Tải bản đầy đủ (.pdf) (44 trang)

IT training SME channels TruePDF february 2019

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (8.2 MB, 44 trang )

PLUS

Fortinet Rolls out Next-Generation Firewalls to Deliver Intent-based Segmentation
/06

www.smechannels.com

india’s leading IT magazine for channel business
VOLUME 09 | ISSUE 12 | PAGES 44 | FEBRUARY 2019 | RS. 20/-

SME CHAT / 19
Unistal: Our products are
designed to prevent data
leakage and provide protection
against various

SECURITY /22
FORTINET: Preparing for
Cyber Threats in 2019

SECURITY /24
Check Point: Check point’s
infinity architecture provides
gen v security securing
assets of organizations

THE
CHANGING

IT


SECURITY

LANDSCAPE

1


ONE SUPPLIER, TWO
SUPPLIERS, THREE
SUPPLIERS FOUR…
FINDING THE RIGHT SECURITY PARTNER
can sometimes feel like a never ending children’s game. One for small business,
another for mid-sized and yet a third for my large enterprise customers.
Fortinet is the only company that offers the full range of solutions that are needed
in today’s environment, solutions that seamlessly scale from small business to large
enterprise. The Fortinet Security Fabric architecture ensures that organizations of all
sizes can equally be protected without compromise.
Fortinet is there for you with no need for any games.
For details contact:
North: Sanjeev Tyagi, E-mail: , M: +91 98105 00157
South: Binu Ninan, E-mail: , M: +91 98400 36767
West, East, Central: Navin Mehra, E-mail: , M: +91 98925 60700

FORTINET SECURITY FABRIC
A Security Architecture that’s Broad,
Integrated and Automated

www.fortinet.com/whyfortinet



PLUS

India Most Digitally Mature Country in the World: Dell /06
www.smechannels.com

india’s leading IT magazine for channel business
SECURITY/20

SECURITY/36

CYBER AWARENESS

EMERGING CYBER SECURITY
CHALLENGES – NEW THREAT
LANDSCAPE

SECURITY

/39
4 WAYS TO PROTECT
YOURSELF FROM CYBER
CRIMINALS WHEN SHOPPING
ONLINE

MY EXPERIENCE
EDITORIAL

LOOKING BEYOND
BOUNDARIES
SANJAY MOHAPATRA




We just started our 2019 journey of events from Bangladesh. The event is Enterprise It World and
Infosec Foundation Global Security Symposium & Cyber Sentinel Awards 2019. A great experience to
do it because after doing some events in overseas market – specially in Dubai, we were under impression that it is the only exciting market in the APAC region but amazing Bangladesh growing at nearly
8% more than any other country – courtesy garment exports of the country, manufacturing of generic
medicines and growth of banking sector among others. But along with growth the country is seeing
huge cyber attacks from the hackers. Therefore, opportunity of doing business in Bangladesh is also
great.
Bangladesh is the second largest exporter of garments to the global market after China, it has huge
manufacturing units of generic medicines, it is also becoming stronger in contact center and call
center services. Bangladesh has also embarked upon strong digital journey. It means ICT market in
Bangladesh is on rise. I was speaking to Mr. M. A. Mannan, Honorable Minister, Ministry of Planning, Republic of Bangladesh about the country’s stride on it path. He expressed his happiness that a
journalist is taking interest in Bangladesh economy. He quipped, “You invest in our country, we will
give you all support whatsoever to make your business successful… take all profit and give a very little
profit to us. But I assure you that if you invest $1 dollar, we will offer you opportunity of $2 dollar. We
have a huge skilled population to help you. Do not be worried.”
My sense is our neighbour wants to compete with India which is really healthy can be another land
where our partners and principals can explore. It is only 45 minutes flight from Kolkata and food habit
is like India. You won’t feel like out of the country except the airport is little crowded.

Bitdefender Endpoint
Security Solution
BITDEFENDER ‘GRAVITYZONE
ULTRA SUITE’ is a complete Endpoint Security solution that uncovers and
stops elusive threats with Detection and
Response (EDR) that works. GravityZone
Ultra integrates layered next-gen endpoint
protection and easy-to-use EDR platform to

accurately protect enterprises against even the
most elusive cyber threats. It offers prevention, automated detection, investigation and
response tools so enterprise customers can
protect their digital assets and respond to
these threats. GravityZone Ultra excels where
most products are too complex and resources
intensive. GravityZone Ultra sharply limits
the number of incidents requiring manual
analysis, reducing the operational effort
required to run an EDR solution.

SPECIFICATION: IT PROTECTS DESKTOPS,
LAPTOPS, SERVERS (PHYSICAL AND
VIRTUAL) AND MAILBOXES. SERVERS
SHOULD ACCOUNT FOR LESS THAN 35%
OF ALL UNITS.
FINAL WORDING:
Overall, the Software uses adaptive-layered
architecture that includes endpoint controls,
prevention, detection, remediation and
visibility.
OVERALL RATING

SME CHANNELS
FEBRUARY 2019

3


contents


Trusted Advisor of Channel Business

VOLUME 09
ISSUE 12

2019

JAN
ER
COV RY
STO

Publisher: Sanjib Mohapatra
Editor: Sanjay Mohapatra
Associate Editor: Deepak Singh
Sub Editor: Aritra Ghosh
Designer: Ajay Arya
Assistant Designer: Rahul Arya,
Deepak Kumar
Web Designer: Vijay Bakshi
Technical Writer: Manas Ranjan
Satya Sagar Sinha
Lead Visualizer: DPR Choudhary
MARKETING
Marketing Manager: Nidhi Kujur, Priyanka
Circulation and Printing: Panchanan Bhoi
SALES CONTACTS
Delhi 6/102, Kaushalya Park, Hauz Khas
New Delhi-110016

Phone: 91-11-41055458 / 8587835685

Bangalore
#28/1, 3rd Floor, Sri Lakshmi Krupa, Near
Shamanna Park, Model House Street,
Basavanagudi, Bangalore - 560004
Ph. No. +91 88618 21044
Mumbai Tahmeed Ansari
2, Ground Floor, Park Paradise, Kay-Bees
CHS. Ltd.,Opp. Green Park, Oshiwara,
Andheri (west), Mumbai - 400 053.
Ph. +91 22 26338546, Fax +91 22 26395581
Mobile: +91 9967 232424
E-mail:
Kolkata S Subhendu
BC-286, Laxmi Apartment, Kestopur
Kolkata-700101
Phone: 9674804389

THE CHANGING IT SECURITY
LANDSCAPE /26
Data security continues to become complex with the each passing day, but many companies have the propensity of softpedal the risks.

EDITORIAL OFFICE
Delhi: 6/103, (GF) Kaushalya Park, New
Delhi-110016, Phone: 91-11-41657670 /
46151993
Bangalore Bindiya Jadhav
#28/1, 3rd Floor, Sri Lakshmi Krupa, Near
Shamanna Park, Model House Street,

Basavanagudi, Bangalore - 560004
Ph. No. +91 88618 21044 E-Mail bindiya@
accentinfomedia.com Skype ID: b1diyajadhav

CASE STUDY
MATRIX / 31

”A MANUFACTURING
GIANT IN
MAHARASHTRA
TRUSTS
MATRIX VIDEO
SURVEILLANCE FOR
24X7 SECURITY”

SECURITY / 40

”Threat Hunting - Need of
the hour!”

SECURITY / 38

DESIGNED BY

”The Need for
Standardization in Digital
Services Delivery”

Printed, Published and Owned by Sanjib
Mohapatra


more inside
Editorial ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 03

Place of Publication: 6/101-102, Kaushalya
Park, Hauz Khas
New Delhi-110016

Phone: 91-11-46151993 / 41055458
Printed at Karan Printers, F-29/2, 1st

Snippets ~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06

floor, Okhla Industrial Area, Phase-2, New

Products ~~~~~~~~~~~~~~~~~~~~~~~~~~~~41

Delhi 110020, India.
All rights reserved. No part of this publication can be reproduced without the prior
written permission from the publisher.
Subscription: Rs.200 (12 issues)

4

SME CHANNELS

All payments favouring: Accent Info

FEBRUARY 2019


Media Pvt. Ltd.



SNIPPETS
PRODUCT | CHANNEL | CONSULTING | SERVICES

for more log on to
smechannels.com

India Most Digitally Mature
Country in the World: Dell
According to the latest Dell Technologies Digital Transformation
Index, India is the most digitally
mature country in the world.
However, businesses in India still

have a lot of work to do. Leaders in
India are more aware of the need
to prioritize digital transformation
throughout their organization: 91%
of the business leaders believe that

digital transformation should be
more widespread, compared to78%
globally. Almost half (48%) (51%
globally), believe they’ll struggle to
meet changing customer demands

within five years.

Dell Technologies, in collaboration with Intel and Vanson Bourne,
surveyed 4,600 business leaders
(director to C-suite) from mid- to
large-sized companies across the
globe to score their organizations’
transformation efforts.
The study revealed that emerging
markets are the most digitally
mature, with India, Brazil and Thailand topping the global ranking.
In contrast, developed markets are
slipping behind: Japan, Denmark
and France received the lowest
digital maturity scores.
“In the near future, every
organization will need to be a digital
organization, but our research
indicates that the majority still have
a long way to go. Organizations
need to modernize their technology
to participate in the unprecedented
opportunity of digital transformation. The time to act is now” says
Michael Dell, chairman and CEO of
Dell Technologies.

Fortinet Rolls out Next-Generation Firewalls to Deliver Intent-based
Segmentation
Fortinet has announced its new
high-performance FortiGate
Next-Generation Firewalls
(NGFWs), comprised of FortiGate 3600E, FortiGate 3400E,

FortiGate 600E and FortiGate
400E Series, enabling organizations to implement Intent-based
Segmentation into their security
architecture.

6

SME CHANNELS
FEBRUARY 2019

Intent-based Segmentation
allows organizations to achieve
granular access control, continuous trust assessment, end-to-end
visibility and automated threat
protection. In addition to delivering Intent-based Segmentation,
FortiGate 3600E offers 30Gbps
threat protection and 34Gbps
SSL inspection performance.

FortiGate 3400E offers 23Gbps
threat protection and 30Gbps SSL
inspection performance.
FortiGate has a longstanding
trajectory of earning NSS Labs
Recommended ratings in the
Next-Generation Firewalls group
tests given its high SSL inspection performance with minimal
performance degradation as one

of the reasons.

“The new FortiGate 3400E and
3600E Series provide industryleading threat protection and
SSL inspection performance
allowing customers to implement
a holistic end-to-end architecture”
says Rajesh Maurya, Regional
Vice President, India & SAARC,
Fortinet.



SNIPPETS

Sestek Becomes Avaya DevConnect
Technology Partner
Sestek, a provider of speech-enabled
smart technologies, has become
an Avaya DevConnect Technology Partner. Through direct R&D
engagement, deep product integration, and strong support relationships,
the Avaya DevConnect ecosystem
delivers a wider range of technology
options for Avaya users to drive their
business forward and provide value
to their customers, from ready-made
solutions validated for interoperability to custom-tailored applications.
By joining the Avaya DevConnect
Program, the two companies will
explore uses of Sestek’s advanced
technologies with Avaya’s leading
communications platforms. Sestek


will develop enhanced applications
for Avaya platforms to provide
customers with end-to-end solutions
that address the evolving business challenges posed by digital
transformation.
Avaya’s DevConnect Program is
intended to drive expansion of the
open and agile Avaya application
ecosystem so that more fully formed
solutions can be delivered through its
platforms. The program is designed
to deliver more customer-centric
outcomes for technology buyers, who
can be confident that they are gaining
access to the most advanced and
innovative technologies they need to
deliver solutions across the business.

NetApp Powers Ducati’s
Team for the 2019
MotoGP Championship
NetApp confirms second year as official sponsor
for the 2019 MotoGP World Championship.
NetApp will renew its official sponsorship of
the Ducati Team in the 2019 MotoGP World
Championship, enabling the digital transformation of motorcycle racing.
The new Ducati MotoGP team was presented
officially on Friday, January 18, in Neuchâtel
(Switzerland). Data-driven technological

developments on the racing bikes will boost the
performance of factory riders Andrea Dovizioso
and Danilo Petrucci, supported by test rider
Michele Pirro.
As a data-driven company, Ducati began its
partnership with NetApp last year to take advantage of the full potential of data in racing within
the Ducati Corse division. It recently expanded
the partnership to analyze vast amounts of
data throughout its business, including in
logistics, marketing and customer relationship
management.
Through the partnership, NetApp’s engineers
are working closely with Ducati’s IT team to optimize their data fabric and meet the motorcycle
manufacturer’s unique, rapidly expanding data
storage and data management needs.

8

SME CHANNELS
FEBRUARY 2019

Cryptominers Hit 10x More
Organizations than Ransomware in 2018: Check Point
Check Point has published the second instalment of its 2019
Security Report. It highlights how the tools and services
used to commit cyber-crime have become democratized,
with advanced attack methods now available to anyone
willing to pay for them, as part of the growing ‘malware-asa-service’ industry.
The Security Report reveals the key cyber-attack trends
observed by Check Point researchers during 2018, and

shows the significant growth in stealthy, complex attacks
designed to stay below the radar of enterprise security
teams. It also shows the types of cyberattacks which
enterprise IT and security teams’ rate as the biggest threats
to their organizations.
Cryptominers infected 10x more organizations than
ransomware in 2018, but only one in five IT security professionals were aware their company’s networks had been
infected by mining malware.

Array Contributes to
Smart Cities Mission
MY POINT

“NEVER HAVE WE SEEN
CUSTOMER EXPECTATIONS OR
TECHNOLOGY CHANGING AS
RAPIDLY AS IT IS TODAY, WE ARE
THRILLED TO BE ADDING THESE
PROVEN ENTERPRISE LEADERS
TO ZENDESK SO WE CAN HELP
MORE COMPANIES AROUND
THE WORLD TRANSFORM THEIR
CUSTOMER EXPERIENCES.”
MIKKEL SVANE, ZENDESK FOUNDER AND
CEO.

Array generates $5 million revenue from smart
cities projects, targets $9Mn by 2019. Array Networks is supporting ‘100 Smart Cities Mission’
initiated by the Union Government of India. The
company has been involved in various stages

of implementation for multiple cities namely
Nagpur, Ahmedabad, Davengere to name few.
Smart cities projects have contributed to Array
growth rate in 2018 of 40%. By the end of 2019,
Array aims to be part of 20 more smart cities
and targets on keeping the growth momentum.
Smart infrastructures and smart Data
Centers (DCs) are at the core of smart cities
and they manage, coordinate, and rationalize
the resources demanded. Array has assisted
in devising futuristic data centers for smart
cities by introducing unique concepts such as
Hyperconvergence in networking into the DCs.
Their advanced security solutions are designed
with network security protocols like ECC. It
enhances application security, and provides
complete visibility into various threats and
performance inhibitors, allowing organizations
to make informed and proactive security decisions. Array’s hyper converged solution stack
include ADC, Web application firewall , DDoS ,
Web vulnerability scanner , SSLi & Array MARS
Visibility & analytics tool



SNIPPETS

Bosch Opens Center
for Data Science and
Artificial Intelligence


Aspire Systems acquires UAE-based
iApps and the Oracle Business Unit of
Valforma

The Robert Bosch Center for Data Science and
Artificial Intelligence was inaugurated at the Indian
Institute of Technology Madras.
Bosch will invest 20 crores over five years in the
center. The mission of the new center is to create societal impact through multidisciplinary interactions
with government, academic, research and industrial
collaborators on core challenges in Data Science (DS)
and Artificial Intelligence (AI).
The RBC-DSAI will undertake foundational
research in many areas of AI and Data Science,
including deep learning, reinforcement learning,
network analytics, interpretable machine learning,
and domain aware AI. The areas of activity include
research projects, knowledge management and
dissemination, outreach projects, and setting up
collaborative facilities and laboratories.

Aspire Systems, announced the 100% acquisition of iApps, an Oracle Fusion Cloud
specialist, based in UAE. In addition, Aspire is also acquiring the Oracle Business
Unit from Valforma Technology Services Private Limited.
iApps is an Oracle Platinum Cloud Standard Partner with deep expertise in Oracle
Fusion ERP, HCM CX, Oracle PaaS and Omni-channel Contact Center. The acquisition of iApps and Valforma will help Aspire service mid-size and large enterprises
in their move to the cloud from on-premise applications. These acquisitions also
enable Aspire’s focussed effort to address the postmodern ERP strategy that involves
surrounding core ERP solutions with best-in-class cloud solutions to enable faster

processing, better collaboration and easier-to-use analytics.
Aspire’s global customers will now be able to leverage the Oracle Fusion Cloud
expertise of iApps and Valforma combined with the highly specialized Cloud &
Digital Services capability that Aspire offers. In addition, the capabilities of iApps
and Valforma will also help Aspire develop cloud-based IPs including iEstate, iAutodealer, iPublish, iQuote, and iEnergy which are industry-specific Oracle Fusion
Cloud implementation accelerators.

GLOBAL IT SPENDING TO REACH
$3.8 TRILLION IN 2019

EXECUTIVE MOVEMENT
DigitalOcean has appointed
Barry Cooks as chief
technology officer.

All Segments Forecast to Exhibit Growth in 2019 Despite Recession, Brexit Threat

Table 1. Worldwide IT Spending Forecast (Billions
of U.S. Dollars)

2018
SPENDING

2018
GROW (%)

2019
SPENDING

2019

GROWTH

2020
SPENDING

2020
GROWTH (%)

(%)

DATA CENTER SYSTEMS

202

11.3

210

4.2

202

-3.9

ENTERPRISE SOFTWARE

397

9.3


431

8.5

466

8.2

DEVICES

669

0.5

679

1.6

689

1.4

IT SERVICES

983

5.6

1,030


4.7

1,079

4.8

1,399

1.9

1,417

1.3

1,439

1.5

3,650

3.9

3,767

3.2

3875

2.8


COMMUNICATIONS
SERVICES
OVERALL IT

SOURCE: GARTNER (JANUARY 2019)

10 SME CHANNELS
FEBRUARY 2019

mjunction has appointed
Vinaya Varma as Managing
Director and CEO of
mjunction services limited,

Sophos has appointed
Gavin Struthers as its
regional vice president for
Asia Pacific and Japan.

Agrahyah Technologies
has roped in Naveen Kallur
as Business Head.


WE’RE NOT JUST FIREWALLS.
SonicWall automated, real-time breach detection and prevention
layers proven cybersecurity across your entire organization.
You know SonicWall because of our rich history designing high-performance firewalls. But like
your organization, SonicWall has evolved.
Today, the modern SonicWall Capture Cloud Platform delivers automated, real-time breach

detection and prevention to safeguard your business or organization.
With this layered approach, you can stop the most malicious cyberattacks, including ransomware
and encrypted threats, from compromising your network and damaging your brand.

Physical & Virtual
Firewalls

Multi-Engine
Cloud Sandbox

Public & Private
Cloud Security

Endpoint
Protection

Secure
Email

Cloud Application
Security

SD-WAN

Web Application
Firewall

Secure Remote
& Wireless Access


Unified Management
& Reporting

For more information about SonicWall solutions, contact
or visit www.sonicwall.com

© 2019 SonicWall Inc. ALL RIGHTS RESERVED. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the U.S.A. and/or other
countries. All other trademarks and registered trademarks are property of their respective owners.


SNIPPETS

HPE Enables Gujarat’s
Largest Public Hospital
offer Seamless Healthcare
Delivery
SVPIMSR has selected HPE SimpliVity 380 for its centralized datacenter infrastructure to host their mission critical
applications
The recently inaugurated Sardar Vallabhbhai Patel Institute
of Medical Sciences and Research Hospital (SVPIMSR),
Ahmedabad, Gujarat has selected HPE SimpliVity 380 for
its centralized datacenter infrastructure to host their mission
critical applications including the integrated Hospital
Information System (iHIS), Virtual Desktop Infrastructure
(VDI) and more.
Managed by the Ahmedabad Municipal Corporation
(AMC), SVPIMSR features 32 Operating Theatres, 139 Intensive Care Units, and over 1600 beds spread across 18 floors.
In addition to offering high quality healthcare services to the
people of the region, the state-of-the-art facility is designed to
meet the future demands of patients with a continued focus

on their care, safety and satisfaction.

RP tech India Enters into Cloud
Business with Acquisition of ZNet
Technologies
RP tech India (a division of Rashi Peripherals Pvt Ltd) has acquired Cloud
Services Provider ZNet Technologies. With this partnership, RP tech India
will now offer ZNet’s cutting-edge Cloud services and solutions to potential
SMB and Enterprise customers in India.
According to the terms of the acquisition, RP tech India will take a
majority stake in ZNet and will invest in enhancing R&D capabilities and
upskilling technical manpower to support latest technologies like Cloud,
IoT, AI etc. ZNet will continue to operate as an independent legal entity
and various existing brands of ZNet will continue to operate as normal.
Founded in 2009, ZNet Technologies is the leading provider of IT
and Cloud solutions. The company offers a wide range of services from
domains to high-end Cloud infrastructure managed services under the
ZNetLive brand. It offers infrastructure services from leading cloud vendors like Microsoft, AWS, Alibaba, Google and its own Data Centre based
offering to its customer base. ZNetLive powers well over 90K+ websites and
applications globally and is one of the very first Microsoft CSP in India.

Palo Alto Networks to Boost Channel
Growth
Palo Alto Networks announced several enhancements to its NextWave Partner Program, which
will boost program flexibility, fuel long-term growth and enable the expansion of partner-led
services. Palo Alto Networks introduced new options for partners to grow their businesses with
streamlined program levels, tiered discount structures, and new partner incentives aimed at
boosting margins and profitability.
Palo Alto Networks rolled out a new dedicated Managed Services Program, providing
partners a clear path for capitalizing on the rapidly growing managed services opportunity.

Palo Alto Networks has automated systems and processes to make doing business easier.
These advancements simplify the quoting and approval process to accelerate the sales cycle and
improve the overall partner experience.

HARMAN Professional Solutions Extends
their Indian Enterprise Portfolio Distribution Rights
HARMAN Professional Solutions announced their distribution partnership with Brightstar
India to include HARMAN installed solutions for their enterprise portfolio in India.
Brightstar India has an existing relationship with Harman Lifestyle division and this partnership will enable Brightstar to deal in the complete range of professional Installed audio and
video products for the enterprise business.
“HARMAN is a global leader in end-to-end AV solutions and we are excited about this
partnership, inclusion of complete range of JBL, AMX, SVSi, BSS, Dbx, AKG, Crown, and
Soundcraft will now help our partners to supply a complete audio-video automation solution
from Harman which end-customers have been asking for a long time. We will also be the onestop-shop for all HARMAN preferred partners in enterprise business” said Sanjeev Chhabra,
Managing Director, Brightstar India.

12 SME CHANNELS
FEBRUARY 2019

Unistal Launches High
Level Security Solution
for SMEs
Unistal Systems has launched Protegent Enterprise
Security Solution/Activity Reporter with an aim
to provide high-level security for SMEs and large
enterprises. This software is helpful for organizations
in complying with GDPR norms by keeping track
of the employees’ activities and monitoring all the
connected devices in the network.
“Nowadays, data has become one of the most

important aspects for any company and it is a challenge for them to keep it safe and secure. With our
product, enterprises can actively monitor all the connected devices in a network. Activity Reporter also
gives the administrator the choice to see the screen
of the user’s system with just a single click. Its unique
features will act as a foil for anyone who wishes to do
any fraudulent activity in the organization” said Alok
Gupta, Co-founder and Managing Director at Unistal
Systems Pvt Ltd.
Activity Reporter is an effective employee
performance monitoring software, which captures
the data on employees’ active and idle time during
the office hours. This software will make it easier for
the HR department to ensure that the corporate costs
spent on employees are not wasted. The software will
also help management to better understand each
employee’s strengths & weaknesses and eradicate the
unproductive behavior.


STEP UP TO
TH
5 GENERATION
CYBER SECURITY
THE FUTURE OF
CYBER SECURITY IS HERE
Take a look at the 2019 Cyber Security Report , Threat Trend
Analysis : />Know how you can become Check Point Partner :
/>
CLOUD
MOBILE

T H R E AT P R E V E N T I O N

To know more : Visit www.checkpoint.com Reach us at :
Follow Us:


SNIPPETS

Xerox Enables Customers to Go
Beyond CMYK with Brilliant New
Colors at PrintPack 2019
Print providers, designers and marketers in India got a closer look at
the business building opportunities presented by the Xerox Iridesse
Production Press at PrintPack 2019 which took place from Feb. 1 to
6, 2019. Iridesse is the only digital press that can print metallic gold or
silver dry ink, CMYK and clear or white dry ink in a single pass, giving
print providers an immediate competitive edge in the growing digital
print enhancement market.
“The launch of our flagship device, the Iridesse Production Press,
and the overwhelming response received from customers is surely
one of the key highlights from 2018,” said Vineet Gehani, director,
Technology and Channels, Xerox India. “We’re focused on developing
the technology and solutions our customers need to boost business
opportunities and drive revenue to new heights – and Iridesse is the
perfect example as it helps our customers lead the way in beyond
CMYK printing.”

Vertiv takes
Mission Critical
Solutions on

Wheels to Next
Level with India
Partners

Acronis Appoints Sea Infonet as
Distributor for India
Acronis has appointed SEA Infonet as a key distributor in India. SEA
Infonet will be responsible for promoting and distributing the complete
range of Acronis’ on-premises, cloud-based, and consumer cyber protection solutions, including Acronis Backup for businesses and enterprises,
Acronis Data Cloud for service providers, and Acronis True Image for
home users.
“We welcome SEA Infonet joining our team and we are excited they will
be supporting our presence in India. Both our companies are committed
to helping businesses and consumers take advantage of secure and efficient
cyber protection solutions – and with this alliance, they now can,” said
Maxim Mitrokhin, Acronis General Manager of Channel Sales in APAC.
“We are very excited to partner with Acronis. We are emerging as a
leading VAD in India with a channel partner base of 650+ across the
country – and have a great platform to build the channel ecosystem for
Acronis. Advancing our partnerships with managed service providers and
cloud providers in India would be one of the key focus business lines,” said
Biswajeet Saha, CEO of SEA Infonet.

Vertiv has launched ‘Vertiv Xpress – Partner Drive’ to showcase its complete stack of critical infrastructure
solutions to its partner network and customers in India. Kicked off in Delhi on 21st January 2019, the multicity initiative will engage partners through unique programmes, and work on collectively growing the partner’s
business in a fast and evolving digital landscape.
Vertiv aims to further enhance its engagement in the Indian market and build a strong channel network
across the country. The Vertiv Xpress, a 52-foot trailer will showcase a range of infrastructure solutions and
give a view of the company’s vision to stakeholders.
Announcing the launch of Vertiv Xpress – Partner Drive, Sunil Khanna, president and managing director,

Vertiv India, said, “India is a key region for Vertiv and through this traveling Xpress we’re able to work closely
with our partners and customers to help them get ahead in the market. Evolving with trends around data
centres, we plan to invest more in terms of product innovation as well as research and development in the near
future. With the Vertiv Xpress initiative we will showcase our energy efficient solutions that will change the way
businesses address their efficiency needs.”

Two-Thirds of Retail Store Associates
Can Provide Better Customer Service
with Tablets: Zebra

HID Global Retransfer
Printer for ID Card Personalization is First of its Kind

Zebra Technologies Corporation has revealed the results of its 11th annual Global
Shopper Study, analyzing the attitudes, opinions, and expectations of shoppers, retail
associates and retail decision makers. The results show that two-thirds (66 percent) of
surveyed associates believe that if they are equipped with tablets, they could provide
better customer service and improve the shopping experience.
Fifty-five percent of surveyed retail store associates agree that their company is
understaffed, and nearly one-half (49 percent) feel overworked. Store associates cite
frustration with their inability to assist customers as 42 percent find they have little
time to help shoppers because of pressure to get other tasks completed. Another 28
percent claim that it’s difficult to get information to help shoppers. Most surveyed retail
decision makers (83 percent) and store associates (74 percent) concur that shoppers
can have a better experience with technology-equipped sales associates.

HID Global announced that it’s HID FARGO HDP6600 High
Definition Printer and Encoder is the first and only retransfer
printing solution for ID card personalization that has GreenCircle certification.
The HDP6600 printer achieves its breakthrough energy

efficiency using a design that also delivers the fastest overall
throughput speeds and shortest time until the first card is
printed. Sustainability is further improved through an optional
wasteless lamination module that dramatically reduces the
waste byproducts that other printers generate. The module cuts
consumables costs nearly in half for printed and laminated
cards.

14 SME CHANNELS
FEBRUARY 2019



SNIPPETS

Kodak Alaris and Newgen Software Announce
Global Strategic
Kodak Alaris and Newgen SoftwareTechnologies announced a new global strategic alliance that will
provide their customers and channel partners with access to best-in-class solutions to help organizations drive digital business. Under the agreement, Newgen and Kodak Alaris will expand, connect and
grow their network by jointly recruiting partners with similar profiles to help sell their solutions. Kodak
Alaris scanners are now included on the Newgen certified document scanner list.
The alliance is expected to generate new business opportunities for channel partners that work
with Alaris and Newgen across geographies, vertical markets, and applications. It positions Alaris and
Newgen as partners of choice for customers around the world looking to leverage the power of their
information, reduce cost, save time and optimize business processes.
Kodak Alaris enables organizations to automate business processes and take complexity out of
information capture.

eScan Rolls Out New Deals to Bring Channel
Partners More Closer to the Brand

eScan has introduced a special incentive program for the channel partners that include various gifts
like gold coins, silver coins and gift vouchers to be claimed by the partners. This program is designed to
reward the channel partners for their contribution towards the growth of eScan products. The offer is
valid for all the sales made from 1st January to 31st March 2019.
The specially designed program is valid on purchase of eScan’s products for Small Office & Home
segments. This segment includes products like eScan Anti-Virus with Cloud Security, eScan Internet
Security Suite, eScan Total Security Suite etc. However the offer is not applicable on eScan Anti-Virus
with Total Protection. eScan values its relationship with the channel partners and with this scheme
rewards their commitment for their contribution to make the company reach the end users.
This special offer has been created to encourage partners to participate in the program and get various
gifts with a minimum purchase of Rs.5,000 onwards up to Rs.50,000. The partners have to register
themselves on the Touch Point Network (TPN) Reward program, created by eScan for more benefits to
the partners.

TechnoBind Empowers Partners
TechnoBind conducted 2 city partner’s meet in Mumbai & New Delhi. Attended by over 70+ channel
partners, the event was targeted to educate and help partners capitalize on future opportunities in
enterprise security space.
Being a distributor for Gemalto’s range of solutions since 3 years, TechnoBind has delivered exponential growth in the Indian market.
With Gemalto SafeNet Identity and Data Protection solutions for enterprise security, organizations
can take a data-centric approach to their security posture, all while controlling access to the infrastructure and applications they rely upon. Not only can they create trust and authenticate their transactions,
but they can ensure that sensitive data is protected and controlled – both on-premises and in public
and private clouds. In addition to a heightened level of protection, enterprises are also able to improve
business efficiencies and scale to the identity and data protection needs of tomorrow.

India Sixth in GDPR Readiness index: Cisco
Cisco’s 65% of Indian organizations better prepared for GDPR, making India the sixth leading nation
in readiness index its 2019 Data Privacy Benchmark Study which placed India amongst the leading
nations globally in their preparedness towards the General Data Protection Regulation (GDPR)
According to the report, organizations worldwide that invested in maturing their data privacy

practices are now realizing tangible business benefits from these investments. The study validates the
link between good privacy practice and business benefits as respondents report shorter sales delays as
well as fewer and less costly data breaches.
The European Union’s General Data Protection Regulation, which focused on increasing protection
for EU residents’ privacy and personal data, became enforceable in May 2018.

16 SME CHANNELS
FEBRUARY 2019

DIGEST
UNISTAL CELEBRATES 25
GLORIOUS YEARS OF SERVING
EXCELLENCE.
Unistal Systems Pvt. Ltd., the developer and
provider of Antivirus, data care, data recovery,
data security software and Oil & Gas solutions,
recently celebrated 25 glorious years of serving
excellence. The pompous celebrations started
at 7 p.m. at the Crowne Plaza Hotel, New Delhi.
The company shared its success stories and
recognised the contribution of mentors,
employees, partners, vendors, friends and
family for their continuous support. The event
was graced by the presence of well-known
dignitaries from top corporates, partners, OEM
heads and media houses.

LARSEN & TOUBRO INFOTECH
ACQUIRES RULETRONICS
Ruletronics enables businesses to transform

and evolve digitally by providing innovative
BPM and CRM solutions leveraging Pega
Platform. Their current industry strength lies
across Insurance, Banking, Healthcare and
Retail segments. The company offers unique
product based offerings for Disability Claims
management, KYC Bulk Remediation, and
Insurance Sales & Service applications.
The acquisition will strengthen LTI’s
rapidly growing digital business with a suite
of capabilities in Pega implementation space
around establishing BPM Roadmap & Strategy,
Customer Services, RPA and Decisioning.

ATEN TURNS 40, CELEBRATES
ITS PASSION FOR EXCELLENCE
ATEN reached another milestone this year,
celebrating 40 years of successful global business. Initially established as HOZN Automation
Co. Ltd. in 1979 and later renamed in 1988 as
ATEN International Co. Ltd, ATEN is one of
the largest KVM switch manufacturers in the
world. All ATEN products are ISO 9001 and ISO
14001 certified. Imbued with the core values
of Integrity, Caring, Ambition, and Novelty
(ICAN), ATEN has been creating new innovative
products and solutions to address the changing
demands of customers across decades.

BITDEFENDER RELEASES ENDPOINT SECURITY SOLUTION
Bitdefender has rolled out its newest software

‘GravityZone Ultra Suite’ a complete Endpoint
Security solution that uncovers and stops
elusive threats with Endpoint Detection and
response (EDR) that works. GravityZone Ultra
integrates layered next-gen endpoint protection
and easy-to-use EDR platform to accurately
protect enterprises against even the most
elusive cyber threats. It offers prevention, automated detection, investigation and response
tools so enterprise customers can protect their
digital assets and respond to these threats.
GravityZone Ultra excels where most products
are too complex and resources intensive.
GravityZone Ultra sharply limits the number of
incidents requiring manual analysis, reducing
the operational effort required to run a EDR
solution. Cloud-delivered and built from the
ground up as an unified, single agent/single
console solution, it’s also easy to deploy and
integrate in the existing security architecture.


SNIPPETS

Check Point Launches
Maestro
Check Point introduced Check Point Maestro, the
industry’s first truly hyperscale network security solution. Check Point Maestro enables businesses of any
size to enjoy the power of flexible cloud-level security
platforms, and to seamlessly expand their existing
security gateways to hyperscale capacity.

“Check Point Maestro extends the Gen V security
capabilities of our Infinity architecture into hyperscale
environments. It ensures organizations can secure
their dynamic, evolving environments without limits,
now and in the future, The principle behind Maestro
is very simple: it enables organizations to start with
their existing security implementations, no matter
how small, and scale their protection almost infinitely
according to their changing business needs” said Itai
Greenberg, VP of Product Management, Check Point.

Consul Neowatt Appoints Savex Technologies as National Distributor
Consul Neowatt, the Global Indian UPS company has appointed Mumbai based Savex
Technologies as National Distributor for its full range of power back up and power
conditioning products. This alliance will help Consul Neowatt leverage the strength of
Savex Technologies to expand its IT channel reach and for Savex to offer attractive power
solutions to complement their Enterprise IT distribution business offerings.
Savex is a 32-year-old organisation and is the largest Indian distribution house in India
today catering to more than 7000 plus Channel partners/SI’s across India. They are head
quartered out of Mumbai with 39 branch offices, 43 warehouses and 105 sales locations
across India.
Through this alliance Consul Neowatt would leverage Savex Technologies 7000+
partners across the country. The primary intent is to cover a larger region in India with
multiple channels while providing access to a larger audience and secondly engage with
new partners in larger cities as well as strengthening reach in high growth Tier – 2 and 3
regions.

Eurotech Launches BestNet 2-Post
Frame Open Network Racks
Eurotech Technologies has launched BestNet 2-post frame open network racks. The

racks are suited for cabling and patching frames, intermediate distribution points
and safely houses all networking equipment’s, ensuring complete convenience &
flexibility. Available in 19” and 23” models the racks come with heights ranging from
27U to 42U.
The 2-post frame open racks are made of strong and lightweight aluminium
(6063-T6 alloy) extrusion or 2.0 mm steel. These racks have universal 5/8”-5/8”-1/2”
vertical mounting hole patterns, which allow mounting of 19”equipment’s. Multiple
racks can be bayed with the help of BestNet baying kit. The top and side frames are
provided with cable entry cut-outs which allow effective routing of cables. Both the
steel and aluminium models can be used to either fit 19” or 23” equipment’s.
The units which can either be fitted on the floor or allowed to move are well
suited for networking and data transmission applications. Used in open accessibility
lab applications, these products can be modified and customized with the help of
BestNet accessories to specific user requirements.

GajShield Only Indian Vendor in the
Gartner’s 2018 Asia/Pacific Context
GajShield Infotech is the only Indian vendor to be named in the Gartner’s 2018 Asia/
Pacific Context: ‘Magic Quadrant for Enterprise Network Firewalls’.
GajShield is one of the few companies worldwide and the 1st Indian Firewall
Product Company to have earned ICSA Labs Firewall Certification criteria 4.1.
They are a leader in innovating security technologies like Context based Data Leak
Prevention, Cloud Security, Zero-day Anti-Ransomware, OOPs based Management
and more.
GajShield’s approach of looking beyond traditional security solutions and focusing
on Data First security strategy is a leap forward in the security solution industry that
is helping enterprises to secure cloud and SaaS applications by implementing a Next
Generation Fire Wall solution.

Portronics Launches

“My Buddy Hexa”
Portable Laptop Stand
Portronics, a leading provider of innovative and
portable gadgets has added “My Buddy Hexa”
to its existing range of laptop stands. The brand
has provided most ergonomically styled, strong
and lightweight laptop stands and has set an
industry standard over the last 5 years. Taking
up to its stride, the company has launched - My
Buddy Hexa that boasts of unmatched features
like 7 adjustable levels which can be set up as
per the user’s convenience.
Being fan-less, it’s completely noiseless as it
uses natural ventilation of your laptop. One of
the best ventilation is the natural air ventilation
that works with the laptop’s in-built fan to cool
the laptop. Not only has it improved the lives
of your laptop battery but also of the internal
components like CPU and motherboard.
Longer battery life is also caused by less battery
charging cycles required.
By improving your working posture on
the desk and reducing strain on your neck by
having right screen viewing angle, you can
work longer and without any neck or back pain.
Also, your fingers and wrists too get optimum 7
adjustable angles when typing on the keyboard
which also reduces the fatigue.
My Buddy Hexa is available at an affordable
price-point of INR 699/- from online and

offline stores.

SME CHANNELS 17
FEBRUARY 2019


SNIPPETS

Compuage &
Microsoft Organize
Multi-City events
Compuage Infocom and Microsoft
organized joint partner programs for
the launch of Microsoft Cloud Solution
Provider. Events were conducted in
Mumbai, Pune, Delhi and Lucknow in
the month of December.
These events imparted knowledge
on Microsoft Cloud Solution Provider’s
usage and offerings. Speakers from
Compuage & Microsoft demonstrated
how partners can benefit with the cutting
edge technology of cloud empowering the
channel partners.
Senior members from Microsoft as well
as Compuage together made the events
engaging and solved one on one queries
of the partners. Over 200 unique partners
attended the meets making it successful.
Compuage& Microsofttogether plan to

organize similar meets in Hyderabad,
Ahmedabad, Indore and Raipur.
Atul H Mehta –Chairman& MD,
Compuage said “These meets are a superb
platform for effective interaction and
optimism for the road ahead. Moving
forward, our strong relationships with
our channel partners will pave the way
for continued success in this important
business segment alongside empowering
them with cloud business opportunities.”

TSC Launches Cutting-Edge “Print Engine
PEX-1000 Series” in India
TSC Auto ID Technology has launched of its innovative Print Engine PEX-1000 Series. The latest
series offers the Left-hand model (PEX-1100 Series) and the Right-hand model (PEX-1200 Series), to
meet comprehensive print requirements.
PEX-1000 Series print engine incorporates a robust die-casting structure with a stable media
path which ensures outstanding print quality and accuracy. This model is specifically designed for
integration with various label applicators making it highly compatible. It features three different levels
of models that cover 203, 300 and 600 dpi resolutions.
The PEX-1000 Series has a powerful peel-off capability which makes it an excellent choice for
printing small labels. This model has a high-performance speed (up to 18 inches per second) and
high connectivity which enhances the usability of the model. The rear-side drawer design makes for
ease of maintenance and quick replacement.
Leveraging the user experience and complex applications across industries, the PEX-1000 Series
is ideal for manufacturing and logistics applications where high speed and mission-critical demand
label printing is required.

DigitalOcean Launches Managed Databases

DigitalOcean announced the launch of Managed Databases, with PostgreSQL as its first offering. The
service will allow developers to create fully managed database instances in the cloud quickly and efficiently.
DigitalOcean takes care of the setup, maintenance, configuration and security of databases, so developers
can remain focused on creating great applications.
“Our product development is driven by one vital question: How we empower developers to do more
valuable work in less time, with Managed Databases, developers and their teams can focus on creating
meaningful applications and sharing them with their communities, without the headache of having to
manage the database infrastructure that enables the process. We do this all with an intuitive interface, full
API support, transparent pricing, feature richness and flexible scalability” said DigitalOcean’s Senior Vice
President of Product Shiven Ramji.
As one of the company’s first fully-managed offerings, Managed Databases represents another key step in
the company’s mission of becoming the Developer Cloud of choice for building modern apps

ACT Fibernet unveils new brand identity, enriches customer value
RaamayaACT Fibernet, launched its new brand
identity with the unveiling of the logo and tagline
‘Feel the Advantage’.
The new brand identity represents ACT Fibernet’s
differentiated approach towards offering innovative customer centric solutions that will enhance
user experience and provide maximum value.
In 2019, ACT Fibernet will expand its products,
service offerings and partnerships across various
categories, namely – ACT Advantage Entertainment, ACT Advantage Gaming, ACT Advantage
Speed, ACT Advantage Service, ACT Advantage
Smart Cities, and ACT Advantage community.
ACT Fibernet will partner with content provider
like ZEE 5 and Sony Liv amongst others to
strengthen its content offerings. Being the
preferred choice of every gaming enthusiast, ACT
Fibernet is working with popular gaming cafes,

gaming OEMs and gaming publishers to provide

18 SME CHANNELS
FEBRUARY 2019

the highest quality gaming experience to
users.
Within the next six months, ACT Fibernet
plans to launch its broadband services
in multiple cities across North & West
India, thereby expanding its footprint in
the country. The company will also be
launching a 24*7 call center and a unified
call center number to address customers’
queries in real time. “We have always
believed in providing our customers the
best solutions through our products and
services. Today, consumer needs and usage
behavior is continuously evolving. Newer
technologies are constantly being adopted
and becoming mass-scale by the day, be
it streaming or gaming or smart homes.
It is therefore our responsibility to work
in conjunction with the rapidly evolving

customer’s expectations and find feasible
ways to serve them. We strongly believe
that our new brand identity reflects this
value and commitment we have towards
our customers” said Bala Malladi, CEO,

Atria Convergence Technologies Ltd.
“Moving forward, we will be launching
new products and services that our
consumer’s desire. We are confident that
with our pioneering fibernet connection, hyper fast speeds, new offerings
and industry’s best customer service in
place, we will successfully transform our
customer’s experience enabling them to do
and accomplish more. With ACT you can
feel the Advantage” he added.


SME CHAT

ALOK GUPTA
MANAGING DIRECTOR,
UNISTAL SYSTEMS PVT.
LTD.

OUR PRODUCTS ARE
DESIGNED TO PREVENT
DATA LEAKAGE AND
PROVIDE PROTECTION
AGAINST VARIOUS
Indian security market is growing at a rapid pace and it
is going to grow much faster in the years to come. SME
Channels spoke to Alok Gupta, Managing Director, Unistal
Systems Pvt. Ltd. to know about his perspective.

What are some of the major challenges you see for the Indian

market from security point of view?
There are various challenges with which Indian
enterprises are struggling to deal with. With digitisation and technology revolution going across
the country, the Indian security market is most
concerned about,
l
Fear of state-sponsored and financially motivated attacks
l
Need for security across the supply chain
l
Fear of corporate espionage, data theft
l
The sophistication of cyber-attacks, rise of
cybercrime as a service
l
Constant upgradation and keeping abreast
to latest/ next-gen developments & technology,
thereby avoiding technological obsolescence
l
Lack of awareness on data protection, privacy and internal security threats
l
Complying with GDPR norms
What will the threat landscape
look like in over the next 12
months?
The threat landscape will definitely going to rise as
the hackers nowadays are much smarter than ever
and this will give a sure shot rise in the number

of cyber-attacks and increase in the cases of

cybercrime.
What will be the biggest drivers
for security spending in 2019?
In past, we have seen many cyber-attacks where
companies have paid billions of dollars to hackers
in ransom. Many small and medium-size companies must shut their operations after becoming
victim to the cyber-attack. This will certainly
prompt companies to increase their spending in
security. The other major factors which will contribute as a driver for security spending are,
l
Internal data thefts
l
Data Leak
l
Constant rise in Cyberattacks mainly
ransomware
l
Other cyber threats
l
GDPR compliance
l
Proposed Data Protection Bill of India
l
Digitisation and streamlining the organisation in accordance with the latest technologies
How do you see India as a market
for your solutions?
India has been our biggest contributor in terms
of revenue since our inception. Presently, we are

“UNISTAL’S

PROTEGENT
ANTIVIRUS IS THE
WORLD’S ONLY
ANTIVIRUS WHICH
COMES WITH INBUILT
DATA RECOVERY
OPTION”
more focused on Tier II and Tier III cities as well
as in North East India. Our channel partners are
lending us great support in expanding our reach
as well as taking our products to masses spread
across the length & breadth of the country.
Our products are designed to prevent data leakage and provide protection against various types
of cyber threats. Also, we are providing solutions
for data recovery and activity monitoring, which
will have a great prospect for Indian markets in
the coming days.
What is your focus in the market
- Channel market and CIOs/
CISOs
Unistal believes that the channels are the core of
our business, but we are also going ahead with our
new products and solutions to target the CIOs
and CISOs. With data security being a priority
for every organization, we want to help the enterprises in tackling the challenges related to security
& safety of their valuable data.

SME CHANNELS 19
FEBRUARY 2019



SECURITY

CYBER
AWARENESS
Mobiles phones are also part of the cyber space as all these
smart devices interact with internet all the time for running various utilities and games.

ANIL CHIPLUNKAR,

LEAD AUDITOR ISO27001 (IRCA
ACCREDITED), CERTIFIED FRAUD
EXAMINER (CFE), CERTIFIED
INFORMATION SECURITY MANAGER
(CISM), CERTIFIED FORENSIC
ACCOUNTING PROFESSIONAL
(CFAP), CERTIFIED ANTI-MONEY
LAUNDERING EXPERT (CAME),
ASSOCIATE OF BUSINESS
RESILIENCY CERTIFICATE
CONSORTIUM INTERNATIONAL
(ABRCCI). Anil has 33+ years

of experience in Information
Systems and has been working
in information security space for
last 20+ years.

20 SME CHANNELS
FEBRUARY 2019


The cyber space or cyber world is typically any the
collaboration of all devices connected to internet.
The internet provided many benefits to corporates, industries, governments, schools as well as
individuals. However, it enabled malicious users
to perform their activities using internet from
anywhere in the cyber world and try to remain
hidden. Today we all use internet services in some
or the other forms including email, on-line applications, games on computers and mobiles, social
media sites like Facebook, Twitter, and Instagram
etc. and for many such functions. This necessitates
use of internet in a secured, sensible, and safest
possible way to avoid the risks posed by malicious
users / applications present out there in the cyber
space.
Mobiles phones are also part of the cyber space
as all these smart devices interact with internet all
the time for running various utilities and games.
The applications like google map allows the service provider to know mobile phones location
including the path the person is taking to reach
the destination. The games on mobile phones
do ask for accessing multiple utilities like SMS,
Address Book, Camera, WiFi etc. but all of the
games may not really require these accesses. There
is a possibility of a malware being installed by
disguising as a game and can misuse these permissions. The popularity of mobile phones provided
much wider attack surface that can be targeted by
the malicious users. The users of computers and
related tools are comparatively more aware about
the cyber risks but the mobile phones being used

practically by everyone including little children
who do not have even a hint of the kind of cyber
threats / risks. Theft or misplacing the mobile
phones pose various security risks such as the
information stored on these devices can be misused by the person getting hold of these devices.
As stated by KnowBe4, “today, only about 3%
of malware tries to exploit an exclusively technical

flaw. The other 97% target instead users through
Social Engineering”
RISKS
Following is an indicative list of various risks
which are posed via internet / because of interconnection of multiple devices to the cyber space i.e.
internet.
l
Phishing / Spamming / Vishing / Executive
Targeting – Sending unsolicited emails to a large
audience and try to steal information or block the
email server access by overloading the server by
number of emails. Similar to emails, SMS or indiscriminate voice calls can also be used for carrying
out the malicious activities. Advanced techniques
in phishing are used to target specific individuals and this technique is called spear phishing or
executive targeting
l
Impersonation – In the cyber space, it is
comparatively easy to assume somebody’s identity and project different identity by hiding the
original identity of the user. This is termed as
impersonation and in the cyber world, it becomes
challenging to verify the exact identity of a user
unless strict controls are implemented.

l
Social Media Scamming – As the term
indicates there can be various types of scams run
by the malicious users using social media. The
scams can be fake promotional sales, fake lotteries,
fake work-from-home schemes, fake recruitment
drives etc.
l
Targeted Malware (Exploits insertion / Bot
Harvesters) – These are the applications targeted
to harm specific companies’ / government departments / devices to paralyze the operations of the
target.

Credentials theft – Malicious links
shared via email, SMS, WhatsApp can be used to
trick the user in giving away the user’s credentials
like user ID, password, PIN number etc.
l
Physical access (such as tailgating) – This


SECURITY

BE SAFE – SPREAD THE AWARENESS – PROTECT YOURSELF
AND THE COMMUNITY FROM THE CYBER RISKS
includes following a legitimate user who has access
to a restricted area with the aim of gaining unauthorized access to secured areas.
l
Shoulder surfing – When operating in public
places or even cyber cafes, there is a possibility of

someone overlooking the user’s shoulder to get
information about the user’s credentials.
l
Dumpster diving – Is a technique used to
gain information from the dustbin of the competitor as there are number of organization / departments just throw away old papers, devices without
taking due care.
l
Social engineering – It is a technique used
for exploiting the weakness in human psychology
or behavior to gain illegitimate access to devices
/ information. There are people who are called as
‘social engineers’ and these personnel can use their
skills in either way like to steal / misuse the data /
information or to test the ‘possibility of exploitation’ and advise users / organizations for suitable

preventive measures. This is a very effective technique where the focus is not on technological
weaknesses but more on human weaknesses.
Prevention – key is “be ALERT”
As discussed above, there are many risks present is
the cyber space / world and they can be prevented
by being alert, taking proactive care and using
technical tools.
l
Protect devices with known / reputed antimalware application
l
User strong passwords for application and
avoid using same credentials across multiple
applications
l
Do not store user credential on devices

including mobile phones
l
Do not share the credentials with anyone
without any specific need
l
Do not post personal information on social
media sites unless necessary or the site is trusted
because the information shared over internet is

always available on the internet somewhere
l
Take utmost care while accessing internet
in public place as well as while communicating
information
l
Do not join any open forums or reply to
messages asking for information / funds without
properly verifying the authenticity of the forum /
messages
l
To protect the availability of critical information, take periodic backup of this information
l
Do not download any applications / games
unless verified to be safe (there are various tools
available to check the security) and while installing
do provide the access to device functions carefully
The cyber security can be as strong as the weakest
link and in this case the weakest link is ‘human’
(all of us) so it is of utmost important to be a
responsible user and follow all the preventive

techniques. This will enable a safe cyber working
experience.

SME CHANNELS 21
FEBRUARY 2019


SECURITY

2019
PREPARING FOR CYBER THREATS IN

It is just important to remember that Artificial Intelligence and Machine Learning will soon
be the same tools being leveraged against you, and to plan accordingly.

BY SANJAY MOHAPATRA


T

.
.
.

o manage increasingly distributed and
complex networks, organizations are
adopting artificial intelligence (AI)
and machine learning to automate
tedious and time-consuming activities that normally require a high degree of human supervision
and intervention. To address this transformation

of the security ecosystem, the cybercriminal community has now clearly begun moving in the same
direction.
For many criminal organizations, attack techniques are evaluated not only in terms of their
effectiveness, but in the overhead required to
develop, modify, and implement them. As a result,
many of their attack strategies can be interrupted
by addressing the economic model employed
by cybercriminals. Strategic changes to people,
processes, and technologies can force some cybercriminal organizations to rethink the financial
value of targeting certain organizations. One way
that organizations are doing this is by adopting
new technologies and strategies such as machine
learning and automation to take on tedious and
time-consuming activities that normally require a
high degree of human supervision and intervention. These newer defensive strategies are likely
to impact cybercriminal strategies, causing them
to shift attack methods and accelerate their own
development efforts. In an effort to adapt to the
increased use of machine learning and automa-

22 SME CHANNELS
FEBRUARY 2019

tion, we predict that the cybercriminal community is likely to adopt the following strategies,
which the cybersecurity industry as a whole, will
need to closely follow.
1. AI Fuzzing:
Because they target unknown threat vectors,
exploiting zero-day vulnerabilities is an especially
effective cybercrime tactic. Fortunately, they are

also rare because of the time and expertise needed
by cyber adversaries to discover and exploit them.
The process for doing so involves a technique
known as fuzzing.
Fuzzing is a sophisticated technique generally
used in lab environments by professional threat
researchers to discover vulnerabilities in hardware and software interfaces and applications.
They do this by injecting invalid, unexpected, or
semirandom data into an interface or program
and then monitoring for events such as crashes,
undocumented jumps to debug routines, failing
code assertions, and potential memory leaks.
Though using fuzzing to discover zero-day vulnerabilities has, so far, been beyond the scope of
most cybercriminals, as AI and machine learning
models are applied to this process it will become
more efficient and effective. As a result, the rarity
of zero-day exploits will change, which in turn
will have a significant impact on securing network
devices and systems.

2. Continual Zero-Days:
While a large library of known exploits exists in
the wild, our cyber adversaries are actually only
exploiting less than 6% of them. However, to be
effective, security tools need to be watching for all
of them as there is no way to know which 6% they
will use. Also as the volume of potential threats
continues to grow, performance requirements will
continue to escalate as the scope of the potential
exploit landscape continues to expand. To keep

up, security will need tools to be increasingly more
intelligent about how and what they look for.
While there are some frameworks like zerotrust environments that may have a chance at
defending against this reality, it is fair to say that
most people are not prepared for the next generation of threats on the horizon — especially those
that AI-based fuzzing techniques will soon begin
to uncover. Traditional security approaches, such
as patching or monitoring for known attacks,
will become nearly obsolete as there will be little
way to anticipate which aspect of a device can be
potentially exploited. In an environment with the
possibility of endless and highly commoditized
zero-day attacks, even tools such as sandboxing,
which were designed to detect unknown threats,
would be quickly overwhelmed.
3. Swarms-as-a-Service:
Advances in swarm-based intelligence technology


SECURITY

RAJESH MAURYA,
REGIONAL VICE PRESIDENT, INDIA &
SAARC, FORTINET.

“IN AN EFFORT
TO ADAPT TO THE
INCREASED USE OF
MACHINE LEARNING
AND AUTOMATION,

WE PREDICT THAT
THE CYBERCRIMINAL
COMMUNITY IS
LIKELY TO ADOPT
THE FOLLOWING
STRATEGIES, WHICH
THE CYBERSECURITY
INDUSTRY AS
A WHOLE, WILL
NEED TO CLOSELY
FOLLOW.”

are bringing us closer to a reality of swarm-based
botnets that can operate collaboratively and
autonomously to overwhelm existing defences.
These swarm networks will not only raise the bar
in terms of the technologies needed to defend
organizations, but, like zero-day mining, they will
also have an impact on the underlying criminal
business model, allowing them to expand their
opportunity.
Currently, the criminal ecosystem is very
people-driven. Professional hackers build custom
exploits for a fee, and even new advances such as
ransomware-as-a-service requires black-hat engineers to stand up different resources. But when
delivering autonomous, self-learning swarmsas-a-service, the amount of direct interaction
between a hacker-customer and a black-hat entrepreneur will drop dramatically, thereby reducing
risk while increasing profitability.
4. A la Carte Swarms:
Dividing a swarm into multiple tasks to achieve a

desired outcome is very similar to virtualization.
In a virtualized network, resources can spin up or
spin down virtual machine as needed to address
particular issues such as bandwidth. Likewise,

resources in a swarm network could be allocated
or reallocated to address specific challenges
encountered in an attack chain. In a swarm-asa-service environment, criminal entrepreneurs
should be able to pre-program a swarm with a
range of analysis tools and exploits, from compromise strategies to evasion and surreptitious data
exfiltration that are all part of a criminal a la carte
menu. And because swarms by design include
self-swarms, they will require nearly no interaction or feedback from their swarm-master or need
to interact with a command and control center,
which is the Achilles’ heel of most exploits.
5. Poisoning Machine Learning:
One of the most promising cybersecurity tools
is machine learning. Devices and systems can be
trained to perform specific tasks autonomously,
such as baselining behaviour, applying behavioural analytics to identify sophisticated threats,
or taking effective countermeasures when facing a
sophisticated threat. Tedious manual tasks, such as
tracking and patching devices, can also be handed
over to a properly trained system. However, this
process can also be a two-edged sword. Machine
learning has no conscience, so bad input is pro-

cessed as readily as good. By targeting and poisoning the machine learning process, cybercriminals
will be able to train devices or systems to not apply
patches or updates to a particular device, to ignore

specific types of applications or behaviours, or to
not log specific traffic to better evade detection.

Preparing for Tomorrow’s
Threats
Understanding the direction being taken by some
of the most forward-thinking malicious actors
requires organizations to rethink their current
security strategy. Given the nature of today’s
global threat landscape, organizations must react
to threats at machine speeds. Machine learning
and AI can help in this fight. Integrating machine
language and AI across point products deployed
throughout the distributed network, combined
with automation and innovation, will significantly
help fight increasingly aggressive cybercrime.
Disrupting the criminal economic model,
however, can only be achieved by tightly integrating security systems into a cohesive, integrated
security fabric framework that can freely share
information, perform logistical and behavioural
analysis to identify attack patterns, and then
incorporates that intelligence into an automated
system that can not only respond to attacks in a
coordinated fashion, but actually begin to anticipate criminal intent and attack vectors.

SME CHANNELS 23
FEBRUARY 2019


SECURITY


VINAYAKA B S

CHANNEL ALLIANCE LEAD
INDIA &SAARC
CHECK POINT

CHECK POINT’S INFINITY
ARCHITECTURE PROVIDES
GEN V SECURITY SECURING
ASSETS OF ORGANIZATIONS
Check Point is 100% channel focused and we are constantly striving to empower our channel with
solutions & architecture to address the gap in terms of the attack vector & the solutions, says
Vinayaka B S, Channel Alliance Lead, India &SAARC, who also talks about Cyber Security and the
state of security in India.

What is the state of security in
India?
Despite several steps undertaken by CERT-IN
& multiple initiatives by Industry Bodies(e.g.
RBI, SEBI, IRDA etc.,) & regulations, the state of
security in India needs a lot of improvement as
this is a continuous process & organizations need
to keep themselves equipped to handle the latest
threats. While the security threats are presently of
GenV&above, sadly the security controls adopted
by a majority of organizations are b/n Gen II & III
which highlights the gap in a big way.
Prevention becomes the key as against detection & having centralized visibility & monitoring
is the key which, in fact, is not followed by many

leading to this state where there are multiple gaps
in Security Postures. Need of the hour is Centralized monitoring with quick visibility with actionable information. Organizations need to look
at this aspect & choose right Security Solutions
when they are planning/augmenting Security
controls.
What are some of the major challenges you see for the Indian
market from security point of view?

24 SME CHANNELS
FEBRUARY 2019

With rapid digitization push by Govt of India, we
see that the country has opened up big way in IT/
ITeS Services with rapid adoption of Computers
& we now have the ubiquitous Mobile revolution
penetrating even the remote corners of the country in the form of Smartphones.
Advent of –e-payment mechanisms have
brought many risks with gullible users falling prey
to phishing attacks everyday which has not spared
even the educated class. Rapid proliferation without adequate security controls have showcased
the pitfalls with multiple attacks happening in
not only traditional sectors like IT/ITeS, BFSI
etc, but also in emerging verticals like Healthcare,
ICS/SCADA etc., Need of the hour is to look at
holistic security with adequate precautions taken
to secure Network, Cloud, Mobile devices, End
Points as well as protection against Zero Day
attacks & ransomware.
With recent security breaches
like WannaCry, has this made

people more aware of the importance
of security today?
Security breaches like WannaCry have again
brought to the fore the discussion of securing

against Zero Day attacks & advanced threats,
but organizations still think that their sector is
immune or that they are not so well known that
they would be targeted. Security by Obscurity is
a long dead concept & today security is a must
have for customer of any size, any vertical & any
geography. Multiple instances of data breaches in
emerging verticals like healthcare, manufacturing have brought the focus back on security of all
the digital assets & more and more organizations
today are seeking central visibility & actionable
information so that they can prevent attacks &
handle any with confidence. Education is very
important & Check Point Research has been
forefront in terms of educating against pitfalls
from the unlikeliest sources e.g. Faxploit – where
Cyber criminals could infiltrate any home or corporate network by exploiting all-in-one printerfax machines. In fact, while our world becomes
more connected through IoT devices, the cloud
and mobile platforms, there still remain simpler
technologies which can allow potential hackers to
infiltrate IT networks and provide unauthorized
access to sensitive information.
As a result, maintaining a frequent patching
schedule and segmentation infrastructure, along



SECURITY

2019 will be a fresh year & in the recently released
World Economic Forum’s (WEF’s) Global Risks
Report 2019, cyber attacks and data breaches are
ranked as the fourth and fifth most likely global
risks. We see that rapid adoption of Cloud followed by ever increasing adoption of IoT poised
to bring a huge change in the way we perceive
security. With perimeter disappearing the threat
landscape is completely different. In Cloudification, it becomes very important to showcase the
shared responsibility model & provide solutions
for Securing the applications. Mobile Threats
have to be prevented as employees are connected
to Corporate Networks 24x&. Rapid adoption of
Smartcities& attacks on Critical Infrastructure
necessitates the need of securing Smartcities&
Critical Infrastructure at a much rapid pace.
Check Point with our Infinity Architecture
coupled with our new product offerings help
augment the threat by staying ahead of the threat
curve by providing Gen V Security focusing on
Prevention & providing customers with actionable information.

with a high level of IT hygiene in general, is essential for protecting data from potential attacks,
from wherever they may come. By following best
practices such as these, organizations can stay safe.
Discuss the latest technology/
solutions from your company and
the impact in the market?
Check Point has continuously improved & innovated on our Infinity Architecture. In fact, we

have launched new technology solutions recently
apart from increased focus on Cloud Security.
The Maestro is a revolutionary new architecture
that enables businesses of any size to enjoy the
power of flexible cloud-level security platforms,
and to seamlessly expand their existing security
gateways to hyperscale capacity. Maestro enables
a single gateway to expand to the capacity and
performance of 52 gateways in minutes, giving
companies elasticity and enabling massive Tera-

bit/second firewall throughput. The impact in
the increased threat landscape is tremendous as
Maestro extends the Gen V security capabilities of
our Infinity architecture into hyperscale environments. It ensures organizations can secure their
dynamic, evolving environments without limits,
now and in the future. Further, with the acquisition & integration of Dome9 &ForceNock, the
Cloud Security offerings are strengthened with
additional capabilities. On the Mobile Front,
Check Point has been named as a leader for the
second year in a row in IDC Marketscape report
on Mobile Threat management which gives us an
edge over the threat landscape as well as solution
offerings. Customers can embrace our Infinity
offering to ensure future proofing their Security.
What will the threat landscape
look like in over the next 12
months?

What will be the biggest drivers

for security spending in 2019?
Regulations from regulatory bodies like RBI,
IRDA, SEBI etc, followed by increased vigilance
on Healthcare Segment, close monitoring of
Compliance in IT/ITeS Segment, rapid adoption
of Cloud & Mobile Devices are all set to increase
the Security Spending in 2019. Further, increased
push on Industry 4.0 including Cyber Physical
Systems &IoT also have brought to fore IT security issues, which are greatly aggravated by the
inherent need to open up those previously closed
production shops. Recent attacks on customers
in BFSI, hospitals & other organizations have
brought fore the need for proactive Security showcasing the emerging importance of Prevention
with actionable information. In fact, Check Point
research is in the forefront of looking at threats
& vulnerabilities and attacks in its numerous
findings showed that attackers can use seemingly
innocuous information in terms of penetrating
into customer networks which included Fortnite,
Adobe PDF Reader and DJI Drones. We also
published new findings about malware families
including multiple types of Ransomware, malware on computers and mobile devices. Check
Point’s Infinity Architecture provides Gen V
Security securing assets of organizations future
proofing their security requirements.

SME CHANNELS 25
FEBRUARY 2019



×