SlideShare ist ein Scribd-Unternehmen logo
1 von 9
Downloaden Sie, um offline zu lesen
COVER STORY
16 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
Change is the only constant in enterprise security both in
terms of the threats as well as the responses. Presenting a
few of the existing and emerging security trends
SONAL DESAI & AMIT SINGH
E
nterprise security is a solutions-driven business
offering channels almost assured double-digit
growth and margins. This fact is evident from the
increasing spend on security across segments.
As per a PwC survey, large businesses (those
with revenue of over `5,000 crore) and government
organizations saw a 11 percent and 8 percent increase
respectively in security spending in FY2011-12. Medium
businesses (with revenue from `500 crore to `5,000 crore)
saw a 17 percent increase in security spending followed
by small businesses (with revenue less than `500 crore)
where the spending increased by 14 percent.
The monetary value of the enterprise security market
in India was estimated at `3,423 crore in 2012 and is
likely to grow at 14.76 percent to reach `4,508 crore in
2014 according to RS Market Research Solutions.
The increasing use of the Internet is a potential driver
for the enterprise security market. The higher adoption of
smart devices by employees also calls for greater security
measures at companies. Another factor explaining the
rise in enterprise security is the regulatory mandates and
compliance measures.
According to one estimate, most organizations spend
11-15 percent of their revenue on IT of which 2-3 percent
goes toward security.
Here are some trends which partners can leverage to
strengthen their security practice.
SECURITY LANDSCAPE
THE ENTERPRISE
0
1000
2000
3000
4000
5000
3423.55
INRCrore
2012 2013 2014
3925.87
4508.77CAGR
14.76%
MARKET SIZE—ENTERPRISE SECURITY (INDIA)
Source: RS Market Research Solutions
STORYCOVER
COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 17
E
nterprise mobility and BYOD are emerging as the
top priorities and key investment areas for CIOs.
As mobile devices become ubiquitous and store
more personal and corporate data, new tools to secure
the information will drive the mobile-security market.
The increased risk to personal and corporate data is an
opportunity for the security partners as the global market
for mobile security is expected to reach $14.4 billion by
2017, according to research firm Global Industry Analysts.
Many of the organizations also opt for it to reduce their
Capex, says Sudarsan Ranganathan, CEO, Veeras Infotek,
Chennai. “Some of the areas to focus on, include, mobile
device management, mobile application management,
data loss prevention and encryption.”
About 50 percent of the organizations in India would
adopt BYOD as a strategy by 2017, asserts Sajan Paul,
Director, Systems Engineering, Juniper Networks.
According to the latest Symantec State of Mobility
Survey 2013, organizations proactive in mobile adoption
are experiencing nearly 50 percent higher revenue growth
than those restricting mobility. All things considered,
businesses perceive net positive results with mobility,”
shares Anand Naik, Managing Director, Sales, India and
Saarc, Symantec.
However, the biggest nightmare associated with
mobility is company data that flows into a wide variety of
mobile devices and applications, many of which were not
built to meet enterprise standards.
IT administrators are losing control of what tools and
applications are used inside the enterprise and business
users are becoming their own system administrators. Also,
this would shrink traditional perimeter to server and
data centers, anything out of DC should be considered
as external entity, says Pinakin Dave, National Manager,
Channels & Alliances, McAfee India.
“With 72 percent of Indian businesses facing mobility
incidents in the past 12 months and 37 percent facing
revenue loss due to mishaps, this trend introduces
significant opportunities for partners,” says Naik.
It is important to develop a balance between the
security and privacy demands from an organizational,
as well as employee standpoint. “CIOs are deploying
solutions that offer a holistic security policy, where the
controls can be applied securely to a device and location
agnostic network. This can be addressed by adopting an
integrated, adaptive, and collaborative security approach,”
shares Diwakar Dayal, Head, Sales, Security Business,
Borderless Networks, India & Saarc, Cisco Systems.
The CIO should also focus on designing a next
generation security architecture built on top of a multi
function platform with deep network integration. Due to
the evolving threat landscape, he requires a new approach
to deal with the `any to any’ challenges which arise,
suggests Vishal Bindra, CEO, ACPL Systems, Delhi.
Many organizations expect one single solution to
help secure BYOD on an end to end basis which is
practically not possible. BYOD needs to be looked at from
different dimensions like data loss prevention, network
access control, authentication system, internal intrusion
prevention systems, internal firewalls, securing Wi-Fi etc.
On top of all, is the internal IT policy which should be
detailed and fool-proof to drive the initiative and guide
effectively and prevent failure of specific tools, says
Srinivasa Boggaram, SE Team Lead, McAfee India.
While MDM is an integral part of mobile security,
Vishak Raman, Senior Regional Director, India and Saarc,
Fortinet, warns not to confuse MDM with total mobile
security. “MDM does provide an expanded level of policy
enforcement and offers remote location/lock/wiping
capabilities to protect against loss or theft. However, MDM
solutions enforce different policies based on the mobile
device they are supporting, resulting in inconsistent
security coverage.
Mobile security emerging as top priority
How do you protect corporate data when employees leave the office at the end
of the day with corporate data on their smartphones?
DIWAKAR DAYAL, Lead, Security, Borderless
Networks Sales, India & Saarc, Cisco Systems
“CIOs are deploying solutions
which offer a holistic security
policy where the controls can be
applied securely to a device- and
location-agnostic network”
VISHAK RAMAN
Senior Regional Director, India & Saarc, Fortinet
“MDM provides an expanded
level of policy enforcement. MDM
solutions enforce policies based
on the mobile devices, resulting in
inconsistent security coverage”
The global market for mobile security is expected to
reach $14.4 billion by 2017.
About 50 percent of the organizations in India will adopt
BYOD as a strategy by 2017.
Organizations adopting mobility and mobile security are
experiencing 50 percent higher revenue growth than
those opposing it.
Mobile device management, mobile application
management, data loss prevention and encryption are a
few areas to focus on.
HIGHLIGHTS
COVER STORY
18 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
O
rganizations are now turning their focus from
endpoint security to network security. The
adoption of SoCloMo (social media, cloud
computing and mobility) is breaking open the rigid
boundaries of enterprise IT from a controlled environment
to a situation where CIOs have to secure the data
distributed across cloud, mobile and social platforms.
So far, the security policies of organizations revolved
around securing and controlling endpoints, but now the
policies need to shift to control the data on the network,
informs Jitendra Gupta, Director, Channel and Alliances,
India and South Asia, Juniper Networks.
“Network security has become a boardroom issue for
most organizations and CISOs and CSOs are charged with
ensuring security of mission critical data traversing the
networks,” states Sunil Sharma, VP Sales & Operations,
India & Saarc, Cyberoam.
The network security market in India stood at `1,406
crore in FY2012-13, and is expected to be `1,638 crore in
FY2013-14. According to RS Market Research Solutions,
large enterprises contributed 44.3 percent, the mid-
market 8.2 percent, small businesses 15 percent, and the
government and education segments 32.5 percent.
Enterprises across the board, especially sectors such as
BFSI, government and telecom are investing in network
security solutions. Data from Cisco’s Annual Security
report 2013 indicates that contrary to the global spam
volumes which have reduced by 18 percent during the
last year, India has seen an escalation in the level of
malicious spam. According to CERT-In, an estimated
14,392 websites were hacked in 2012 till October.
Ashok Prabhu, CEO, ValuePoint TechSol, Bengaluru,
says, “Many enterprise customers have allowed
employees to use social media, but they are unable to
track the origin and persistence of zero-day attacks. We are
deploying context-aware intelligent solutions for them.”
According to Vishal Bindra, CEO, ACPL Systems,
Delhi, “Data privacy and the need to adhere to regulations
by customers in the pharma and manufacturing segments,
or multi group companies which have adopted SaaS, are
forcing cloud service providers to look at network security
in a holistic manner.”
“Money and spying are the two motivators for cyber
attacks targeting Web servers. IAM acts as a gateway
between the user and the applications,” says Durganadh
Venkata, Senior VP, Business Development & Operations,
Locuz Enterprise Solutions, Hyderabad.
Moreover, the Indian government recently updated
its IPv6 roadmap which details some pilot projects and a
new set of deliverables to transition to IPv6 by 2017. Since
IPv6 requires upgradation of the network infrastructure,
security is a major concern. “The exhaustion of IPv4
addresses, evolution of IPv6-oriented technologies,
government initiatives to push transition to IPv6, YoY
explosive growth of mobile devices, and the emergence of
the Internet of Things will boost network security in a big
way,” forecasts Diwakar Dayal, Lead, Security, Borderless
Networks Sales, India & Saarc, Cisco Systems.
Current security solutions are taking network and
Web application protection to the next level by providing
definitive intelligence about attackers. It uses intrusion
deception technology against Web-based threats.
“These solutions use deception to create detection
points or tar traps to identify malicious actors in real-time
as they attempt to hack their desired target. Once attackers
are identified, it prevents them from compromising
critical information, wastes their time by presenting false
vulnerabilities and provides valuable intelligence to
thwart future attacks. This is transforming the security
industry and changing the ROI of hacking by making it
costly, time consuming and tedious for attackers to chase
after false data.” Informs Ashish Dhawan, Managing
Director, Asia, Juniper Networks.
Security moving from endpoint to network
The security policies of organizations hitherto revolved around controlling
endpoints. That is now changing in favor of controlling the data on the network
SUNIL SHARMA, VP, Sales & Operations,
India & Saarc, Cyberoam
“Network security has become a
board-room issue, and CISOs and
CSOs are charged with ensuring
the security of mission-critical
data traversing the network”
VISHAL BINDRA
CEO, ACPL Systems
“Multi group companies which
have adopted SaaS, are forcing
cloud service providers to look
at network security in a holistic
manner”
The Indian network security market is expected to be
worth `1,638 crore in FY2013-14.
BFSI and government are continuously investing in
network security.
Companies which have adopted SaaS are forcing cloud
service providers to offer holistic network security.
IAM is being used by enterprises for Web application and
server protection.
The exhaustion of IPv4 addresses, and the government
push to IPv6, will boost network security.
HIGHLIGHTS
COVER STORY
20 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
A
trend toward the next generation firewall (NGFW)
is gradually hotting up. The demand is coming
from large enterprises which cannot afford to
have disruptions from newer attacks because downtime
can kill millions of dollars. NGFW provides advanced
protection through complete visibility and reporting till
layer 7, and also does not hamper the current work, says
Kalyan Banga of RS Market Research Solutions.
Srikant Vissamsetti, VP, Network Security, McAfee
India, states that the worldwide NGFW market is
expected to grow from $500 million in 2012 to $4.6
billion by 2016. “NGFW as a concept that completely
meets the requirements of large enterprises. They are
looking for solutions for IP fragmentation, TCP stream
segmentation, RPC fragmentation, URL obfuscation,
HTML evasion and FTP evasion, so this is a large
opportunity for partners.”
Concurs Rahul Meher, MD, Leon Computers, Pune,
“The change in the threat landscape and the ever-growing
use of Web 2.0 technologies are increasingly challenging
traditional firewalls to evolve. Secondly, organizations in
the BFSI, manufacturing, IT-ITeS and PSU segments, as
well as MSPs, are seeking clarity on scanning, application
intelligence, performance, manageability and reporting.
These are definite opportunities for partners.”
Agrees Vibhore Shrivastava, Business Head, IT
Infrastructure, Meta Infotech, “We are seeing demand
for NGFW from the retail, education, e-commerce
and hospitality segments. Enterprises are providing
their employees access to social networking, but have
blocked the chat and games features. Also, industries
which have high-availability as an important criterion
are looking at NGFW.”
Meta Infotech has deployed NGFW for HDFC Bank
and AICT, and recently bagged a large contract from
ICICI Bank.
Enterprises are moving toward NGFW as traditional
firewalls primarily focus on limiting access based on
ports and protocols. With more applications using few
ports and protocols like HTTP and SSL, the traditional
firewalls are providing limited value. Says Vissamsetti,
“NGFW addresses this by providing application visibility
and adding user context. The threat landscape changed
from exploiting servers to exploiting desktop-based
applications when employees visit malicious sites and
open infected documents that come via email. NGFW
addresses this by adding IPS which does deep packet
inspection.”
Sunil Pillai, Co-founder & MD, iValue InfoSolutions,
Bengaluru, concludes that the security need is moving
from protocol-based protection to application layer/
functionality-specific needs along with protection from
new threat vectors like APT. NGFW offers the perfect
proposition for this.
Next generation firewall hotting up
Next generation firewalls provide advanced protection through complete
visibility and reporting till layer 7
RAHUL MEHER
Managing Director, Leon Computers
“Customers want clarity on
scanning, application intelligence,
performance, manageability and
reporting. These are opportunities
for partners”
The worldwide NGFW market is expected to grow to $4.6
billion by 2016.
BFSI, IT-ITeS and manufacturing are high-growth areas
for NGFW.
NGFW offers advanced protection through complete
visibility and reporting till layer 7.
NGFW offers solutions for IP fragmentation, TCP stream
segmentation, RPC fragmentation, URL obfuscation, and
HTML and FTP evasion.
HIGHLIGHTS
There is currently a lot of hype in security circles
surrounding the term ‘next generation firewall’ (NGFW). The
hype is creating slight market confusion and leaving CISOs
wondering how this technology differs from unified threat
management (UTM).
If you buy into the NGFW buzz, you may believe that it is
an entirely new, innovative technology which has emerged.
In reality an NGFW is a sub-set of the existing UTM market
or even the evolution of the old firewall market.
NGFW is generally described as a product which tightly
integrates firewall, intrusion prevention systems (IPSs), VPN
technologies and robust application control capabilities.
All these features have historically been offered by many
security products.
In contrast, UTM appliances typically scale with a broad
feature-set that can encompass most or all of the features
required to protect networks from today’s blended threats.
These features include an IPS, application control, network
antivirus and VPN but are not limited to them; they often also
include Web filtering, data leakage prevention and a host of
other security capabilities. In other words, a UTM appliance
can be deployed as a next-generation firewall, but a next
generation firewall is limited in its abilities.
Fortinet’s definition of NGFW is different. Our higher-
end UTM solutions are marketed as NGFWs, so they have
the full breadth of security functionalities targeted at large
enterprises, telcos and financial services institutions.
A COUNTER POINT
STORYCOVER
COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 21
W
hile virtualization brings in significant benefits
for organizations, there are security challenges
to be addressed in storage virtualization, server
virtualization and the like. “Identity is becoming the new
perimeter, therefore it needs more clarity on information
access management,” says Vic Mankotia, VP, Solution
Strategy, APAC, CA Technologies.
Any organization which has more than 40 instances
is considering virtualization security. Also, according to
Sudarsan Ranganathan, CEO, Veeras Infotek, Chennai,
companies which have a roadmap to private, public or
hybrid clouds are opting for virtualization security.
Informs Nityanand Shetty, MD, Essen Vision, Mumbai,
there has been strong uptake of virtualization security
from verticals such as BFSI, telecom and government
which are high adopters of the cloud.
Ashok Prabhu, CEO, ValuePoint Techsol, Bengaluru,
adds that since it is a niche technology the demand is
coming from large enterprises. “Because it secures virtual
machines and the traffic between VMs, there is significant
traction in virtualization security.”
Besides, virtualization security offers great scope for
services. “The technology works on virtual IP, which
means that the application has to bypass compute traffic
to meet high-availability requirements. Protecting such
applications is a great opportunity, and the services
revenue can be anywhere between `6 lakh-10 lakh for
three years,” informs Vibhore Shrivastava, Business Head,
IT Infrastructure, Meta Infotech, Mumbai.
VDI too is supporting the virtualization security .
Says Vishak Raman, Senior Regional Director, India &
Saarc, Fortinet, “Allowing mobile devices to access VDI
gives organizations the ability to leverage their existing
investment in VDI and provides a secure window into the
corporate network.”
Further, with virtualization taking center-stage, the
virtual firewall is gaining traction. “It’s a network firewall
service totally on a virtual environment and provides the
general monitoring through the usual network firewall,”
says Kalyan Banga, Regional Head, RSMRS.
Virtualization security on path to maturity
With virtualization having gained ground, can virtualization security be far
behind? There’s been uptake from the BFSI, telecom and government verticals
VIBHORE SHRIVASTAVA, Business Head
IT Infrastructure, Meta Infotech
“Protecting applications
is a great opportunity, and
the services revenue can be
anywhere between `6 lakh-10
lakh for three years”
What are the trends in security in the BFSI
segment?
Security trends in the financial segment includes
DLP, data waste monitoring, application change
management and managed security services.
Compliance and regulation are driving these
trends. For example, when data changes location,
it changes the security barriers as well. One has to
therefore put in place controls to avert risks.
Each of these drivers is inter-connected and
impacts the ecosystem. In an enterprise, either the
information security is absent or it is deployed based
on best practices or frameworks which are publicly available.
What are the challenges you face as a CISO?
Generating awareness among users to follow a certain security
process and convincing the management that information
security is not a hurdle, but a business enabler are the biggest
challenges any CISO faces.
The CISO has to create a rapport with his
stakeholders and come across as a business person
with the knowledge of technology. IT solution
providers should come across as consultants.
What are your suggestions for IT channel partners?
Bankers are late users of technology. IT partners can
leverage their position to educate them about newer
solutions with visible ROI.
Because service delivery is of paramount
importance for any financial institution, we expect
partners to be consultants who can roll out projects
in a time-bound manner.
Banks are now opting for 256-bit SSL certification
for websites and mobile banking applications. They are
implementing DLP solutions to prevent data leakage, as
well as two-factor authentication, and user-based and role-
based access. Security partners have great opportunities in
these areas.
“Security partners have great opportunity in BFSI”
INTERVIEW: ONKAR NATH
Generating awareness among users to follow a certain security process and convincing the
management that information security is a business enabler are the biggest challenges a CISO faces
In a recent panel discussion, Onkar Nath, CISO, Central Bank of India, shared his views on security trends
ONKAR NATH
COVER STORY
22 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
Make security a separate P&L account
Irrespective of the strengths and weaknesses of a
partner, the right approach to grow the security
business is to set it up as a separate business unit.
“While this may not be easy for many partners, we have
seen that focused partners have met with better results.
Security is a service-oriented space with a highly
specialized approach required,” says Nityanand Shetty,
MD, Essen Vision.
Later on, partners can go for dividing their
security business into various practices. “Once we
delve deep into security and increase certifications
and specializations we can divide it into separate
practices internally,” remarks Vishal Bindra, CEO,
ACPL Systems. “We have divided our security business
into multiple practices such as application and data
security, APT and IPv6.”
Most importantly, new entrants must partner with a
vendor offering complete security solutions including
web security, firewall, DLP, IPS, load balancing,
authentication systems and mobile device management.
“Even if you start with basic firewall and web security
solutions it’s always better to start with a vendor
offering a complete portfolio so that you need not
change vendors to graduate to high-end technologies,”
explains Shetty.
Focus on certification
Certification works in two ways in a partner’s favor.
First, it increases the confidence of customers who
consider the certifications of both the partner and
the implementation team members as key criteria for
awarding large projects. Second, vendors give extra
rebates to certified solutions partners. Says Shetty,
“Specialization is the core of the security business
without which one cannot survive. Moreover, our
margins are often enhanced because the various
certifications we have gained as a company have
helped us to earn better.” The company has more
than 10 professionals certified in technologies such as
firewall, DLP, IPS, IDS, web security, load balancing and
application acceleration.
Further, knowledge of laws and government
guidelines is essential. Better understanding of vertical-
specific guidelines for security is always beneficial to
address gaps and suggest solutions.
Understand the customer’s business
CIOs and enterprise vendors are scouting for partners
who have a strong understanding of how technology
can help a customer’s business to grow. The starting
point is to identify the pain areas of the customer which
probably even the customer is not aware of.
Moreover, security is all about educating the
customer. “It’s the partner’s responsibility to identify
gaps and suggest solutions,” says Philip George, CEO,
Axcenta ITES.
Advises Bindra, “Explain that procuring security
solutions is different from buying routers and switches.
Establish the difference between brands and products,
and explain the pros and cons of each. Be vendor-
neutral.”
Talk about evolving threats and industry trends, and
discuss the benefits of emerging security solutions. It
always helps to prepare case studies, show POCs, and
keep referrals handy.
“Our discussions with customers start with their
security policy and the processes they follow to secure
people, processes, technologies, data and information.
We then ask the customers to identify their assets
in order of importance, classify those, and decide
what they want to protect, which policy they want to
implement, and who should be their vendor,” informs
Bindra.
Build a services focus
Security practice is a service-oriented business. As
Shetty points out, “Security is anyway a services
business where an emergency can arrive anytime and
you have to provide immediate support. The idea is to
separate the support into professional security services.
Services include conducting security audits, suggesting
solutions, ensuring compliance and providing post-
sales support.”
Essen Vision recently launched a separate
professional security services division with a focus on
services around endpoint, data, network and server
security and compliance. “We are complementing our
product and solutions knowledge to offer security
consultation which pure-play consultants could not
offer,” says Shetty.
Develop strong processes
CIOs look at the internal practices and processes within
an organization before assigning a work order to it.
The reason is that they do not want to depend on a
few people. Other parameters include long tenures (of
employment), case referrals and vendor authorizations.
“We prefer to work with partners who are good at
knowledge-sharing, provide us with longer road-maps,
and present their plans for crisis management clearly,”
informs Ramkumar Mohan, Head, IT & CISO, Orbiz,
Gurgaon.
“Security is anyway a services business where an
emergency can arrive anytime and you have to provide
immediate support. The idea is to separate the support
into professional security services.”
How to build a security practice
Thinking of setting up an enterprise security business? Here are a few pointers
in that direction
Presented by
22-24 2013AUGUST
THE LEELA,KOVALAM
Presented by
Powered by Organised by
Presented by
Gold Partners
Platinum Partners
Workshop Partner Exhibitors
Thank you
to all our sponsors, exhibitors, delegates and
speakers in making CRN Leadership Summit
a great success.
24 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
SPECIAL FOCUS
I
ndustry pundits say that various network edge
products such as application delivery controllers
(ADCs), load balancers and wide area network
(WAN) optimization appliances which help
organizations reduce network latency and improve
application performance are the biggest systems
integration opportunities.
The market for WAN solutions is increasing, and
the latest estimates from Gartner (May 2013) predict
that the Indian enterprise WAN market will grow from
$266.3 million in 2012 to $373.8 million by 2017.
Gartner also estimates the WAN optimization market to
be worth $40 million in 2013; this is expected to grow
at a CAGR of 25 percent.
Says Vijay Logani, Product Specialist, Cisco India
& Saarc, “As the employee workforce becomes more
mobile, organizations face new challenges to provide
LAN-like response time over the WAN.”
The data center boom has also increased awareness
and demand for application acceleration. Logani adds
that for any organization planning a DR center for its
data center, WAN optimization is critical as it could
considerably reduce bandwidth costs and latency.
Desktop virtualization projects are also driving
demand for app acceleration and latency reduction
solutions. “To get the maximum benefit from VDI, most
organizations will need to invest in edge devices that
would provide them a LAN-like experience over the
WAN,” says Kaushal Valluri, Director, Channels, Citrix
India.
Adds Shailendra Singh, Country Manager, A10
Networks, “Cloud computing and mobility have
been the biggest drivers. The cloud is forcing people
to use the WAN backbone more than the LAN, and
with mobile users accessing the Internet it becomes
imperative for CIOs to rethink WAN optimization.”
Sectors such as BFSI are expected to drive growth.
“Financial inclusion, where the need is to connect
every remote branch to the core banking system, is
not possible without ADCs,” says Shibu Paul, Country
Manager, Array Networks, India & Saarc.
Channel opportunities
Till a few months back the market leaders in this space
such as F5 Networks and Riverbed had been mostly
working with large SIs. However, in the recent past,
they have started wooing tier-2 channels.
A key challenge for most partners remains the cost
of the solution. Typical project sizes start at around
$25,000, and most customers outside enterprises shy
away from project implementation because of the high
cost. However, vendors want channels to stay focused
and look for opportunities.
“Today, every customer who is running an enterprise-
class application over HTTP or HTTPS is a potential user
of application acceleration appliances,” opines Parag
Khurana, MD, F5 Networks. “Almost all core banking
vendors have made their applications Web-enabled. How
else do you ensure that a remote user working with a
low-speed Internet connection gets a uniform service?”
OPTIMIZEDACCELERATION
Yesterday’s buzzwords—WAN optimization and application acceleration—are
becoming tomorrow’s opportunities. Gartner puts a figure to the size of the
Indian enterprise WAN market in 2017: $373 million
RAMDAS S
WAN optimization is essentially a collection of
techniques, including de-duplication, caching, traffic
shaping, protocol spoofing and latency optimization,
used alone or in combination, for increasing data transfer
efficiencies across WANs. In most cases they work in Layer
2 and Layer 3, but modern WAN optimization appliances
even work over Layer 7 or application layer. In most cases
effective delivery of WAN optimization requires symmetrical
appliances at the edge of all networks connected.
Application Delivery Controllers (ADCs) deliver
accelerated application experience to users using many of
the techniques used by WAN optimizers, but they also use
different types of load balancers including link load balancing
and server load balancing, and acceleration techniques over
SSL and TCP protocols.
Both the technologies, while addressing similar
problems, are used in different cases. WAN optimization is
useful when the users are within a corporate network spread
across different geographies, while ADCs deliver content to a
wider audience, for example, users of a Web application.
THE TECHNOLOGIES EXPLAINED

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
amitlee9823
 
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
gajnagarg
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
amitlee9823
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
amitlee9823
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
amitlee9823
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
amitlee9823
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
amitlee9823
 
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
amitlee9823
 

Kürzlich hochgeladen (20)

Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night StandCall Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Attibele ☎ 7737669865 🥵 Book Your One night Stand
 
Predicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science ProjectPredicting Loan Approval: A Data Science Project
Predicting Loan Approval: A Data Science Project
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
Escorts Service Kumaraswamy Layout ☎ 7737669865☎ Book Your One night Stand (B...
 
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
Just Call Vip call girls Erode Escorts ☎️9352988975 Two shot with one girl (E...
 
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men  🔝malwa🔝   Escorts Ser...
➥🔝 7737669865 🔝▻ malwa Call-girls in Women Seeking Men 🔝malwa🔝 Escorts Ser...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men  🔝Mathura🔝   Escorts...
➥🔝 7737669865 🔝▻ Mathura Call-girls in Women Seeking Men 🔝Mathura🔝 Escorts...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Bommasandra Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Nandini Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bellandur ☎ 7737669865 🥵 Book Your One night Stand
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men  🔝Dindigul🔝   Escor...
➥🔝 7737669865 🔝▻ Dindigul Call-girls in Women Seeking Men 🔝Dindigul🔝 Escor...
 
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men  🔝mahisagar🔝   Esc...
➥🔝 7737669865 🔝▻ mahisagar Call-girls in Women Seeking Men 🔝mahisagar🔝 Esc...
 

Empfohlen

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Saba Software
 

Empfohlen (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

CRN 01 September Cover Story

  • 1. COVER STORY 16 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in Change is the only constant in enterprise security both in terms of the threats as well as the responses. Presenting a few of the existing and emerging security trends SONAL DESAI & AMIT SINGH E nterprise security is a solutions-driven business offering channels almost assured double-digit growth and margins. This fact is evident from the increasing spend on security across segments. As per a PwC survey, large businesses (those with revenue of over `5,000 crore) and government organizations saw a 11 percent and 8 percent increase respectively in security spending in FY2011-12. Medium businesses (with revenue from `500 crore to `5,000 crore) saw a 17 percent increase in security spending followed by small businesses (with revenue less than `500 crore) where the spending increased by 14 percent. The monetary value of the enterprise security market in India was estimated at `3,423 crore in 2012 and is likely to grow at 14.76 percent to reach `4,508 crore in 2014 according to RS Market Research Solutions. The increasing use of the Internet is a potential driver for the enterprise security market. The higher adoption of smart devices by employees also calls for greater security measures at companies. Another factor explaining the rise in enterprise security is the regulatory mandates and compliance measures. According to one estimate, most organizations spend 11-15 percent of their revenue on IT of which 2-3 percent goes toward security. Here are some trends which partners can leverage to strengthen their security practice. SECURITY LANDSCAPE THE ENTERPRISE 0 1000 2000 3000 4000 5000 3423.55 INRCrore 2012 2013 2014 3925.87 4508.77CAGR 14.76% MARKET SIZE—ENTERPRISE SECURITY (INDIA) Source: RS Market Research Solutions
  • 2. STORYCOVER COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 17 E nterprise mobility and BYOD are emerging as the top priorities and key investment areas for CIOs. As mobile devices become ubiquitous and store more personal and corporate data, new tools to secure the information will drive the mobile-security market. The increased risk to personal and corporate data is an opportunity for the security partners as the global market for mobile security is expected to reach $14.4 billion by 2017, according to research firm Global Industry Analysts. Many of the organizations also opt for it to reduce their Capex, says Sudarsan Ranganathan, CEO, Veeras Infotek, Chennai. “Some of the areas to focus on, include, mobile device management, mobile application management, data loss prevention and encryption.” About 50 percent of the organizations in India would adopt BYOD as a strategy by 2017, asserts Sajan Paul, Director, Systems Engineering, Juniper Networks. According to the latest Symantec State of Mobility Survey 2013, organizations proactive in mobile adoption are experiencing nearly 50 percent higher revenue growth than those restricting mobility. All things considered, businesses perceive net positive results with mobility,” shares Anand Naik, Managing Director, Sales, India and Saarc, Symantec. However, the biggest nightmare associated with mobility is company data that flows into a wide variety of mobile devices and applications, many of which were not built to meet enterprise standards. IT administrators are losing control of what tools and applications are used inside the enterprise and business users are becoming their own system administrators. Also, this would shrink traditional perimeter to server and data centers, anything out of DC should be considered as external entity, says Pinakin Dave, National Manager, Channels & Alliances, McAfee India. “With 72 percent of Indian businesses facing mobility incidents in the past 12 months and 37 percent facing revenue loss due to mishaps, this trend introduces significant opportunities for partners,” says Naik. It is important to develop a balance between the security and privacy demands from an organizational, as well as employee standpoint. “CIOs are deploying solutions that offer a holistic security policy, where the controls can be applied securely to a device and location agnostic network. This can be addressed by adopting an integrated, adaptive, and collaborative security approach,” shares Diwakar Dayal, Head, Sales, Security Business, Borderless Networks, India & Saarc, Cisco Systems. The CIO should also focus on designing a next generation security architecture built on top of a multi function platform with deep network integration. Due to the evolving threat landscape, he requires a new approach to deal with the `any to any’ challenges which arise, suggests Vishal Bindra, CEO, ACPL Systems, Delhi. Many organizations expect one single solution to help secure BYOD on an end to end basis which is practically not possible. BYOD needs to be looked at from different dimensions like data loss prevention, network access control, authentication system, internal intrusion prevention systems, internal firewalls, securing Wi-Fi etc. On top of all, is the internal IT policy which should be detailed and fool-proof to drive the initiative and guide effectively and prevent failure of specific tools, says Srinivasa Boggaram, SE Team Lead, McAfee India. While MDM is an integral part of mobile security, Vishak Raman, Senior Regional Director, India and Saarc, Fortinet, warns not to confuse MDM with total mobile security. “MDM does provide an expanded level of policy enforcement and offers remote location/lock/wiping capabilities to protect against loss or theft. However, MDM solutions enforce different policies based on the mobile device they are supporting, resulting in inconsistent security coverage. Mobile security emerging as top priority How do you protect corporate data when employees leave the office at the end of the day with corporate data on their smartphones? DIWAKAR DAYAL, Lead, Security, Borderless Networks Sales, India & Saarc, Cisco Systems “CIOs are deploying solutions which offer a holistic security policy where the controls can be applied securely to a device- and location-agnostic network” VISHAK RAMAN Senior Regional Director, India & Saarc, Fortinet “MDM provides an expanded level of policy enforcement. MDM solutions enforce policies based on the mobile devices, resulting in inconsistent security coverage” The global market for mobile security is expected to reach $14.4 billion by 2017. About 50 percent of the organizations in India will adopt BYOD as a strategy by 2017. Organizations adopting mobility and mobile security are experiencing 50 percent higher revenue growth than those opposing it. Mobile device management, mobile application management, data loss prevention and encryption are a few areas to focus on. HIGHLIGHTS
  • 3. COVER STORY 18 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in O rganizations are now turning their focus from endpoint security to network security. The adoption of SoCloMo (social media, cloud computing and mobility) is breaking open the rigid boundaries of enterprise IT from a controlled environment to a situation where CIOs have to secure the data distributed across cloud, mobile and social platforms. So far, the security policies of organizations revolved around securing and controlling endpoints, but now the policies need to shift to control the data on the network, informs Jitendra Gupta, Director, Channel and Alliances, India and South Asia, Juniper Networks. “Network security has become a boardroom issue for most organizations and CISOs and CSOs are charged with ensuring security of mission critical data traversing the networks,” states Sunil Sharma, VP Sales & Operations, India & Saarc, Cyberoam. The network security market in India stood at `1,406 crore in FY2012-13, and is expected to be `1,638 crore in FY2013-14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent, the mid- market 8.2 percent, small businesses 15 percent, and the government and education segments 32.5 percent. Enterprises across the board, especially sectors such as BFSI, government and telecom are investing in network security solutions. Data from Cisco’s Annual Security report 2013 indicates that contrary to the global spam volumes which have reduced by 18 percent during the last year, India has seen an escalation in the level of malicious spam. According to CERT-In, an estimated 14,392 websites were hacked in 2012 till October. Ashok Prabhu, CEO, ValuePoint TechSol, Bengaluru, says, “Many enterprise customers have allowed employees to use social media, but they are unable to track the origin and persistence of zero-day attacks. We are deploying context-aware intelligent solutions for them.” According to Vishal Bindra, CEO, ACPL Systems, Delhi, “Data privacy and the need to adhere to regulations by customers in the pharma and manufacturing segments, or multi group companies which have adopted SaaS, are forcing cloud service providers to look at network security in a holistic manner.” “Money and spying are the two motivators for cyber attacks targeting Web servers. IAM acts as a gateway between the user and the applications,” says Durganadh Venkata, Senior VP, Business Development & Operations, Locuz Enterprise Solutions, Hyderabad. Moreover, the Indian government recently updated its IPv6 roadmap which details some pilot projects and a new set of deliverables to transition to IPv6 by 2017. Since IPv6 requires upgradation of the network infrastructure, security is a major concern. “The exhaustion of IPv4 addresses, evolution of IPv6-oriented technologies, government initiatives to push transition to IPv6, YoY explosive growth of mobile devices, and the emergence of the Internet of Things will boost network security in a big way,” forecasts Diwakar Dayal, Lead, Security, Borderless Networks Sales, India & Saarc, Cisco Systems. Current security solutions are taking network and Web application protection to the next level by providing definitive intelligence about attackers. It uses intrusion deception technology against Web-based threats. “These solutions use deception to create detection points or tar traps to identify malicious actors in real-time as they attempt to hack their desired target. Once attackers are identified, it prevents them from compromising critical information, wastes their time by presenting false vulnerabilities and provides valuable intelligence to thwart future attacks. This is transforming the security industry and changing the ROI of hacking by making it costly, time consuming and tedious for attackers to chase after false data.” Informs Ashish Dhawan, Managing Director, Asia, Juniper Networks. Security moving from endpoint to network The security policies of organizations hitherto revolved around controlling endpoints. That is now changing in favor of controlling the data on the network SUNIL SHARMA, VP, Sales & Operations, India & Saarc, Cyberoam “Network security has become a board-room issue, and CISOs and CSOs are charged with ensuring the security of mission-critical data traversing the network” VISHAL BINDRA CEO, ACPL Systems “Multi group companies which have adopted SaaS, are forcing cloud service providers to look at network security in a holistic manner” The Indian network security market is expected to be worth `1,638 crore in FY2013-14. BFSI and government are continuously investing in network security. Companies which have adopted SaaS are forcing cloud service providers to offer holistic network security. IAM is being used by enterprises for Web application and server protection. The exhaustion of IPv4 addresses, and the government push to IPv6, will boost network security. HIGHLIGHTS
  • 4.
  • 5. COVER STORY 20 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in A trend toward the next generation firewall (NGFW) is gradually hotting up. The demand is coming from large enterprises which cannot afford to have disruptions from newer attacks because downtime can kill millions of dollars. NGFW provides advanced protection through complete visibility and reporting till layer 7, and also does not hamper the current work, says Kalyan Banga of RS Market Research Solutions. Srikant Vissamsetti, VP, Network Security, McAfee India, states that the worldwide NGFW market is expected to grow from $500 million in 2012 to $4.6 billion by 2016. “NGFW as a concept that completely meets the requirements of large enterprises. They are looking for solutions for IP fragmentation, TCP stream segmentation, RPC fragmentation, URL obfuscation, HTML evasion and FTP evasion, so this is a large opportunity for partners.” Concurs Rahul Meher, MD, Leon Computers, Pune, “The change in the threat landscape and the ever-growing use of Web 2.0 technologies are increasingly challenging traditional firewalls to evolve. Secondly, organizations in the BFSI, manufacturing, IT-ITeS and PSU segments, as well as MSPs, are seeking clarity on scanning, application intelligence, performance, manageability and reporting. These are definite opportunities for partners.” Agrees Vibhore Shrivastava, Business Head, IT Infrastructure, Meta Infotech, “We are seeing demand for NGFW from the retail, education, e-commerce and hospitality segments. Enterprises are providing their employees access to social networking, but have blocked the chat and games features. Also, industries which have high-availability as an important criterion are looking at NGFW.” Meta Infotech has deployed NGFW for HDFC Bank and AICT, and recently bagged a large contract from ICICI Bank. Enterprises are moving toward NGFW as traditional firewalls primarily focus on limiting access based on ports and protocols. With more applications using few ports and protocols like HTTP and SSL, the traditional firewalls are providing limited value. Says Vissamsetti, “NGFW addresses this by providing application visibility and adding user context. The threat landscape changed from exploiting servers to exploiting desktop-based applications when employees visit malicious sites and open infected documents that come via email. NGFW addresses this by adding IPS which does deep packet inspection.” Sunil Pillai, Co-founder & MD, iValue InfoSolutions, Bengaluru, concludes that the security need is moving from protocol-based protection to application layer/ functionality-specific needs along with protection from new threat vectors like APT. NGFW offers the perfect proposition for this. Next generation firewall hotting up Next generation firewalls provide advanced protection through complete visibility and reporting till layer 7 RAHUL MEHER Managing Director, Leon Computers “Customers want clarity on scanning, application intelligence, performance, manageability and reporting. These are opportunities for partners” The worldwide NGFW market is expected to grow to $4.6 billion by 2016. BFSI, IT-ITeS and manufacturing are high-growth areas for NGFW. NGFW offers advanced protection through complete visibility and reporting till layer 7. NGFW offers solutions for IP fragmentation, TCP stream segmentation, RPC fragmentation, URL obfuscation, and HTML and FTP evasion. HIGHLIGHTS There is currently a lot of hype in security circles surrounding the term ‘next generation firewall’ (NGFW). The hype is creating slight market confusion and leaving CISOs wondering how this technology differs from unified threat management (UTM). If you buy into the NGFW buzz, you may believe that it is an entirely new, innovative technology which has emerged. In reality an NGFW is a sub-set of the existing UTM market or even the evolution of the old firewall market. NGFW is generally described as a product which tightly integrates firewall, intrusion prevention systems (IPSs), VPN technologies and robust application control capabilities. All these features have historically been offered by many security products. In contrast, UTM appliances typically scale with a broad feature-set that can encompass most or all of the features required to protect networks from today’s blended threats. These features include an IPS, application control, network antivirus and VPN but are not limited to them; they often also include Web filtering, data leakage prevention and a host of other security capabilities. In other words, a UTM appliance can be deployed as a next-generation firewall, but a next generation firewall is limited in its abilities. Fortinet’s definition of NGFW is different. Our higher- end UTM solutions are marketed as NGFWs, so they have the full breadth of security functionalities targeted at large enterprises, telcos and financial services institutions. A COUNTER POINT
  • 6. STORYCOVER COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 21 W hile virtualization brings in significant benefits for organizations, there are security challenges to be addressed in storage virtualization, server virtualization and the like. “Identity is becoming the new perimeter, therefore it needs more clarity on information access management,” says Vic Mankotia, VP, Solution Strategy, APAC, CA Technologies. Any organization which has more than 40 instances is considering virtualization security. Also, according to Sudarsan Ranganathan, CEO, Veeras Infotek, Chennai, companies which have a roadmap to private, public or hybrid clouds are opting for virtualization security. Informs Nityanand Shetty, MD, Essen Vision, Mumbai, there has been strong uptake of virtualization security from verticals such as BFSI, telecom and government which are high adopters of the cloud. Ashok Prabhu, CEO, ValuePoint Techsol, Bengaluru, adds that since it is a niche technology the demand is coming from large enterprises. “Because it secures virtual machines and the traffic between VMs, there is significant traction in virtualization security.” Besides, virtualization security offers great scope for services. “The technology works on virtual IP, which means that the application has to bypass compute traffic to meet high-availability requirements. Protecting such applications is a great opportunity, and the services revenue can be anywhere between `6 lakh-10 lakh for three years,” informs Vibhore Shrivastava, Business Head, IT Infrastructure, Meta Infotech, Mumbai. VDI too is supporting the virtualization security . Says Vishak Raman, Senior Regional Director, India & Saarc, Fortinet, “Allowing mobile devices to access VDI gives organizations the ability to leverage their existing investment in VDI and provides a secure window into the corporate network.” Further, with virtualization taking center-stage, the virtual firewall is gaining traction. “It’s a network firewall service totally on a virtual environment and provides the general monitoring through the usual network firewall,” says Kalyan Banga, Regional Head, RSMRS. Virtualization security on path to maturity With virtualization having gained ground, can virtualization security be far behind? There’s been uptake from the BFSI, telecom and government verticals VIBHORE SHRIVASTAVA, Business Head IT Infrastructure, Meta Infotech “Protecting applications is a great opportunity, and the services revenue can be anywhere between `6 lakh-10 lakh for three years” What are the trends in security in the BFSI segment? Security trends in the financial segment includes DLP, data waste monitoring, application change management and managed security services. Compliance and regulation are driving these trends. For example, when data changes location, it changes the security barriers as well. One has to therefore put in place controls to avert risks. Each of these drivers is inter-connected and impacts the ecosystem. In an enterprise, either the information security is absent or it is deployed based on best practices or frameworks which are publicly available. What are the challenges you face as a CISO? Generating awareness among users to follow a certain security process and convincing the management that information security is not a hurdle, but a business enabler are the biggest challenges any CISO faces. The CISO has to create a rapport with his stakeholders and come across as a business person with the knowledge of technology. IT solution providers should come across as consultants. What are your suggestions for IT channel partners? Bankers are late users of technology. IT partners can leverage their position to educate them about newer solutions with visible ROI. Because service delivery is of paramount importance for any financial institution, we expect partners to be consultants who can roll out projects in a time-bound manner. Banks are now opting for 256-bit SSL certification for websites and mobile banking applications. They are implementing DLP solutions to prevent data leakage, as well as two-factor authentication, and user-based and role- based access. Security partners have great opportunities in these areas. “Security partners have great opportunity in BFSI” INTERVIEW: ONKAR NATH Generating awareness among users to follow a certain security process and convincing the management that information security is a business enabler are the biggest challenges a CISO faces In a recent panel discussion, Onkar Nath, CISO, Central Bank of India, shared his views on security trends ONKAR NATH
  • 7. COVER STORY 22 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in Make security a separate P&L account Irrespective of the strengths and weaknesses of a partner, the right approach to grow the security business is to set it up as a separate business unit. “While this may not be easy for many partners, we have seen that focused partners have met with better results. Security is a service-oriented space with a highly specialized approach required,” says Nityanand Shetty, MD, Essen Vision. Later on, partners can go for dividing their security business into various practices. “Once we delve deep into security and increase certifications and specializations we can divide it into separate practices internally,” remarks Vishal Bindra, CEO, ACPL Systems. “We have divided our security business into multiple practices such as application and data security, APT and IPv6.” Most importantly, new entrants must partner with a vendor offering complete security solutions including web security, firewall, DLP, IPS, load balancing, authentication systems and mobile device management. “Even if you start with basic firewall and web security solutions it’s always better to start with a vendor offering a complete portfolio so that you need not change vendors to graduate to high-end technologies,” explains Shetty. Focus on certification Certification works in two ways in a partner’s favor. First, it increases the confidence of customers who consider the certifications of both the partner and the implementation team members as key criteria for awarding large projects. Second, vendors give extra rebates to certified solutions partners. Says Shetty, “Specialization is the core of the security business without which one cannot survive. Moreover, our margins are often enhanced because the various certifications we have gained as a company have helped us to earn better.” The company has more than 10 professionals certified in technologies such as firewall, DLP, IPS, IDS, web security, load balancing and application acceleration. Further, knowledge of laws and government guidelines is essential. Better understanding of vertical- specific guidelines for security is always beneficial to address gaps and suggest solutions. Understand the customer’s business CIOs and enterprise vendors are scouting for partners who have a strong understanding of how technology can help a customer’s business to grow. The starting point is to identify the pain areas of the customer which probably even the customer is not aware of. Moreover, security is all about educating the customer. “It’s the partner’s responsibility to identify gaps and suggest solutions,” says Philip George, CEO, Axcenta ITES. Advises Bindra, “Explain that procuring security solutions is different from buying routers and switches. Establish the difference between brands and products, and explain the pros and cons of each. Be vendor- neutral.” Talk about evolving threats and industry trends, and discuss the benefits of emerging security solutions. It always helps to prepare case studies, show POCs, and keep referrals handy. “Our discussions with customers start with their security policy and the processes they follow to secure people, processes, technologies, data and information. We then ask the customers to identify their assets in order of importance, classify those, and decide what they want to protect, which policy they want to implement, and who should be their vendor,” informs Bindra. Build a services focus Security practice is a service-oriented business. As Shetty points out, “Security is anyway a services business where an emergency can arrive anytime and you have to provide immediate support. The idea is to separate the support into professional security services. Services include conducting security audits, suggesting solutions, ensuring compliance and providing post- sales support.” Essen Vision recently launched a separate professional security services division with a focus on services around endpoint, data, network and server security and compliance. “We are complementing our product and solutions knowledge to offer security consultation which pure-play consultants could not offer,” says Shetty. Develop strong processes CIOs look at the internal practices and processes within an organization before assigning a work order to it. The reason is that they do not want to depend on a few people. Other parameters include long tenures (of employment), case referrals and vendor authorizations. “We prefer to work with partners who are good at knowledge-sharing, provide us with longer road-maps, and present their plans for crisis management clearly,” informs Ramkumar Mohan, Head, IT & CISO, Orbiz, Gurgaon. “Security is anyway a services business where an emergency can arrive anytime and you have to provide immediate support. The idea is to separate the support into professional security services.” How to build a security practice Thinking of setting up an enterprise security business? Here are a few pointers in that direction
  • 8. Presented by 22-24 2013AUGUST THE LEELA,KOVALAM Presented by Powered by Organised by Presented by Gold Partners Platinum Partners Workshop Partner Exhibitors Thank you to all our sponsors, exhibitors, delegates and speakers in making CRN Leadership Summit a great success.
  • 9. 24 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in SPECIAL FOCUS I ndustry pundits say that various network edge products such as application delivery controllers (ADCs), load balancers and wide area network (WAN) optimization appliances which help organizations reduce network latency and improve application performance are the biggest systems integration opportunities. The market for WAN solutions is increasing, and the latest estimates from Gartner (May 2013) predict that the Indian enterprise WAN market will grow from $266.3 million in 2012 to $373.8 million by 2017. Gartner also estimates the WAN optimization market to be worth $40 million in 2013; this is expected to grow at a CAGR of 25 percent. Says Vijay Logani, Product Specialist, Cisco India & Saarc, “As the employee workforce becomes more mobile, organizations face new challenges to provide LAN-like response time over the WAN.” The data center boom has also increased awareness and demand for application acceleration. Logani adds that for any organization planning a DR center for its data center, WAN optimization is critical as it could considerably reduce bandwidth costs and latency. Desktop virtualization projects are also driving demand for app acceleration and latency reduction solutions. “To get the maximum benefit from VDI, most organizations will need to invest in edge devices that would provide them a LAN-like experience over the WAN,” says Kaushal Valluri, Director, Channels, Citrix India. Adds Shailendra Singh, Country Manager, A10 Networks, “Cloud computing and mobility have been the biggest drivers. The cloud is forcing people to use the WAN backbone more than the LAN, and with mobile users accessing the Internet it becomes imperative for CIOs to rethink WAN optimization.” Sectors such as BFSI are expected to drive growth. “Financial inclusion, where the need is to connect every remote branch to the core banking system, is not possible without ADCs,” says Shibu Paul, Country Manager, Array Networks, India & Saarc. Channel opportunities Till a few months back the market leaders in this space such as F5 Networks and Riverbed had been mostly working with large SIs. However, in the recent past, they have started wooing tier-2 channels. A key challenge for most partners remains the cost of the solution. Typical project sizes start at around $25,000, and most customers outside enterprises shy away from project implementation because of the high cost. However, vendors want channels to stay focused and look for opportunities. “Today, every customer who is running an enterprise- class application over HTTP or HTTPS is a potential user of application acceleration appliances,” opines Parag Khurana, MD, F5 Networks. “Almost all core banking vendors have made their applications Web-enabled. How else do you ensure that a remote user working with a low-speed Internet connection gets a uniform service?” OPTIMIZEDACCELERATION Yesterday’s buzzwords—WAN optimization and application acceleration—are becoming tomorrow’s opportunities. Gartner puts a figure to the size of the Indian enterprise WAN market in 2017: $373 million RAMDAS S WAN optimization is essentially a collection of techniques, including de-duplication, caching, traffic shaping, protocol spoofing and latency optimization, used alone or in combination, for increasing data transfer efficiencies across WANs. In most cases they work in Layer 2 and Layer 3, but modern WAN optimization appliances even work over Layer 7 or application layer. In most cases effective delivery of WAN optimization requires symmetrical appliances at the edge of all networks connected. Application Delivery Controllers (ADCs) deliver accelerated application experience to users using many of the techniques used by WAN optimizers, but they also use different types of load balancers including link load balancing and server load balancing, and acceleration techniques over SSL and TCP protocols. Both the technologies, while addressing similar problems, are used in different cases. WAN optimization is useful when the users are within a corporate network spread across different geographies, while ADCs deliver content to a wider audience, for example, users of a Web application. THE TECHNOLOGIES EXPLAINED