RSMRS, RS Market Research Solutions has got a good coverage in this month CRN issue with RSMRS featured in the cover story. You can check by searching RS Market Research Solutions, RSMRS and Kalyan Banga. Proud to be an RSMRS ian!!
Best Regards,
Kalyan Banga
Founder & Principal Analytics Consultant
Hello: +91-9433948532
Web: http://fusionanalyticsworld.com
LinkedIn: http://www.linkedin.com/company/fusion-analytics-world
Facebook: http://www.facebook.com/AnalyticsFusion
Twitter: http://twitter.com/analyticsfusion
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
CRN 01 September Cover Story
1. COVER STORY
16 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
Change is the only constant in enterprise security both in
terms of the threats as well as the responses. Presenting a
few of the existing and emerging security trends
SONAL DESAI & AMIT SINGH
E
nterprise security is a solutions-driven business
offering channels almost assured double-digit
growth and margins. This fact is evident from the
increasing spend on security across segments.
As per a PwC survey, large businesses (those
with revenue of over `5,000 crore) and government
organizations saw a 11 percent and 8 percent increase
respectively in security spending in FY2011-12. Medium
businesses (with revenue from `500 crore to `5,000 crore)
saw a 17 percent increase in security spending followed
by small businesses (with revenue less than `500 crore)
where the spending increased by 14 percent.
The monetary value of the enterprise security market
in India was estimated at `3,423 crore in 2012 and is
likely to grow at 14.76 percent to reach `4,508 crore in
2014 according to RS Market Research Solutions.
The increasing use of the Internet is a potential driver
for the enterprise security market. The higher adoption of
smart devices by employees also calls for greater security
measures at companies. Another factor explaining the
rise in enterprise security is the regulatory mandates and
compliance measures.
According to one estimate, most organizations spend
11-15 percent of their revenue on IT of which 2-3 percent
goes toward security.
Here are some trends which partners can leverage to
strengthen their security practice.
SECURITY LANDSCAPE
THE ENTERPRISE
0
1000
2000
3000
4000
5000
3423.55
INRCrore
2012 2013 2014
3925.87
4508.77CAGR
14.76%
MARKET SIZE—ENTERPRISE SECURITY (INDIA)
Source: RS Market Research Solutions
2. STORYCOVER
COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 17
E
nterprise mobility and BYOD are emerging as the
top priorities and key investment areas for CIOs.
As mobile devices become ubiquitous and store
more personal and corporate data, new tools to secure
the information will drive the mobile-security market.
The increased risk to personal and corporate data is an
opportunity for the security partners as the global market
for mobile security is expected to reach $14.4 billion by
2017, according to research firm Global Industry Analysts.
Many of the organizations also opt for it to reduce their
Capex, says Sudarsan Ranganathan, CEO, Veeras Infotek,
Chennai. “Some of the areas to focus on, include, mobile
device management, mobile application management,
data loss prevention and encryption.”
About 50 percent of the organizations in India would
adopt BYOD as a strategy by 2017, asserts Sajan Paul,
Director, Systems Engineering, Juniper Networks.
According to the latest Symantec State of Mobility
Survey 2013, organizations proactive in mobile adoption
are experiencing nearly 50 percent higher revenue growth
than those restricting mobility. All things considered,
businesses perceive net positive results with mobility,”
shares Anand Naik, Managing Director, Sales, India and
Saarc, Symantec.
However, the biggest nightmare associated with
mobility is company data that flows into a wide variety of
mobile devices and applications, many of which were not
built to meet enterprise standards.
IT administrators are losing control of what tools and
applications are used inside the enterprise and business
users are becoming their own system administrators. Also,
this would shrink traditional perimeter to server and
data centers, anything out of DC should be considered
as external entity, says Pinakin Dave, National Manager,
Channels & Alliances, McAfee India.
“With 72 percent of Indian businesses facing mobility
incidents in the past 12 months and 37 percent facing
revenue loss due to mishaps, this trend introduces
significant opportunities for partners,” says Naik.
It is important to develop a balance between the
security and privacy demands from an organizational,
as well as employee standpoint. “CIOs are deploying
solutions that offer a holistic security policy, where the
controls can be applied securely to a device and location
agnostic network. This can be addressed by adopting an
integrated, adaptive, and collaborative security approach,”
shares Diwakar Dayal, Head, Sales, Security Business,
Borderless Networks, India & Saarc, Cisco Systems.
The CIO should also focus on designing a next
generation security architecture built on top of a multi
function platform with deep network integration. Due to
the evolving threat landscape, he requires a new approach
to deal with the `any to any’ challenges which arise,
suggests Vishal Bindra, CEO, ACPL Systems, Delhi.
Many organizations expect one single solution to
help secure BYOD on an end to end basis which is
practically not possible. BYOD needs to be looked at from
different dimensions like data loss prevention, network
access control, authentication system, internal intrusion
prevention systems, internal firewalls, securing Wi-Fi etc.
On top of all, is the internal IT policy which should be
detailed and fool-proof to drive the initiative and guide
effectively and prevent failure of specific tools, says
Srinivasa Boggaram, SE Team Lead, McAfee India.
While MDM is an integral part of mobile security,
Vishak Raman, Senior Regional Director, India and Saarc,
Fortinet, warns not to confuse MDM with total mobile
security. “MDM does provide an expanded level of policy
enforcement and offers remote location/lock/wiping
capabilities to protect against loss or theft. However, MDM
solutions enforce different policies based on the mobile
device they are supporting, resulting in inconsistent
security coverage.
Mobile security emerging as top priority
How do you protect corporate data when employees leave the office at the end
of the day with corporate data on their smartphones?
DIWAKAR DAYAL, Lead, Security, Borderless
Networks Sales, India & Saarc, Cisco Systems
“CIOs are deploying solutions
which offer a holistic security
policy where the controls can be
applied securely to a device- and
location-agnostic network”
VISHAK RAMAN
Senior Regional Director, India & Saarc, Fortinet
“MDM provides an expanded
level of policy enforcement. MDM
solutions enforce policies based
on the mobile devices, resulting in
inconsistent security coverage”
The global market for mobile security is expected to
reach $14.4 billion by 2017.
About 50 percent of the organizations in India will adopt
BYOD as a strategy by 2017.
Organizations adopting mobility and mobile security are
experiencing 50 percent higher revenue growth than
those opposing it.
Mobile device management, mobile application
management, data loss prevention and encryption are a
few areas to focus on.
HIGHLIGHTS
3. COVER STORY
18 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
O
rganizations are now turning their focus from
endpoint security to network security. The
adoption of SoCloMo (social media, cloud
computing and mobility) is breaking open the rigid
boundaries of enterprise IT from a controlled environment
to a situation where CIOs have to secure the data
distributed across cloud, mobile and social platforms.
So far, the security policies of organizations revolved
around securing and controlling endpoints, but now the
policies need to shift to control the data on the network,
informs Jitendra Gupta, Director, Channel and Alliances,
India and South Asia, Juniper Networks.
“Network security has become a boardroom issue for
most organizations and CISOs and CSOs are charged with
ensuring security of mission critical data traversing the
networks,” states Sunil Sharma, VP Sales & Operations,
India & Saarc, Cyberoam.
The network security market in India stood at `1,406
crore in FY2012-13, and is expected to be `1,638 crore in
FY2013-14. According to RS Market Research Solutions,
large enterprises contributed 44.3 percent, the mid-
market 8.2 percent, small businesses 15 percent, and the
government and education segments 32.5 percent.
Enterprises across the board, especially sectors such as
BFSI, government and telecom are investing in network
security solutions. Data from Cisco’s Annual Security
report 2013 indicates that contrary to the global spam
volumes which have reduced by 18 percent during the
last year, India has seen an escalation in the level of
malicious spam. According to CERT-In, an estimated
14,392 websites were hacked in 2012 till October.
Ashok Prabhu, CEO, ValuePoint TechSol, Bengaluru,
says, “Many enterprise customers have allowed
employees to use social media, but they are unable to
track the origin and persistence of zero-day attacks. We are
deploying context-aware intelligent solutions for them.”
According to Vishal Bindra, CEO, ACPL Systems,
Delhi, “Data privacy and the need to adhere to regulations
by customers in the pharma and manufacturing segments,
or multi group companies which have adopted SaaS, are
forcing cloud service providers to look at network security
in a holistic manner.”
“Money and spying are the two motivators for cyber
attacks targeting Web servers. IAM acts as a gateway
between the user and the applications,” says Durganadh
Venkata, Senior VP, Business Development & Operations,
Locuz Enterprise Solutions, Hyderabad.
Moreover, the Indian government recently updated
its IPv6 roadmap which details some pilot projects and a
new set of deliverables to transition to IPv6 by 2017. Since
IPv6 requires upgradation of the network infrastructure,
security is a major concern. “The exhaustion of IPv4
addresses, evolution of IPv6-oriented technologies,
government initiatives to push transition to IPv6, YoY
explosive growth of mobile devices, and the emergence of
the Internet of Things will boost network security in a big
way,” forecasts Diwakar Dayal, Lead, Security, Borderless
Networks Sales, India & Saarc, Cisco Systems.
Current security solutions are taking network and
Web application protection to the next level by providing
definitive intelligence about attackers. It uses intrusion
deception technology against Web-based threats.
“These solutions use deception to create detection
points or tar traps to identify malicious actors in real-time
as they attempt to hack their desired target. Once attackers
are identified, it prevents them from compromising
critical information, wastes their time by presenting false
vulnerabilities and provides valuable intelligence to
thwart future attacks. This is transforming the security
industry and changing the ROI of hacking by making it
costly, time consuming and tedious for attackers to chase
after false data.” Informs Ashish Dhawan, Managing
Director, Asia, Juniper Networks.
Security moving from endpoint to network
The security policies of organizations hitherto revolved around controlling
endpoints. That is now changing in favor of controlling the data on the network
SUNIL SHARMA, VP, Sales & Operations,
India & Saarc, Cyberoam
“Network security has become a
board-room issue, and CISOs and
CSOs are charged with ensuring
the security of mission-critical
data traversing the network”
VISHAL BINDRA
CEO, ACPL Systems
“Multi group companies which
have adopted SaaS, are forcing
cloud service providers to look
at network security in a holistic
manner”
The Indian network security market is expected to be
worth `1,638 crore in FY2013-14.
BFSI and government are continuously investing in
network security.
Companies which have adopted SaaS are forcing cloud
service providers to offer holistic network security.
IAM is being used by enterprises for Web application and
server protection.
The exhaustion of IPv4 addresses, and the government
push to IPv6, will boost network security.
HIGHLIGHTS
4.
5. COVER STORY
20 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
A
trend toward the next generation firewall (NGFW)
is gradually hotting up. The demand is coming
from large enterprises which cannot afford to
have disruptions from newer attacks because downtime
can kill millions of dollars. NGFW provides advanced
protection through complete visibility and reporting till
layer 7, and also does not hamper the current work, says
Kalyan Banga of RS Market Research Solutions.
Srikant Vissamsetti, VP, Network Security, McAfee
India, states that the worldwide NGFW market is
expected to grow from $500 million in 2012 to $4.6
billion by 2016. “NGFW as a concept that completely
meets the requirements of large enterprises. They are
looking for solutions for IP fragmentation, TCP stream
segmentation, RPC fragmentation, URL obfuscation,
HTML evasion and FTP evasion, so this is a large
opportunity for partners.”
Concurs Rahul Meher, MD, Leon Computers, Pune,
“The change in the threat landscape and the ever-growing
use of Web 2.0 technologies are increasingly challenging
traditional firewalls to evolve. Secondly, organizations in
the BFSI, manufacturing, IT-ITeS and PSU segments, as
well as MSPs, are seeking clarity on scanning, application
intelligence, performance, manageability and reporting.
These are definite opportunities for partners.”
Agrees Vibhore Shrivastava, Business Head, IT
Infrastructure, Meta Infotech, “We are seeing demand
for NGFW from the retail, education, e-commerce
and hospitality segments. Enterprises are providing
their employees access to social networking, but have
blocked the chat and games features. Also, industries
which have high-availability as an important criterion
are looking at NGFW.”
Meta Infotech has deployed NGFW for HDFC Bank
and AICT, and recently bagged a large contract from
ICICI Bank.
Enterprises are moving toward NGFW as traditional
firewalls primarily focus on limiting access based on
ports and protocols. With more applications using few
ports and protocols like HTTP and SSL, the traditional
firewalls are providing limited value. Says Vissamsetti,
“NGFW addresses this by providing application visibility
and adding user context. The threat landscape changed
from exploiting servers to exploiting desktop-based
applications when employees visit malicious sites and
open infected documents that come via email. NGFW
addresses this by adding IPS which does deep packet
inspection.”
Sunil Pillai, Co-founder & MD, iValue InfoSolutions,
Bengaluru, concludes that the security need is moving
from protocol-based protection to application layer/
functionality-specific needs along with protection from
new threat vectors like APT. NGFW offers the perfect
proposition for this.
Next generation firewall hotting up
Next generation firewalls provide advanced protection through complete
visibility and reporting till layer 7
RAHUL MEHER
Managing Director, Leon Computers
“Customers want clarity on
scanning, application intelligence,
performance, manageability and
reporting. These are opportunities
for partners”
The worldwide NGFW market is expected to grow to $4.6
billion by 2016.
BFSI, IT-ITeS and manufacturing are high-growth areas
for NGFW.
NGFW offers advanced protection through complete
visibility and reporting till layer 7.
NGFW offers solutions for IP fragmentation, TCP stream
segmentation, RPC fragmentation, URL obfuscation, and
HTML and FTP evasion.
HIGHLIGHTS
There is currently a lot of hype in security circles
surrounding the term ‘next generation firewall’ (NGFW). The
hype is creating slight market confusion and leaving CISOs
wondering how this technology differs from unified threat
management (UTM).
If you buy into the NGFW buzz, you may believe that it is
an entirely new, innovative technology which has emerged.
In reality an NGFW is a sub-set of the existing UTM market
or even the evolution of the old firewall market.
NGFW is generally described as a product which tightly
integrates firewall, intrusion prevention systems (IPSs), VPN
technologies and robust application control capabilities.
All these features have historically been offered by many
security products.
In contrast, UTM appliances typically scale with a broad
feature-set that can encompass most or all of the features
required to protect networks from today’s blended threats.
These features include an IPS, application control, network
antivirus and VPN but are not limited to them; they often also
include Web filtering, data leakage prevention and a host of
other security capabilities. In other words, a UTM appliance
can be deployed as a next-generation firewall, but a next
generation firewall is limited in its abilities.
Fortinet’s definition of NGFW is different. Our higher-
end UTM solutions are marketed as NGFWs, so they have
the full breadth of security functionalities targeted at large
enterprises, telcos and financial services institutions.
A COUNTER POINT
6. STORYCOVER
COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 21
W
hile virtualization brings in significant benefits
for organizations, there are security challenges
to be addressed in storage virtualization, server
virtualization and the like. “Identity is becoming the new
perimeter, therefore it needs more clarity on information
access management,” says Vic Mankotia, VP, Solution
Strategy, APAC, CA Technologies.
Any organization which has more than 40 instances
is considering virtualization security. Also, according to
Sudarsan Ranganathan, CEO, Veeras Infotek, Chennai,
companies which have a roadmap to private, public or
hybrid clouds are opting for virtualization security.
Informs Nityanand Shetty, MD, Essen Vision, Mumbai,
there has been strong uptake of virtualization security
from verticals such as BFSI, telecom and government
which are high adopters of the cloud.
Ashok Prabhu, CEO, ValuePoint Techsol, Bengaluru,
adds that since it is a niche technology the demand is
coming from large enterprises. “Because it secures virtual
machines and the traffic between VMs, there is significant
traction in virtualization security.”
Besides, virtualization security offers great scope for
services. “The technology works on virtual IP, which
means that the application has to bypass compute traffic
to meet high-availability requirements. Protecting such
applications is a great opportunity, and the services
revenue can be anywhere between `6 lakh-10 lakh for
three years,” informs Vibhore Shrivastava, Business Head,
IT Infrastructure, Meta Infotech, Mumbai.
VDI too is supporting the virtualization security .
Says Vishak Raman, Senior Regional Director, India &
Saarc, Fortinet, “Allowing mobile devices to access VDI
gives organizations the ability to leverage their existing
investment in VDI and provides a secure window into the
corporate network.”
Further, with virtualization taking center-stage, the
virtual firewall is gaining traction. “It’s a network firewall
service totally on a virtual environment and provides the
general monitoring through the usual network firewall,”
says Kalyan Banga, Regional Head, RSMRS.
Virtualization security on path to maturity
With virtualization having gained ground, can virtualization security be far
behind? There’s been uptake from the BFSI, telecom and government verticals
VIBHORE SHRIVASTAVA, Business Head
IT Infrastructure, Meta Infotech
“Protecting applications
is a great opportunity, and
the services revenue can be
anywhere between `6 lakh-10
lakh for three years”
What are the trends in security in the BFSI
segment?
Security trends in the financial segment includes
DLP, data waste monitoring, application change
management and managed security services.
Compliance and regulation are driving these
trends. For example, when data changes location,
it changes the security barriers as well. One has to
therefore put in place controls to avert risks.
Each of these drivers is inter-connected and
impacts the ecosystem. In an enterprise, either the
information security is absent or it is deployed based
on best practices or frameworks which are publicly available.
What are the challenges you face as a CISO?
Generating awareness among users to follow a certain security
process and convincing the management that information
security is not a hurdle, but a business enabler are the biggest
challenges any CISO faces.
The CISO has to create a rapport with his
stakeholders and come across as a business person
with the knowledge of technology. IT solution
providers should come across as consultants.
What are your suggestions for IT channel partners?
Bankers are late users of technology. IT partners can
leverage their position to educate them about newer
solutions with visible ROI.
Because service delivery is of paramount
importance for any financial institution, we expect
partners to be consultants who can roll out projects
in a time-bound manner.
Banks are now opting for 256-bit SSL certification
for websites and mobile banking applications. They are
implementing DLP solutions to prevent data leakage, as
well as two-factor authentication, and user-based and role-
based access. Security partners have great opportunities in
these areas.
“Security partners have great opportunity in BFSI”
INTERVIEW: ONKAR NATH
Generating awareness among users to follow a certain security process and convincing the
management that information security is a business enabler are the biggest challenges a CISO faces
In a recent panel discussion, Onkar Nath, CISO, Central Bank of India, shared his views on security trends
ONKAR NATH
7. COVER STORY
22 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
Make security a separate P&L account
Irrespective of the strengths and weaknesses of a
partner, the right approach to grow the security
business is to set it up as a separate business unit.
“While this may not be easy for many partners, we have
seen that focused partners have met with better results.
Security is a service-oriented space with a highly
specialized approach required,” says Nityanand Shetty,
MD, Essen Vision.
Later on, partners can go for dividing their
security business into various practices. “Once we
delve deep into security and increase certifications
and specializations we can divide it into separate
practices internally,” remarks Vishal Bindra, CEO,
ACPL Systems. “We have divided our security business
into multiple practices such as application and data
security, APT and IPv6.”
Most importantly, new entrants must partner with a
vendor offering complete security solutions including
web security, firewall, DLP, IPS, load balancing,
authentication systems and mobile device management.
“Even if you start with basic firewall and web security
solutions it’s always better to start with a vendor
offering a complete portfolio so that you need not
change vendors to graduate to high-end technologies,”
explains Shetty.
Focus on certification
Certification works in two ways in a partner’s favor.
First, it increases the confidence of customers who
consider the certifications of both the partner and
the implementation team members as key criteria for
awarding large projects. Second, vendors give extra
rebates to certified solutions partners. Says Shetty,
“Specialization is the core of the security business
without which one cannot survive. Moreover, our
margins are often enhanced because the various
certifications we have gained as a company have
helped us to earn better.” The company has more
than 10 professionals certified in technologies such as
firewall, DLP, IPS, IDS, web security, load balancing and
application acceleration.
Further, knowledge of laws and government
guidelines is essential. Better understanding of vertical-
specific guidelines for security is always beneficial to
address gaps and suggest solutions.
Understand the customer’s business
CIOs and enterprise vendors are scouting for partners
who have a strong understanding of how technology
can help a customer’s business to grow. The starting
point is to identify the pain areas of the customer which
probably even the customer is not aware of.
Moreover, security is all about educating the
customer. “It’s the partner’s responsibility to identify
gaps and suggest solutions,” says Philip George, CEO,
Axcenta ITES.
Advises Bindra, “Explain that procuring security
solutions is different from buying routers and switches.
Establish the difference between brands and products,
and explain the pros and cons of each. Be vendor-
neutral.”
Talk about evolving threats and industry trends, and
discuss the benefits of emerging security solutions. It
always helps to prepare case studies, show POCs, and
keep referrals handy.
“Our discussions with customers start with their
security policy and the processes they follow to secure
people, processes, technologies, data and information.
We then ask the customers to identify their assets
in order of importance, classify those, and decide
what they want to protect, which policy they want to
implement, and who should be their vendor,” informs
Bindra.
Build a services focus
Security practice is a service-oriented business. As
Shetty points out, “Security is anyway a services
business where an emergency can arrive anytime and
you have to provide immediate support. The idea is to
separate the support into professional security services.
Services include conducting security audits, suggesting
solutions, ensuring compliance and providing post-
sales support.”
Essen Vision recently launched a separate
professional security services division with a focus on
services around endpoint, data, network and server
security and compliance. “We are complementing our
product and solutions knowledge to offer security
consultation which pure-play consultants could not
offer,” says Shetty.
Develop strong processes
CIOs look at the internal practices and processes within
an organization before assigning a work order to it.
The reason is that they do not want to depend on a
few people. Other parameters include long tenures (of
employment), case referrals and vendor authorizations.
“We prefer to work with partners who are good at
knowledge-sharing, provide us with longer road-maps,
and present their plans for crisis management clearly,”
informs Ramkumar Mohan, Head, IT & CISO, Orbiz,
Gurgaon.
“Security is anyway a services business where an
emergency can arrive anytime and you have to provide
immediate support. The idea is to separate the support
into professional security services.”
How to build a security practice
Thinking of setting up an enterprise security business? Here are a few pointers
in that direction
8. Presented by
22-24 2013AUGUST
THE LEELA,KOVALAM
Presented by
Powered by Organised by
Presented by
Gold Partners
Platinum Partners
Workshop Partner Exhibitors
Thank you
to all our sponsors, exhibitors, delegates and
speakers in making CRN Leadership Summit
a great success.
9. 24 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
SPECIAL FOCUS
I
ndustry pundits say that various network edge
products such as application delivery controllers
(ADCs), load balancers and wide area network
(WAN) optimization appliances which help
organizations reduce network latency and improve
application performance are the biggest systems
integration opportunities.
The market for WAN solutions is increasing, and
the latest estimates from Gartner (May 2013) predict
that the Indian enterprise WAN market will grow from
$266.3 million in 2012 to $373.8 million by 2017.
Gartner also estimates the WAN optimization market to
be worth $40 million in 2013; this is expected to grow
at a CAGR of 25 percent.
Says Vijay Logani, Product Specialist, Cisco India
& Saarc, “As the employee workforce becomes more
mobile, organizations face new challenges to provide
LAN-like response time over the WAN.”
The data center boom has also increased awareness
and demand for application acceleration. Logani adds
that for any organization planning a DR center for its
data center, WAN optimization is critical as it could
considerably reduce bandwidth costs and latency.
Desktop virtualization projects are also driving
demand for app acceleration and latency reduction
solutions. “To get the maximum benefit from VDI, most
organizations will need to invest in edge devices that
would provide them a LAN-like experience over the
WAN,” says Kaushal Valluri, Director, Channels, Citrix
India.
Adds Shailendra Singh, Country Manager, A10
Networks, “Cloud computing and mobility have
been the biggest drivers. The cloud is forcing people
to use the WAN backbone more than the LAN, and
with mobile users accessing the Internet it becomes
imperative for CIOs to rethink WAN optimization.”
Sectors such as BFSI are expected to drive growth.
“Financial inclusion, where the need is to connect
every remote branch to the core banking system, is
not possible without ADCs,” says Shibu Paul, Country
Manager, Array Networks, India & Saarc.
Channel opportunities
Till a few months back the market leaders in this space
such as F5 Networks and Riverbed had been mostly
working with large SIs. However, in the recent past,
they have started wooing tier-2 channels.
A key challenge for most partners remains the cost
of the solution. Typical project sizes start at around
$25,000, and most customers outside enterprises shy
away from project implementation because of the high
cost. However, vendors want channels to stay focused
and look for opportunities.
“Today, every customer who is running an enterprise-
class application over HTTP or HTTPS is a potential user
of application acceleration appliances,” opines Parag
Khurana, MD, F5 Networks. “Almost all core banking
vendors have made their applications Web-enabled. How
else do you ensure that a remote user working with a
low-speed Internet connection gets a uniform service?”
OPTIMIZEDACCELERATION
Yesterday’s buzzwords—WAN optimization and application acceleration—are
becoming tomorrow’s opportunities. Gartner puts a figure to the size of the
Indian enterprise WAN market in 2017: $373 million
RAMDAS S
WAN optimization is essentially a collection of
techniques, including de-duplication, caching, traffic
shaping, protocol spoofing and latency optimization,
used alone or in combination, for increasing data transfer
efficiencies across WANs. In most cases they work in Layer
2 and Layer 3, but modern WAN optimization appliances
even work over Layer 7 or application layer. In most cases
effective delivery of WAN optimization requires symmetrical
appliances at the edge of all networks connected.
Application Delivery Controllers (ADCs) deliver
accelerated application experience to users using many of
the techniques used by WAN optimizers, but they also use
different types of load balancers including link load balancing
and server load balancing, and acceleration techniques over
SSL and TCP protocols.
Both the technologies, while addressing similar
problems, are used in different cases. WAN optimization is
useful when the users are within a corporate network spread
across different geographies, while ADCs deliver content to a
wider audience, for example, users of a Web application.
THE TECHNOLOGIES EXPLAINED