards every Azure Sphere device. With Azure Sphere, Microsoft extends the boundaries of the intelligent edge, to power and secure an entirely new category of devices. The firm has introduced several new intelligent security features for its Microsoft 365 commercial cloud offering designed to help IT and security professionals simplify how they manage security across their enterprises. Microsoft has released Microsoft Secure Score and Attack Simulator. Secure Score makes it easier for organizations to determine which controls to enable to help protect users, data and devices by quickly assessing readiness and providing an Microsoft has announced several new intelligent security tools and technologies to help enterprises more easily secure their data and networks against today’s biggest threats as well as address  Microsoft announces new intelligent security innovations The new security features enable enterprises to secure their data and networks more easily. Redington Value is a value added distributor for the following brands in parts of Middle East & Africa: For more information, please write to sales.value@redingtonmea.com
  • 2. www.redingtonvalue.com sales.value@redingtonmea.com H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE
  • 3. 3 Redington Value signs new vendor partnerships The regional distributor has partnered with IoT vendor PTC and cybersecurity leader Imperva. Redington Value has signed a Middle East and Africa distribution agreement with PTC, a renowned global Internet of Things (IoT) solutions provider. According to the terms of the agreement, Redington will enable its extensive partner network to deliver PTC solutions to enterprise customers in the region. “Redington’s ecosystem of partners can capitalise on PTC’s promise of physical digital convergence today and drive the future of innovation,” said Georges Millet, EMEA Channel Sales Vice President at PTC. “Combining the world-class components of ThingWorx with Redington’s knowledge and network of partners will offer IoT innovation and adoption to customers within MEA.” The distributor has also signed a distribution agreement with Imperva, a cybersecurity leader that delivers solutions to protect data and applications in the cloud and on-premises. The distributor will offer Imperva solutions including web application firewall and DDoS protection offering to its partners across the Middle East. “We are excited to work with Imperva as this crucial relationship helps us to expand and develop our security offerings. Through this relationship, our in-region partners have access to the winning combination of Imperva’s best-in-class security portfolio and our outstanding services, training and sales support capabilities,” said Ramkumar Balakrishnan, president, Redington Gulf, Value Distribution. From page 1From page 1 Microsoft announces Dell EMC takes... We are in an industry that is at high risk of disruption by new digital technologies. It is of prime importance that resellers employ a continuing skillset development program for their technical folks. Security is still a new skill set, one that is highly specialized and in high demand. As a VAD, we offer many avenues for our reseller partners to up and hone their security skill set. For example, we conduct product trainings, technical hands-on training, Shadow Pre-Sales and Post Sales, Webinars and ATC programs. Another important initiative we have taken is the Red Vault – which is a state-of-the-art customer experience and learning center. We will extend any support needed to our partners to help transform and make themselves relevant for the years to come. But for this to happen resellers must become agile in their business, focus on building expertise, have a strategy in place to scale and more importantly are willing to embrace latest technologies. We have also developed a few programs for our partners to help in their transformation. Here we employ our consultants to conduct workshops and help design strategies and time bound plans for our partners to transform their business and embrace the change. We will continue investing in equipping our channel partners to bring emerging tech to main stream, introduce vertical-based business outcome solutions and build ‘Strategy-to-Execution’ capability on cloud computing, IIOT and Data Analytics. . Poweringpartners’ transformation By Pradeep Kumar, Principal Consultant, Security, Redington Value COLUMN: REDefined single uCPE while maintaining the high performance levels needed to host many. The modular design includes room to grow with front panel expandability so the platform can be easily upgraded or serviced in the field as needed.  The VEP 4600 is powered by the new Intel Xeon D-2100 product family, Intel QuickAssist Technology (Intel QAT), and Data Plane Development Kit (DPDK). These features help optimise compute resources and provide efficiency for growing security workloads.    The Intel Xeon Processor D-2100 product family’s performance, power and form factor have been tuned for higher performance-per- watt for SD-WAN and uCPE. It delivers more than 1.5x faster CPU performance, up to 2x improvement in packet processing, 2x memory bandwidth and up to 4x memory capacity. These processors enable complex packet processing and Defender ATP, leveraging artificial intelligence and machine learning to quickly detect and respond to threats on endpoints, within seconds, at scale. Microsoft also announced a preview of a new security API for connecting Microsoft Intelligent Security Graph-enabled products as well as intelligence from solutions built by customers and technology partners to greatly enhance the fidelity of intelligence. Microsoft also is announcing a new Microsoft Intelligent Security Association for security technology partners so they can benefit from, and contribute to, the Intelligent Security Graph and Microsoft security products. Members of the association will be able to create more integrated solutions for customers that provide greater protection and detect attacks more quickly. Palo Alto Networks and Anomali join PwC and other existing partners as founding members of the new association. Ramkumar Balakrishnan, Redington Value other scale-out workloads with responsiveness and low latency.  The cost- and power- efficient Dell EMC VEP4600 expands upon Dell EMC’s Open Networking initiative that offers customers choice and the ability to protect their investment.  To help service providers speed time to market and enterprises simplify deployments, Dell EMC offers three validated solutions using the VEP4600. These solutions provide turnkey SD-WAN capabilities with pre-validated and pre-integrated configurations combining Dell EMC infrastructure and support services with industry- leading SD-WAN software from Silver Peak Systems, VeloCloud Networks and Versa Networks. Architected and tested to Dell EMC standards, these offerings enable customers to quickly deploy cost effective SD-WAN solutions or managed services.  The Dell EMC VEP4600 has begun shipping worldwide from April 24, 2018. For more information, please write to sales.value@redingtonmea.com
  • 4. 4 Hewlett Packard Enterprise has announced a definitive agreement to purchase privately-held Cape Networks based in Cape Town, South Africa, and San Francisco. Cape Networks will become a part of Aruba, a Hewlett Packard Enterprise company, and will expand Aruba’s Artificial Intelligence (AI) powered networking capabilities with a sensor-based service assurance solution that gives customers a simple, proactive, and network- agnostic tool for measuring and monitoring SaaS, application, and network services. The solution helps organizations deliver the Cape Networks’ solution complements Aruba NetInsight, and together will deliver comprehensive AI-powered analytics and assurance so that customers can quickly adapt to changes in the user, device, application, and network environments. “Cape Networks strengthens and further differentiates the Aruba Mobile First Architecture with a simple and intuitive, yet powerful, approach to optimizing the end-user experience,” said Partha Narasimhan, CTO, Aruba, a Hewlett Packard Enterprise company. “With Cape Networks, IT can easily deploy HPE to acquire Cape Networks Acquisition expands Aruba’s AI-powered analytics and assurance capabilities.       and use a network of sensors to proactively optimize and remotely troubleshoot end user experiences for on-premises and cloud applications such as SAP, Salesforce.com, Microsoft Office and Wi-Fi captive portals.” best possible end user experience by enabling IT to get ahead of service quality issues before they occur, accelerate time to resolution, and lower cost of operations. By applying a sensor-based and network agnostic approach to service assurance, Cape Networks proactively tests the availability and performance of services and applications, alerting IT professionals of issues before they impact the user or the business. Cape Networks delivers easy-to- use insights with a simple and intuitive dashboard that helps eliminate the guesswork for IT. Fortinet has announced the industry’s first purpose- built NOC-SOC solution that bridges workflows, analysis and automated response across operational and security processes. Building on the Fortinet Security Fabric architecture, Fortinet has combined the latest capabilities of FortiManager 6.0, FortiAnalyzer 6.0 and FortiSIEM 5.0 to offer a unique NOC-SOC management and analytics solution. NOC-SOC approach to management enables Fortinet delivers integrated NOC-SOC solution New management and analytics solution integrates Network Operations Center (NOC) and Security Operations Center (SOC) to bridge gap across silos uncovering compromised hosts. John Maddison, senior vice president, Products and Solutions, Fortinet, says, “As the industry faces a cyber talent shortage and the pressure to maintain operational efficiency and security efficacy is critical for digital business, a new approach is needed that brings visibility and control into the NOC with workflow and response automation in the SOC. Fortinet is introducing a customized NOC-SOC solution that bridges the gap across IT disciplines to achieve broad and automated security response.” IT Service Management (ITSM) integration. Integration across security disciplines – not merely products – enables a greater level of visibility, control and operational management. Fortinet’s new NOC-SOC solution combines the latest capabilities of FortiManager, FortiAnalyzer and FortiSIEM, coalescing the operational context of the NOC, such as appliance status, network performance and application availability, with the security insights of the SOC, including breach identification, stopping data exfiltration, and Fortinet is introducing a customized NOC-SOC solution that bridges the gap across IT disciplines to achieve broad and automated security response.” John Maddison, Fortinet Partha Narasimhan, Aruba, a Hewlett Packard Enterprise company enhanced security operations visibility with a new graphical Security Fabric topology view and extensions into both private and public cloud environments, with dynamic policy objects. New Security Rating feature combines analytics from FortiGate, FortiAnalyzer and FortiManager with threat intelligence services from FortiGuard to provide enterprises with a quantifiable security posture. Rating includes expanded audit rules, risk scoring and industry benchmarking with customized auditing based on network environments. New Incident Response (IR) tracking capabilities allow users to automate responses across silos based either on predefined triggers (system events, threat alerts, user and device status) or through direct ServiceNow For more information, please write to sales.value@redingtonmea.com
  • 5. 555 Ed Jennings, Mimecast Mimecast offers cyber resilience for email with new capabilities 53 percent predict their organization will suffer from an email-borne attack in 2018 percent of the 800 IT-decision makers who responded said they saw an increase of these types of attacks over the past 12 months. Impersonation Protect, from Mimecast, will offer supply chain impersonation protection to guard companies against similar or lookalike third party email domains, helping to stop these attacks before they could cause any issue. Mimecast has incorporated new capabilities within Impersonation Protect and URL Protect that are designed to use new algorithms to protect internal users from similar or lookalike domains. New real-time data feeds have also been added to Impersonation Protect engineered to better identify newly observed and registered domains to further enhance Mimecast’s ability to detect security threats. “Cybercriminals are constantly looking for new ways to be stealthy and trick users, which was the key driver for us to enhance Targeted Threat Protection with these new capabilities,” said Ed Jennings, Chief Operating Officer. Available in June 2018, these new features will be delivered through Mime|OS, a 100 percent single cloud platform that underpins the Mimecast services, and via a single administration console with a simple to use user interface. Mimecast has announced enhancements to its Targeted Threat Protection services - Impersonation Protect, URL Protect, and Internal Email Protect – engineered to combat and remediate the evolving threat landscape. New features include supply chain impersonation protection, similar domain detection, the integration of new automated intelligence feeds, as well as the introduction of automated threat remediation capabilities. New research from Mimecast and Vanson Bourne revealed that organizations are not only facing a variety of different threats, but the volume and frequency of these attacks continue their upward trajectory. Malwarebytes Endpoint Protection and Response provides proven endpoint protection with integrated detection and response capabilities via a single agent.” In fact, 53 percent expect a negative business impact from these email- borne threats in 2018. Impersonation attacks commonly use social engineering, and are designed to trick users such as finance managers, executive assistants, and HR representatives into making wire transfers or providing information which can be monetized by cybercriminals. Normally, these attacks target people from within the same company; however, attackers have started to impersonate senders from so called trusted third parties that the target company does business with regularly. New Mimecast and Vanson Bourne research found that 40 Malwarebytes has announced the release of Malwarebytes Endpoint Protection and Response. Marcin Kleczynski, CEO, Malwarebytes, said, “Malwarebytes Endpoint Protection and Response provides proven endpoint protection with integrated detection and response capabilities via a single agent, so organizations of all sizes can easily protect their endpoints from targeted attacks, thoroughly remediate systems and rollback ransomware.” Malwarebytes introduces endpoint protection and response solution Malwarebytes Endpoint Protection and Response allows organizations to proactively hunt for malware across all of their endpoints without the need for a dedicated resource. Key features include: • Cloud-based single management console and a unified agent. • Continuous monitoring and visibility of endpoints – Endpoint Protection and Response’s flight recorder provides continuous monitoring and visibility into Windows desktops to obtain powerful insight. • Multi-layered protection – Malwarebytes Endpoint Protection and Response’s multi-vector protection (MVP) uses a seven-layered approach, which includes both static and dynamic detection techniques. • Rapid identification and three modes of endpoint isolation – When an endpoint is compromised, Malwarebytes stops the bleeding by isolating the endpoint. Endpoint Protection and Response is the first product to offer three ways to isolate an endpoint. Network isolation restricts which processes can communicate. Process isolation controls which processes are allowed to keep functioning. Desktop isolation alerts the end user and halts further interaction to limit damage. • Complete remediation and ransomware rollback – Malwarebytes proprietary Linking Engine provides complete and thorough remediation to rapidly return an endpoint to a healthy state and minimize impact to the end-user, post-compromise. Rollback technology winds back the clock up to 72 hours, negating the impact of ransomware with just-in-time backups prior to infection. Malwarebytes Endpoint Protection and Response allows organizations to proactively hunt for malware across all of their endpoints without the need for a dedicated resource. Marcin Kleczynski, Malwarebytes For more information, please write to sales.value@redingtonmea.com
  • 6. 6 SonicWall, the trusted security partner protecting more than 1 million networks worldwide, introduces the SonicWall Capture Cloud Platform, which tightly integrates security, network, email, mobile and cloud security products. SonicWall also is introducing new and enhanced products in its portfolio of SonicWall announces Capture Cloud Platform SonicWall Capture Cloud Platform delivers integrated security, management, analytics and control across entire SonicWall portfolio. Toaidorganizationsinmitigating growingvolumesandvariantsof cyberattacks,theSonicWallCapture CloudPlatformprovidesintelligence, managementandanalyticsto supplementSonicWall’scomplete portfolioofcybersecurityhardware, virtualappliancesandendpoint clientsforanefficient,easy-to-use andconnectedcustomerexperience. Thenewlyannouncedcloudplatform includescapturesecuritycenter, captureAdvancedThreatProtection (ATP),captureclient,hostedemail securityandcaptureLabsThreat Network. One of the cornerstones of the SonicWall Capture Cloud Platform is the SonicWall Capture Security Center, originally released as SonicWall Cloud GMS. Delivered as a cost-effective service offering, the SonicWall Capture Security Center offers the ultimate in visibility, agility and capacity to govern entire SonicWall security operations and services with greater clarity, precision and speed — all from a single pane of glass. Bill Conner, President and CEO, SonicWall, said, “The new SonicWall Capture Cloud Platform ensures organizations are always protected by the absolute latest information — updates, signatures and alerts — to automatically defend their networks from the most advanced cyberattacks.” ThenewSonicWallCaptureCloudPlatform ensuresorganizationsarealwaysprotected bytheabsolutelatestinformationto automaticallydefendtheirnetworksfrom themostadvancedcyberattacks.” Veritas Technologies has debuted an enriched partner program focused on helping the channel drive growth and profitability. The new Veritas Partner Force program is designed to create higher earnings potential for more than 10,000 global partners who want to capitalize on Veritas’ 360 data management Veritas revamps channel program to drive partner growth Theredesignedprogramenablespartnerstoaddressandbenefitfromincreasedcustomerdemandfordatamanagementsolutions portfolio and multi-cloud data management solutions. The Veritas Partner Force program is dramatically simplified, making it much easier for partners to reap more benefits and rewards. Additionally, partners will have access to a plethora of educational offerings that will empower them to help customers solve some of their biggest data management challenges. The revamped program also offers expanded revenue opportunities to attract a new generation of worldwide resellers, service providers, system integrators and distributors. “The channel continues to evolve as many of our partners are developing more of their own intellectual property and are focused on selling business solutions versus point-products,” said Barbara Spicek, Vice President, Global Channels and Alliances, Veritas. “Recognizing the changing needs of the channel, Veritas is increasing technical assets, deepening skills and enhancing opportunities to make it easier for our broad ecosystem of partners to help customers harness the power of their data on-premises and in multi-cloud environments.” Key new components of the Veritas Partner Force program include increasing opportunities for existing partners with greater earnings potential, building new revenue streams for partners selling to commercial and mid- market accounts, expanding the company’s Global Distribution Program to drive growth and innovation and boosting partner resources for a faster path to revenue and success. Partners can also choose from a variety of new accreditation courses and skills evaluations, based on their business practices. Online courses such as Veritas NetBackup Architecture, Challenges in Backup and Recovery, and Risk Mitigation and Compliance are offered as part of the redesign. New e-learning courses will be added regularly to address newly introduced Veritas offerings as well as customer challenges. Bill Conner, SonicWall Barbara Spicek, Veritas hardware, virtual appliances and endpoint clients. The SonicWall Capture Cloud Platform identified more than 49,800 new attack variants in the first quarter, with SonicWall Real- Time Deep Memory InspectionTM (RTDMI) identifying 3,500 never- before-seen variants. For more information, please write to sales.value@redingtonmea.com
  • 7. 7 Accelerate your Digital Transformation with Red Hat and Barq Systems - Riyadh - 30 April Fortinet NSE 5 Technical Workshop - Dubai - 25-26 April Palo Alto cloud Workshop - Dubai - 24 April Fortinet NSE 4 Technical Workshop - Dubai - 23-24 April Fortinet NSE 4 Technical Workshop - Dubai - 23-24 April Fortinet NSE 4 Technical Workshop - Dubai - 29-30 April Microsoft Azure Technical Training on Deployment and Migration - Dubai - 21-23 April Barracuda Customer Executive Workshop - Dubai - 1-5 April Fortinet Partner Day with partner OCS Infotech - Oman - 30 April Palo Alto cloud Workshop - Egypt - 30 April Dell EMC Partner Enablement Session - Jeddah - 15 April HPE Channel Seminar - Oman - 25 April Palo Alto TRAPS workshop with BARQ Systems - Riyadh - 25 April For more information, please write to sales.value@redingtonmea.com
  • 8. 8 Palo Alto cloud Workshop - Dubai - 24 April Red Hat Partner Awards powered by Redington Value - Dubai - 22 April SonicWall Get Secured Seminar - Dubai - 3 April Splunk Partner Immersion Training Session - Dubai - 3 April Splunk Partner Conference 2018 - Emerging Markets - Dubai - 17 April Redington Value empowering the Channel Community at the Fortinet Partner Sync - Dubai - 11 April Redington Value Proud Partner of Nutanix .Next Forum - Dubai - 10 April Splunk SE1 Bootcamp - Dubai - 2 April StorageCraft Data Management Workshop - Dubai - 2 April Red Hat Partner Awards powered by Redington Value - Dubai - 22 April-1 For more information, please write to sales.value@redingtonmea.com
  • 9. 9 Cambium Networks - Partner Enablement Session - Kenya - 12 & 13 April Microsoft - Partner Roundtable - Kenya - 26 April Tripplite - Lunch & Learn Partner Session - Kenya - 19 April Cisco - Hyperflex Partner Workshop - Nigeria - 25 April Cisco - NPL Orientation & Acceleration Sessions - Nigeria - 5 April Cisco - Partner Enablement Session - Nigeria - 11 April Cisco - End User Event With Carrel Technologies - South Sudan - 18 April Microsoft - Partner Roundtable - Nigeria - 12 April Microsoft - Partner Roundtable - Nigeria - 26 April Cisco - End User Event With CATS Tanzania - Tanzania - 13 April Microsoft - Partner Roundtable - Kenya - 12 April For more information, please write to sales.value@redingtonmea.com
  • 10. 10 Amazon S3’s new lowest cost storage class offers a single Availability Zone storage option for infrequently accessed data such as copies of data, backups, off-site compliance, and disaster recovery. Amazon Web Services (AWS), an Amazon.com company has announced Amazon Simple Storage Service (Amazon S3) One Zone-Infrequent Access (Z-IA), a new Amazon S3 storage class that stores objects in a single Availability Zone. Amazon S3 Z-IA is designed for customers who want a lower-cost option for infrequently accessed data, but do not require the multiple Availability Zone data resilience model of the S3 Standard and S3 Standard-Infrequent Access storage classes. S3 Z-IA is intended for use cases with infrequently accessed data that is also re-creatable, such as storing secondary backup copies of on- premises data, or for storage that AWSannouncesAmazon S3 One Zone-Infrequent Access(Z-IA) is already replicated in another AWS Region for compliance or disaster recovery purposes. S3 Z-IA is available today in all commercial AWS Regions. AWS Regions are comprised of Availability Zones, which refer to technology infrastructure in separate and distinct geographic locations with enough distance to significantly reduce the risk of a single event impacting availability, yet near enough for business continuity applications that require rapid failover. Amazon S3 object storage classes (S3 Standard and S3 Standard-IA) and Amazon Glacier store data across multiple geographically-separated Availability Zones to offer the highest level of resilience. With Amazon S3 Z-IA, customers can now store infrequently accessed data within a single Availability Zone at 20 percent lower cost than S3 Standard- IA. In addition, S3 Z-IA offers customers higher availability and durability than self-managed physical data centers, with the added benefit of having to pay only for what they use. Mai-Lan Tomsen Bukovec, Vice President, Amazon S3, AWS, said, “Amazon S3 Z-IA is ideal for customers who want storage for infrequently accessed objects, don’t need the durability of multiple Availability Zones, and want to save cost with our lowest priced storage tier in Amazon S3.” A single Amazon S3 bucket can store a mixture of S3 Z-IA, S3 Standard, and S3 Standard- IA storage classes, letting storage administrators make decisions based on the nature of the data, data access patterns, and cost without having to change any applications. Red Hat has announced the general availability of Red Hat Storage One, a new approach to web-scale enterprise storage aimed at providing customers the convenience of hardware-optimized systems while preserving the flexibility and scale of software-defined storage. Red Hat announces availability of Red Hat Storage One Red Hat Storage One is a platform of pre-engineered systems, created in close collaboration with Red Hat’s server hardware partners. hardware, and support of the solution. With rapidly increasing data volumes, many organizations are facing pressure to modernize traditional systems. As a result, many enterprises now want the benefits of software-defined storage without investing in the deep skill sets that may be required to configure and tune the systems. Unlike many proprietary, monolithic storage systems that are labeled software-defined storage only in name, Red Hat Storage One offers an open, flexible, and modular solution that can easily be extended to meet the evolving needs of the modern enterprise. Red Hat Storage One can help customers get the flexibility of software-defined storage and the convenience of storage appliances, with features such as ease of installation, workload and hardware optimization, flexible scalability and cost effective. Ranga Rangachari, Vice President and general Manager, Red Hat Storage, said, “Many of our storage customers are looking to purchase and deploy a packaged solution that requires little customization. We are excited to bring together the flexible, software-defined power of Red Hat Storage with resilient hardware from our partner ecosystem to make software-defined storage more appealing.” Mai-Lan Tomsen Bukovec, AWS Ranga Rangachari, Red Hat Storage Red Hat Storage One is designed to provide more of a plug-and-play approach to the procurement, deployment, and performance tuning of software- defined storage, ushering in a new wave of enterprise storage to meet the varying demands of modern workloads. Red Hat Storage One is a platform of pre-engineered systems, created in close collaboration with Red Hat’s server hardware partners, that delivers tightly packaged workload-optimized storage solutions. The fulfillment and support is offered via Red Hat’s hardware partner ecosystem. Supermicro is the first Red Hat server partner offering a single part number for software, For more information, please write to sales.value@redingtonmea.com
  • 11. Cloud Services Appliance-Based Products Barracuda Email Protection Comprehensive, elegantly simple protection against email-borne threats to your users, brand, and business. ESS ESG PL MA SENBarracuda Essentials Barracuda Email security Gateway Barracuda PhishLine Barracuda Message Archiver Barracuda Sentinel For more details contact: MarketingMET_Team@barracuda.com