SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Continued on page 3
Cybersecurity firms Symantec and Fortinet have an-
nounced an expansive partnership agreement to pro-
vide customers with the industry’s most comprehensive
and robust security solutions. Fortinet’s Next-Genera-
tion Firewall (NGFW) capabilities are planned to be in-
tegrated into Symantec’s cloud-delivered Web Security
Service (WSS). Additionally, endpoint protection solu-
tions are also planned to be integrated into the Fortinet
Security Fabric platform. The technology partnership
provides essential security controls across endpoint,
network, and cloud environments that are critical to en-
forcing the Zero Trust security framework.
“As the first step in this technology partnership, we
plan to deliver best-of-breed security through the com-
bination of enterprise-class advanced firewall controls
to Symantec’s industry-leading network security ser-
vice,” said Art Gilliland, EVP and GM Enterprise Prod-
ucts, Symantec. “Through this partnership, we hope to
provide joint customers the power of Symantec’s Inte-
grated Cyber Defense Platform bolstered by Fortinet’s
leading NGFW in an integrated solu-
tion that’s easy to use and deploy.”
Issue 29 // January 2019
Partnership delivers essential security controls across endpoint, network, and cloud environments
SYMANTEC, FORTINET PARTNER TO
DELIVER COMPREHENSIVE CLOUD
SECURITY SERVICE
Continued on page 3
more cost-effective to deploy large-
scale machine learning and big data
analytics environments. By seam-
lessly combining BlueData’s soft-
ware platform with HPE’s existing
software-defined infrastructure,
HPE can help customers acceler-
ate their digital transformation by
providing an all-encompassing and
easy-to-implement solution for AI/
ML and big data analytics. With
this container-based solution, cus-
tomers can improve agility for their
data science teams and potentially
reduce their infrastructure costs
significantly.
HPE to acquire BlueData
Expanding HPE’s offerings in AI and Big Data Analytics, the acquisition is expected to close within the company’s first fiscal quarter.
John Maddison, Fortinet
Milan Shetti, HPE
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:
Hewlett Packard Enterprise (HPE)
has announced a definitive agree-
ment to purchase BlueData, a pro-
vider of software that transforms
how enterprises deploy artificial
intelligence and big data analytics,
expanding HPE’s offerings in these
rapidly growing markets. The ac-
quisition is expected to close within
HPE’s first fiscal quarter, ending
January 31, 2019.
Founded in 2012, BlueData is a
privately-held company headquar-
tered in Santa Clara. BlueData’s
software platform uses container
technology to make it simpler and
“BlueData has developed an in-
novative and effective solution to
address the pain points all compa-
nies face when contemplating, im-
plementing, and deploying AI/ML
andbigdataanalytics.AddingBlue-
Data’s complementary software
platform to HPE’s market-leading
Apollo Systems and professional
services is consistent with HPE’s
data-first strategy and enables our
customers to extract insights from
data – whether on-premises, in the
cloud, or in a hybrid architecture,”
said Milan Shetti, SVP and GM,
Storage and Big
For more information, please write to sales.value@redingtonmea.com
3
From page 1 From page 1
HPE to acquire... Symantec, Fortinet...
Additionally, Symantec’s endpoint protection solution is
planned to be integrated into the Fortinet Security Fabric
platform, providing customers with real-time, actionable
threat intelligence and automated response for exploit-driv-
en attacks and advanced malware. Interoperability between
Fortinet’s SD-WAN technology will also be certified to work
with Symantec’s Web Security Service through Symantec’s
Technology Integration Partner Program (TIPP). As part of
the collaboration, both companies plan to engage in joint go-
to-market activities.
John Maddison, SVP of products and solutions, Fortinet
said, “Upon completion of the integration, Symantec cloud
web gateway customers will be able to benefit from Fortinet’s
enterprise-class advanced firewall controls, and for the first
time ever, Fortinet customers will be able to purchase the For-
tiGate Next-Generation Firewall via FWaaS. With the addition
of Symantec as a Fortinet Fabric-Ready Partner, Symantec’s
endpoint security solution will be validated to seamlessly in-
tegrate with the Fortinet Security Fabric platform to provide
more consistent and effective protection for joint customers.”
Fully integrated Cloud Firewall Service within WSS is ex-
pected to be available in the 1st half of calendar 2019.
Data Global Business Unit at HPE.
“Growth in the volume and the
types of data in the market contin-
ues to accelerate, as does the de-
mand for a fast, easy, and unified
consumption experience for AI
and big data analytics,” said Kumar
Sreekanti, Co-founder and CEO
of BlueData. “From our perspec-
tive, data is fuel, and BlueData’s
software is the engine that helps
businesses consume their data and
deliver insights in the most effec-
tive and efficient way. We’ve had
tremendous customer success by
providing a turn-key solution that
delivers an as-a-service experience
for AI and big data, and are excited
to reach even more customers as
part of HPE.”
The financial terms of the trans-
action were not disclosed.
Fujitsu to provide end-to-end enterprise
transformation offering with AWS
Fujitsu has announced a new end-to-end
enterprise transformation offering which
will fast track the move to the AWS cloud
for organizations, helping them to improve
business processes and speed up innova-
tion. As the result of a new strategic collab-
oration between Fujitsu and AWS, the new
Fujitsu Cloud Service for AWS is available
immediately in Europe, the Middle East,
India and Africa (EMEIA) and enables
customers to move their IT estates to the
market-leading AWS Cloud.
The new Cloud Service for AWS com-
bines Fujitsu’s extensive expertise as a
system integrator with the power and scope
of the market-leading cloud platform from
AWS. It will deliver a set of services that
accelerate the customer journey to the AWS
Cloud including business consultancy, stra-
tegic assessment, and roadmap for change
to advise the most appropriate and efficient
way for an enterprise to move to AWS. It
will also include additional consultancy
services such as infrastructure design, build
and test to help with the deployment of new
applications on the AWS Cloud, as well as
application modernization services, sup-
porting the re-hosting, re-platforming, and
re-architecting of existing applications.
Duncan Tait, Senior Executive Vice
President and Head of Fujitsu EMEIA, said,
“For successful digital transformation, the
two business imperatives are to get there
fast, with minimal disruption. By introduc-
ing the new Fujitsu Cloud Service for AWS,
we are further expanding our capabilities
in working together with hyper scale cloud
vendors to seamlessly integrate cloud into
enterprise IT environments. With this ap-
proach, we empower customers with large
and complex IT estates to modernize their
applications and leverage the scale, securi-
ty, agility and efficiency of AWS.”
Fujitsu joined the AWS Partner Network
(APN) in 2014 and since then has quickly
grown to achieve Advanced Consulting
status with hundreds of AWS Certified
and Accredited employees. To address the
rapidly growing customer demand for AWS
cloud services, Fujitsu has also announced
plans to train 4,000 employees in AWS
over the next three years.
This new offering will enable customers to improve
business processes and accelerate innovation.
We now live in a consumption-driven
world and IT is no different. Business
functions expect IT to play a pivotal
role in helping them adapt to constant-
ly changing demands. In order to re-
main competitive and deliver business
outcomes faster, organizations must
adapt to flexible, economical and inno-
vative ways to consume IT. Organiza-
tions are more and more looking to in-
vest in technologies which offers them
consumptions choices, seamless ability
to decide on capacity and address spe-
cific functional requirements. The HPE
GreenLake consumption-based solu-
tion addresses the business needs with
hardware, software and services in an
on-prem or cloud environment. The
new model offers multiple consump-
tion-based solutions with uncomplicat-
ed financing model for costumers.
From our partners’ perspective, the
launch of HPE GreenLake channel
model also gives a massive opportu-
nity for resellers to play a key role in
the consumption solutions. With an
extremely lucrative compensation in-
centive, channel partners have a great
opportunity to position themselves in
the consumption-based requirements.
Partners also have an opportunity to
offer their own services in the current
model. IT-as-a-service is defining the
industry and it’s a completely different
way of consuming technology, HPE
GreenLake offering now allows every-
one in the value chain to be a part of it.
Embracing
consumption-
based IT
By Kunal Singh, Server, Storage and Networking
Head, MEA, Redington Value
COLUMN: REDefined
For more information, please write to sales.value@redingtonmea.com
4
SonicWall has announced its re-
cord year-on-year growth in the
EMEA region.
Among the company’s key
EMEA milestones include the
opening of three new offices in
Basingstoke, UK, Barcelona,
Spain, and Dubai, UAE, as well as
strategic new hires to drive addi-
tional regional growth.
Following unprecedented EMEA
growth, SonicWall now has a direct
presence in 16 countries across the
EMEA region including Austria,
Belgium, Denmark, France, Ger-
many, Ireland, Italy, Netherlands,
Poland, Romania, South Africa,
Spain, Sweden, Switzerland, and
the UK. The three new office loca-
tions in Basingstoke, UK, Barcelo-
na, Spain and Dubai, UAE provide
the vendor with improved access
to local channel partners, ensur-
SonicWall boosts EMEA presence
The company’s key milestones include the opening of new offices.
and commitment to strengthen
SonicWall’s value proposition
among our valued customers and
partners within this exciting and
rewarding market.
“By ensuring our channel exper-
ing customers’ across EMEA gain
access to SonicWall’s burgeoning
channel presence. The move also
demonstrates SonicWall’s focus
on the EMEA region, as well as
the enterprise market, alongside
its continuing commitment to the
SMB market.
The success of SonicWall’s
EMEA business is in part attrib-
utable to new enterprise services
announced during Q4 2018, which
include zero-touch and Cloud de-
ployment of SonicWall next gen-
eration firewalls, as well as secure
SD-WAN which is now delivered
alongside SonicWall’s firewall pro-
tection.
Michael Berg, Executive Direc-
tor Sales EMEA, SonicWall, said,
“Our boosted presence across
EMEA is part of a long-term plan,
and proof of our determination
tise is always within easy reach and
that we are committed to speaking
local languages, we are better placed
tounderstandandrespondinavalu-
able way to our customers’ individu-
al cybersecurity challenges.
In addition to new EMEA offices,
SonicWall has invested in top tal-
ents to bolster and lead its teams.
Among which is the appointment
of Mario Pucciarelli who is now
the Strategic Partner Manager in
SonicWall for the Middle East, en-
abling telecom operators, MSSP
and main system integrator to de-
liver SonicWall cybersecurity solu-
tions to their end customers.
SonicWall is forecasting dou-
ble-digit growth as it continues to
grow its partner base, which has
increased by over 45 percent since
the company divested from Dell
two years ago.
Michael Berg, SonicWall
Pivot3 delivers policy-based security for
hybrid cloud solutions
Pivot3’s expanded Intelligence Engine capabilities enable customers to streamline security and regulatory compliance across
the edge, core and cloud.
The hyperconverged infrastructure
(HCI) performance and technology
player Pivot3, has announced new
policy-based security management
capabilities in its core Intelligence
Engine. These expanded capabil-
ities allow organizations to au-
tomate and simplify the process
of protecting sensitive data with
comprehensive, standards-based
security for encryption and key
management. Pivot3’s new plat-
form enhancements also facilitate
regulatory compliance as custom-
ers acquire and manage data across
the edge, core and cloud.
John Spiers, Vice President of
Strategy, Pivot3, said, “Customers
rely on us every day to simplify man-
agement at scale. This extension of
Pivot3’s Intelligence Engine brings
new confidence to IT in knowing
that data can be secured and pro-
tected as it moves across the entire
hybrid cloud infrastructure.”
Pivot3’s Intelligence Engine en-
hances application performance,
data placement, data protection,
and monitoring and analytics, en-
abling customers to confidently
consolidate multiple, mixed-ap-
plication workloads on HCI while
reducing time, cost and complexity.
To address the increased regula-
tion and compliance requirements,
the new capability includes flexible,
secure multi-tenancy and data-at-
rest encryption at a system, volume
or virtual machine level, compliant
with Federal Information Process-
ing Standards (FIPS) 140-2. Pivot3
designed its data encryption algo-
rithms to leverage Intel Xeon CPUs
AES New Instructions (AES NI) to
ensure minimal performance im-
pact and low overhead.
For more information, please write to sales.value@redingtonmea.com
5
“Cyber criminals have increas-
ingly smart tools to scan for and to
quickly exploit vulnerable devices,
and they have new tools for spread-
ing their malware and bypassing
firewalls. If a vulnerable device is
deployed on the internet, it will be
exploited in a matter of minutes,”
McNamee said.
The Nokia NetGuard security
suite provides protection against a
wide variety of bots and malware.
The suite aggregates, analyses and
correlates security data from a va-
riety of sources, including endpoint
detection software, to help security
teams control risks and costs and to
improve decision making.
The NetGuard Endpoint Security
software includes an IoT behavior-
al anomaly detection component
that is capable of constantly track-
ing devices against security threats.
The individual traffic profiles of any
device, including an IoT device, are
machine-learned automatically by
the Endpoint system; any anom-
alies detected triggers immediate
trouble-shooting against threats.
Avaya has introduced a new Device
as a Service (DaaS) offering that
will enable businesses to purchase
Avaya’s latest smart desktop devic-
es on a monthly subscription basis.
Similar to how smart devices are
purchased in the consumer space,
Avaya now provides three ways
for businesses to enjoy the Avaya
Desktop Experience: up front, fi-
nanced, and by subscription.
Avaya’s Device as a Service of-
fering delivers the company’s latest
smart devices including the Avaya
Vantage portfolio, the complete
Essential Experience J100 series
portfolio of IP Phones, and the
Avaya B109, B179, and B189 con-
ferencing devices. With the plat-
form agnostic capabilities of the
Avaya Desktop Experience, these
devices can be deployed on Avaya
or Non-Avaya UC platforms.
Customers can contract with
terms of 1, 3, or 5 years, with lon-
ger terms offering lower monthly
prices. Customers can upgrade at
any time to more advanced devices
without any penalty.
“Our customers and partners
have been asking for this and we are
very excited to announce this new
offer,” said Greg Pelton, Vice Pres-
ident, Collaboration and Devices,
Avaya. “It brings a new level of sim-
plicity to UC as a Service (UCaaS)
where customers can now enjoy the
best cloud service and latest cloud
devices, all on one monthly bill.”
55
Avaya
introduces new
Device as a
Service offering
The company now
provides three ways for
businesses to enjoy the
Avaya Desktop Experience
- up front, financed, and by
subscription.
IoTbotsnowmakeup16%ofinfecteddevicesinCSPnetworks,upsignificantlyfrom3.5%ayearago.
The use of malicious software to
attack IoT devices like smart home
security monitoring systems is
rising substantially and growing
more sophisticated as cyber crimi-
nals take advantage of lax security,
Nokia’s Threat Intelligence Report
2019 warned.
Driven by financial and other
nefarious purposes, IoT botnet ac-
tivity accounted for 78% of malware
detection events in communication
service provider (CSP) networks
in 2018, according to the report,
which is based on data aggregated
from monitoring network traffic
this year on more than 150 million
devices globally where Nokia’s Net-
Guard Endpoint Security product is
deployed.
That is up sharply from 33% in
2016, when IoT botnets were first
seen in meaningful numbers.
“Cyber criminals are switching
gears from the traditional comput-
er and smartphone ecosystems and
now targeting the growing number
of vulnerable IoT devices that are
being deployed. You have thou-
sands of IoT device manufacturers
wanting to move product fast to
market and, unfortunately, security
is often an afterthought,” said Kev-
in McNamee, Director of Nokia’s
Threat Intelligence Lab and lead
author of the report. In 2018, IoT
bots made up 16% of infected devic-
es in CSP networks, up significantly
from the 3.5% observed in 2017.
As an indicator of the rising
threat, the report found that mal-
ware-infected crypto-coin mining
is expanding from high-end servers
with specialized processors to IoT
devices as well as smartphones and
web browsers. Crypto-coin mining
is generally the process by which
crypto currency transactions are
verified and added to blockchain
technology systems.
Ivanti has announced Ivanti
Package Studio, a new software
packaging solution for Ivanti Uni-
fied Endpoint Manager. Offering
pre-packaged content for simpli-
fied endpoint software distribu-
tion, the new solution can reduce
software packaging steps from
hours to just minutes.
“Creating packages for software
distribution can be riddled with
multiple steps, checks and tests,”
said Duane Newman, Vice Pres-
ident, Product Management and
Marketing, Ivanti. “Ivanti Package
Studio dramatically simplifies the
process with ready-to-use setups
for Windows applications giving IT
administrators back valuable time
for more strategic projects.”
Ivanti simplifies endpoint software
distribution with Ivanti Package Studio
Reduces software packaging setup steps from hours to minutes.
Ivanti Unified Endpoint Manag-
er. Using Configuration Wizards,
administrators can create trans-
form files to customize the setups
to align deployment with company
guidelines and policies.
Ivanti Package Studio integrates
with Ivanti Unified Endpoint Man-
ager, an all-in-one solution for
reliable endpoint and user-profile
management. Ivanti Unified End-
point Manager discovers every-
thing that touches the network,
automates software delivery and
speeds login performance. It also
automates and integrates actions
with multiple IT solutions to unify
the IT management process.
Ivanti Package Studio is available
now in the Ivanti Marketplace
Nokia warns on the evolving threat of
malicious software targeting IoT devices
Duane Newman, Ivanti
Greg Pelton, Avaya
Ivanti Package Studio provides a
‘Setup Store’ which contains ready-
to-use setups for most typical Win-
dows desktop applications. These
can be downloaded and configured
automatically and deployed using
For more information, please write to sales.value@redingtonmea.com
6
Cryptocurrency mining affected millions of
users in 2018: Kaspersky Lab
The major driver behind the crypto gold rush was the installation and use of unlicensed
software and content.
unlicensed software, the more in-
cidents of malicious crypto miner
activity were detected. In short, an
activity not generally perceived as
dangerous: the downloading and
installation of dubious software,
underpins what is arguably the
biggest cyberthreat story of the
year – malicious crypto mining,”
said Evgeny Lopatin, security ex-
pert at Kaspersky Lab.
Other key findings from the re-
port include:
•	 The total number of users who
encountered miners rose by
more than 83% from 2,726,491
in 2017 to 5,001,414 in 2018;
•	 The share of miners detect-
ed, from the overall number
of threats detected also grew,
from 5% in 2017 to 8% in 2018;
•	 The share of miners detected,
from the overall risk tool detec-
tions is also on the rise – from
9% in 2017 to 17% in 2018;
•	 The total number of users who
encountered mobile miners
also grew, increasing by over
five times from 1,986 in 2017
to 10,242 in 2018.
crypto-mining fever to discover
what drove the global distribution
of this threat. They analysed the
regulatory landscape, electricity
prices in the top 10 countries tar-
geted by crypto miners and main
infection vectors for the popular
malware families.
The analysis shows that neither
cryptocurrency legislation nor the
cost of power has a significant im-
pact on the spread of malicious min-
ing malware. However, the investi-
gation of malware families reveals
that they mainly infected devices by
duping users into installing pirated
software and unlicensed content.
“Our analysis of the economic
background of malicious cryp-
to mining and the reasons for its
widespread presence in certain
regions revealed a clear correla-
tion: the easier it is to distribute
VeritasPredictiveInsightsusesAIandMLto
predictandpreventunplannedservice
Artificial Intelligence and Machine Learning create proactive maintenance experience for IT staff.
In 2018, malicious cryptocur-
rency mining prevailed over the
main threat of the last few years:
ransomware. The number of in-
ternet users attacked by malicious
cryptocurrency mining software
increased steadily during the first
half of the year, peaking in March,
with around 1.2 million users a
month coming under attack.
Kaspersky Lab experts have
investigated the economic back-
ground of the sudden onset of
The global outbreak in malicious
cryptocurrency mining that un-
folded in 2018 saw the number
of attacks increase by more than
83%, with over five million users
attacked online in the first three
quarters of the year, compared to
2.7 million over the same period in
2017. The major driver behind the
crypto gold rush was the installa-
tion and use of unlicensed software
and content, according to Kasper-
sky Lab.
Veritas Technologies has an-
nounced the launch of Veritas Pre-
dictive Insights, a new solution that
utilizes artificial intelligence (AI)
and machine learning (ML) algo-
rithms to deliver always-on proac-
tive support.
Utilizing years of encrypted
event data from thousands of Ver-
itas appliances, Veritas Predictive
Insights’ cloud-based AI/ML En-
gine monitors system health, de-
tects potential issues and creates
proactive remediation before prob-
lems can occur. Predictive Insights
also enhances Veritas product
availability and customer satisfac-
tion by helping businesses reduce
unplanned downtime, ensure fast-
er time to fault resolution and low-
er overall total costs of ownership.
This latest offering from Veri-
tas addresses the growing concern
from customers to simplify their
data and infrastructure manage-
ment while reducing the risks and
costs associated with downtime
and access to critical business data.
Veritas Predictive Insights pro-
cesses millions of events, providing
IT administrators with the ability
to avoid alert fatigue and focus on
significant incidents.
“Having consistently available IT
systems is increasingly important
to organizations that are respon-
sible for managing, analyzing and
protecting more and more data
points every day,” said David Noy,
Vice President and General Man-
ager, Product Management and
Alliances, Veritas. “This new tech-
nology harnesses the power of AI
and continuous ML models to pro-
vide predictive analytics to IT staff.
Administrators can then proactive-
ly support and remediate a wide
range of potential issues before
they occur, react much quicker and
allow for less costly resolution.”
Veritas Predictive Insights pro-
vides prescriptive support ser-
vices, such as proactive mainte-
nance, performance and capacity
forecasting, as well as compliance
determination. The services are
driven from the power of AI and
continuous ML models that uti-
lize years of collected data points
from tens of thousands of Veritas
customer installations. Combined
with real-world input from service
personnel, the Veritas AI/ML En-
gine delivers predictive insights
about a customer’s environment,
resulting in proactive recommen-
dations and actions to improve
their business operations.
Veritas Predictive Insights “Al-
ways On” feature allows for intelli-
gent, data driven decision-making
capabilities and optimized services
ensuring that customers have
an enriched support experience,
which is fast, proactive and pre-
scriptive.
Veritas Predictive Insights is
available now on Veritas NetBack-
up Appliances and will be available
on Veritas Access and Flex appli-
ances in the coming quarters.
For more information, please write to sales.value@redingtonmea.com
7
EVENTS
Fortinet End Customer Session with STS - Jordan,
5 December
Fortinet NSE 5 Technical Workshop - Dubai,
27 and 28 November
Fortinet SMB Roadshow - Jordan, 28 November
Fortinet Security Day with Bahwan IT - Oman,
16 and 17 December
Fujitsu and NetApp NFLEX Blitz Day with Veeras -
Dubai, 30 November
Kaspersky Launch Event - Dubai, 20 November
Fortinet SMB Roadshow - Kuwait, 17 December
Fujitsu and NetApp NFLEX Partner Event - Dubai,
27 November
Kaspersky Launch Event - Qatar, 4 December
Fortinet SMB Roadshow - Oman, 18 December
Fujitsu and NetApp NFlex Partner Session - Qatar,
16 December
Pivot3 Sales Enablement Session - Dubai, 5 December
Barracuda Partner Enablement Session - Dubai, 10 December
Fortinet ‘Power To Secure’ Event - Dubai, 6 December
CyberArk Technical Training Session - Dubai,
19 and 20 December
SonicWall Partner Event - Bahrain,
10 December
Fortinet SMB Roadshow - Lebanon, 26 November
For more information, please write to sales.value@redingtonmea.com
8
EVENTS
Cisco Partner Enablement Session - Tanzania,
29 November
Cisco SMB Partner Session - Tanzania, 4 December
Cisco End Customer Event with Multiskills Nigeria Limit-
ed - Nigeria, 29 November
Microsoft CSP Partner Roundtable - Kenya,
22 November
Dell EMC End Customer Event With Jo World
Agencies Limited - Kenya, 30 November
Palo Alto Networks and Redington partnership Launch
- Kenya, 11 December
SplunkPartner RookiesWorkshop-Nigeria,5December
Fortinet Partner Enablement Session - Kenya,
29 November
SAS Banking Event with Agile Data Global - Tanzania,
28 November
Trend Micro Partner Enablement Session - Kenya,
27 November
Malwarebytes and MobileIron Sales Session - Kenya,
13 December
Splunk CIO Event - Nigeria, 28 November
Cisco Service Partner Workshop - Nigeria, 19 December
SonicWall Network Security day - Qatar, 29 November
Veeam Partner Event with AWS - Dubai, 11 December
SonicWall Partner Sales Workshop - Oman, 8 November
Microsoft New Partner Roundtable - Dubai,
10 December
SonicWall Network Security Day - Oman, 7 November
For more information, please write to sales.value@redingtonmea.com
9
EVENTS
Splunk For Rookies Workshop - Riyadh, 5 November Symantec Enablement Session - Jeddah, 21 November
SonicWall Partner Enablement session - Bahrain, 10 December
Splunk For Investigation - Jeddah, 5 December
Kaspersky Launch Event - Riyadh, 28 November
Huawei Day Forum - Riyadh, 4 December
MobileIron Event - Riyadh,14 November
Kaspersky Launch Event - Riyadh, 28 November
Kaspersky Launch Event - Riyadh, 28 November
Splunk End User Event - Riyadh,12 December
MobileIron Event - Riyadh,14 November
Kaspersky Launch Event - Riyadh, 28 November
SonicWall Network Security Day - Kuwait, 5 December
Symantec End User Event - Riyadh,
27 November
Microsoft Technical Bootcamp - Egypt,
19 and 20 December
Dell EMC Technologies Forum - Riyadh, 10 December
Splunk For Investigation - Riyadh, 19 November
For more information, please write to sales.value@redingtonmea.com
10
EVENTS
Dell EMC Technologies Forum - Riyadh, 10 December Microsoft CSP Partner Roundtable - Kenya, 14 December
Huawei Day Forum - Riyadh, 4 December AWS Certification training - Dubai, 21 and 22 November
Fortinet NSE4 - Riyadh, 25 and 26 November
Fortinet SMB - Riyadh,19 December
Fujitsu NetApp Partner Event - Riyadh, 18 December
Fortinet for SMB - Khobar,12 December
Fortinet ‘Power To Secure’ Event - Riyadh, 5 December
Huawei Day Forum - Riyadh, 4 December
Fortinet Power To Secure - Khobar, 10 December
Fortinet ‘Power To Secure’ - Riyadh, 5 December
Huawei Day Forum - Riyadh, 4 December
Aruba Clear Pass Session - Jeddah, 28 November
Dell EMC Technologies Forum - Riyadh,
10 December
Aruba Clear Pass - Khobar, 5 December Microsoft CSP Partner Roundtable - Ghana, 20 December
Microsoft - Redington Partnership
Launch - Egypt, 18 December
For more information, please write to sales.value@redingtonmea.com
Redington Value Journal - January 2019
Redington Value Journal - January 2019

Weitere ähnliche Inhalte

Was ist angesagt?

Cloud-native Data Platform Transformation | Accenture
Cloud-native Data Platform Transformation | AccentureCloud-native Data Platform Transformation | Accenture
Cloud-native Data Platform Transformation | Accentureaccenture
 
FourNet Microsoft Teams Direct Routing and Contact Centre Integration
FourNet Microsoft Teams Direct Routing and Contact Centre IntegrationFourNet Microsoft Teams Direct Routing and Contact Centre Integration
FourNet Microsoft Teams Direct Routing and Contact Centre IntegrationJoshua Bundy ACIM
 
Ims04 ims modernization and integration - IMS UG May 2014 Sydney & Melbourne
Ims04  ims modernization and integration - IMS UG May 2014 Sydney & MelbourneIms04  ims modernization and integration - IMS UG May 2014 Sydney & Melbourne
Ims04 ims modernization and integration - IMS UG May 2014 Sydney & MelbourneRobert Hain
 
Benefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – NetmagicBenefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – NetmagicNetmagic Solutions Pvt. Ltd.
 
Industry Brief: HP Rallies the Channel around Converged Infrastructure
Industry Brief: HP Rallies the Channel around Converged InfrastructureIndustry Brief: HP Rallies the Channel around Converged Infrastructure
Industry Brief: HP Rallies the Channel around Converged InfrastructureIT Brand Pulse
 
Integrating Postgres with ActiveMQ and Camel
Integrating Postgres with ActiveMQ and CamelIntegrating Postgres with ActiveMQ and Camel
Integrating Postgres with ActiveMQ and CamelJustin Reock
 
Html5 workshop part 1
Html5 workshop part 1Html5 workshop part 1
Html5 workshop part 1NAILBITER
 
New world software sitefinity presentation
New world software sitefinity presentationNew world software sitefinity presentation
New world software sitefinity presentationchandrasekhar buddha
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Dr. Aloknath De
 
2015 Modern Infrastructure Award Winners: Tools and services making a differe...
2015 Modern Infrastructure Award Winners: Tools and services making a differe...2015 Modern Infrastructure Award Winners: Tools and services making a differe...
2015 Modern Infrastructure Award Winners: Tools and services making a differe...Leigh Ryan
 
G12.2012 magic quadrant public iaa s
G12.2012 magic quadrant public iaa sG12.2012 magic quadrant public iaa s
G12.2012 magic quadrant public iaa sSatya Harish
 
17024 sapbp4 auto combined-mm (slideshare)
17024 sapbp4 auto combined-mm (slideshare)17024 sapbp4 auto combined-mm (slideshare)
17024 sapbp4 auto combined-mm (slideshare)Tom Leeson, MSc
 
Desktop-as-a-Service: Flexible Application Delivery to Cloud-Native Desktops
Desktop-as-a-Service: Flexible Application Delivery to Cloud-Native DesktopsDesktop-as-a-Service: Flexible Application Delivery to Cloud-Native Desktops
Desktop-as-a-Service: Flexible Application Delivery to Cloud-Native DesktopsAmazon Web Services
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Davis Blair
 

Was ist angesagt? (20)

Cloud-native Data Platform Transformation | Accenture
Cloud-native Data Platform Transformation | AccentureCloud-native Data Platform Transformation | Accenture
Cloud-native Data Platform Transformation | Accenture
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
FourNet Microsoft Teams Direct Routing and Contact Centre Integration
FourNet Microsoft Teams Direct Routing and Contact Centre IntegrationFourNet Microsoft Teams Direct Routing and Contact Centre Integration
FourNet Microsoft Teams Direct Routing and Contact Centre Integration
 
Ims04 ims modernization and integration - IMS UG May 2014 Sydney & Melbourne
Ims04  ims modernization and integration - IMS UG May 2014 Sydney & MelbourneIms04  ims modernization and integration - IMS UG May 2014 Sydney & Melbourne
Ims04 ims modernization and integration - IMS UG May 2014 Sydney & Melbourne
 
Benefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – NetmagicBenefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – Netmagic
 
Industry Brief: HP Rallies the Channel around Converged Infrastructure
Industry Brief: HP Rallies the Channel around Converged InfrastructureIndustry Brief: HP Rallies the Channel around Converged Infrastructure
Industry Brief: HP Rallies the Channel around Converged Infrastructure
 
Integrating Postgres with ActiveMQ and Camel
Integrating Postgres with ActiveMQ and CamelIntegrating Postgres with ActiveMQ and Camel
Integrating Postgres with ActiveMQ and Camel
 
Html5 workshop part 1
Html5 workshop part 1Html5 workshop part 1
Html5 workshop part 1
 
Redington Value Journal - July 2018
Redington Value Journal - July 2018Redington Value Journal - July 2018
Redington Value Journal - July 2018
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
New world software sitefinity presentation
New world software sitefinity presentationNew world software sitefinity presentation
New world software sitefinity presentation
 
Microsoft Dynamics Customer Stories
Microsoft Dynamics Customer StoriesMicrosoft Dynamics Customer Stories
Microsoft Dynamics Customer Stories
 
Cloud Brokering Brochure
Cloud Brokering BrochureCloud Brokering Brochure
Cloud Brokering Brochure
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016
 
2015 Modern Infrastructure Award Winners: Tools and services making a differe...
2015 Modern Infrastructure Award Winners: Tools and services making a differe...2015 Modern Infrastructure Award Winners: Tools and services making a differe...
2015 Modern Infrastructure Award Winners: Tools and services making a differe...
 
G12.2012 magic quadrant public iaa s
G12.2012 magic quadrant public iaa sG12.2012 magic quadrant public iaa s
G12.2012 magic quadrant public iaa s
 
17024 sapbp4 auto combined-mm (slideshare)
17024 sapbp4 auto combined-mm (slideshare)17024 sapbp4 auto combined-mm (slideshare)
17024 sapbp4 auto combined-mm (slideshare)
 
Desktop-as-a-Service: Flexible Application Delivery to Cloud-Native Desktops
Desktop-as-a-Service: Flexible Application Delivery to Cloud-Native DesktopsDesktop-as-a-Service: Flexible Application Delivery to Cloud-Native Desktops
Desktop-as-a-Service: Flexible Application Delivery to Cloud-Native Desktops
 
Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213Laurel Group Thought Leaders Print 0213
Laurel Group Thought Leaders Print 0213
 

Ähnlich wie Redington Value Journal - January 2019

Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the CloudCognizant
 
ViON_Benefits of Cloud_WhitePaper_D6_V3
ViON_Benefits of Cloud_WhitePaper_D6_V3ViON_Benefits of Cloud_WhitePaper_D6_V3
ViON_Benefits of Cloud_WhitePaper_D6_V3Jessica Copeman
 
Fujitsu Hybrid IT and Multicloud Service Startegy
Fujitsu Hybrid IT and Multicloud Service StartegyFujitsu Hybrid IT and Multicloud Service Startegy
Fujitsu Hybrid IT and Multicloud Service StartegyAlessandro Guli
 
Fujitsu Hybrid IT & Multi Cloud Services
Fujitsu Hybrid IT & Multi Cloud ServicesFujitsu Hybrid IT & Multi Cloud Services
Fujitsu Hybrid IT & Multi Cloud ServicesAlessandro Guli
 
Sukeru Technologies Private Beta
Sukeru Technologies Private BetaSukeru Technologies Private Beta
Sukeru Technologies Private BetaPanggi Jasri Akadol
 
Cloud Computing Applications and Benefits for Small Businesses .docx
Cloud Computing Applications and Benefits for Small Businesses   .docxCloud Computing Applications and Benefits for Small Businesses   .docx
Cloud Computing Applications and Benefits for Small Businesses .docxclarebernice
 
Nec smart enterprise_trends_2014-slides
Nec smart enterprise_trends_2014-slidesNec smart enterprise_trends_2014-slides
Nec smart enterprise_trends_2014-slidesTodd Landry
 
T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021EGBG Services
 
Intermedia Award Write Up
Intermedia Award Write UpIntermedia Award Write Up
Intermedia Award Write UpClaudia Toscano
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
What are the advantages of adopting public cloud
What are the advantages of adopting public cloudWhat are the advantages of adopting public cloud
What are the advantages of adopting public cloudNicole Khoo
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the CloudCognizant
 

Ähnlich wie Redington Value Journal - January 2019 (20)

Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Redington Value Journal - April 2017
Redington Value Journal - April 2017Redington Value Journal - April 2017
Redington Value Journal - April 2017
 
Redington Value Journal - June 2019
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the Cloud
 
ViON_Benefits of Cloud_WhitePaper_D6_V3
ViON_Benefits of Cloud_WhitePaper_D6_V3ViON_Benefits of Cloud_WhitePaper_D6_V3
ViON_Benefits of Cloud_WhitePaper_D6_V3
 
Fujitsu Hybrid IT and Multicloud Service Startegy
Fujitsu Hybrid IT and Multicloud Service StartegyFujitsu Hybrid IT and Multicloud Service Startegy
Fujitsu Hybrid IT and Multicloud Service Startegy
 
Fujitsu Hybrid IT & Multi Cloud Services
Fujitsu Hybrid IT & Multi Cloud ServicesFujitsu Hybrid IT & Multi Cloud Services
Fujitsu Hybrid IT & Multi Cloud Services
 
Sukeru Technologies
Sukeru TechnologiesSukeru Technologies
Sukeru Technologies
 
Sukeru Technologies Private Beta
Sukeru Technologies Private BetaSukeru Technologies Private Beta
Sukeru Technologies Private Beta
 
Cloud Computing Applications and Benefits for Small Businesses .docx
Cloud Computing Applications and Benefits for Small Businesses   .docxCloud Computing Applications and Benefits for Small Businesses   .docx
Cloud Computing Applications and Benefits for Small Businesses .docx
 
Nec smart enterprise_trends_2014-slides
Nec smart enterprise_trends_2014-slidesNec smart enterprise_trends_2014-slides
Nec smart enterprise_trends_2014-slides
 
T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021
 
Intermedia Award Write Up
Intermedia Award Write UpIntermedia Award Write Up
Intermedia Award Write Up
 
Dynamic network services whitepaper external final
Dynamic network services whitepaper external finalDynamic network services whitepaper external final
Dynamic network services whitepaper external final
 
Redington Value Journal - December 2016
Redington Value Journal - December 2016Redington Value Journal - December 2016
Redington Value Journal - December 2016
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
What are the advantages of adopting public cloud
What are the advantages of adopting public cloudWhat are the advantages of adopting public cloud
What are the advantages of adopting public cloud
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the Cloud
 
Redington Value Journal - November 2016
Redington Value Journal - November 2016Redington Value Journal - November 2016
Redington Value Journal - November 2016
 

Mehr von Redington Value Distribution

Mehr von Redington Value Distribution (20)

Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
 
Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
 
Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Value journal September_2019
Value journal September_2019 Value journal September_2019
Value journal September_2019
 
Redington Value journal - August 2019
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
 
Redington Value Journal - July 2019
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Redington Value Journal - April 2019
Redington Value Journal - April 2019Redington Value Journal - April 2019
Redington Value Journal - April 2019
 

Kürzlich hochgeladen

Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Delhi Call girls
 
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls DubaiDubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls Dubaikojalkojal131
 
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlIndian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlAroojKhan71
 
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Delhi Call girls
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyTinuiti
 
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai WhsatappFilm= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatappkojalkojal131
 
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Delhi Call girls
 
Supermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfSupermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfKarliNelson4
 
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Call Girls in Nagpur High Profile
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyKatherineBishop4
 

Kürzlich hochgeladen (10)

Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
Best VIP Call Girls Noida Sector 51 Call Me: 8448380779
 
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls DubaiDubai Call Girls O525547&19 (Asii) Call Girls Dubai
Dubai Call Girls O525547&19 (Asii) Call Girls Dubai
 
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call GirlIndian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
Indian Call Girl In Dubai #$# O5634O3O18 #$# Dubai Call Girl
 
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
Best VIP Call Girls Noida Sector 55 Call Me: 8448380779
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing Study
 
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai WhsatappFilm= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
Film= Dubai Call Girls O525547819 Call Girls Dubai Whsatapp
 
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
Best VIP Call Girls Noida Sector 50 Call Me: 8448380779
 
Supermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdfSupermarket Floral Ad Roundup- Week 17 2024.pdf
Supermarket Floral Ad Roundup- Week 17 2024.pdf
 
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...Top Rated  Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
Top Rated Pune Call Girls Talegaon Dabhade ⟟ 6297143586 ⟟ Call Me For Genuin...
 
The 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing StudyThe 15 Minute Breakdown: 2024 Beauty Marketing Study
The 15 Minute Breakdown: 2024 Beauty Marketing Study
 

Redington Value Journal - January 2019

  • 1. Continued on page 3 Cybersecurity firms Symantec and Fortinet have an- nounced an expansive partnership agreement to pro- vide customers with the industry’s most comprehensive and robust security solutions. Fortinet’s Next-Genera- tion Firewall (NGFW) capabilities are planned to be in- tegrated into Symantec’s cloud-delivered Web Security Service (WSS). Additionally, endpoint protection solu- tions are also planned to be integrated into the Fortinet Security Fabric platform. The technology partnership provides essential security controls across endpoint, network, and cloud environments that are critical to en- forcing the Zero Trust security framework. “As the first step in this technology partnership, we plan to deliver best-of-breed security through the com- bination of enterprise-class advanced firewall controls to Symantec’s industry-leading network security ser- vice,” said Art Gilliland, EVP and GM Enterprise Prod- ucts, Symantec. “Through this partnership, we hope to provide joint customers the power of Symantec’s Inte- grated Cyber Defense Platform bolstered by Fortinet’s leading NGFW in an integrated solu- tion that’s easy to use and deploy.” Issue 29 // January 2019 Partnership delivers essential security controls across endpoint, network, and cloud environments SYMANTEC, FORTINET PARTNER TO DELIVER COMPREHENSIVE CLOUD SECURITY SERVICE Continued on page 3 more cost-effective to deploy large- scale machine learning and big data analytics environments. By seam- lessly combining BlueData’s soft- ware platform with HPE’s existing software-defined infrastructure, HPE can help customers acceler- ate their digital transformation by providing an all-encompassing and easy-to-implement solution for AI/ ML and big data analytics. With this container-based solution, cus- tomers can improve agility for their data science teams and potentially reduce their infrastructure costs significantly. HPE to acquire BlueData Expanding HPE’s offerings in AI and Big Data Analytics, the acquisition is expected to close within the company’s first fiscal quarter. John Maddison, Fortinet Milan Shetti, HPE Redington Value is a value added distributor for the following brands in parts of Middle East & Africa: Hewlett Packard Enterprise (HPE) has announced a definitive agree- ment to purchase BlueData, a pro- vider of software that transforms how enterprises deploy artificial intelligence and big data analytics, expanding HPE’s offerings in these rapidly growing markets. The ac- quisition is expected to close within HPE’s first fiscal quarter, ending January 31, 2019. Founded in 2012, BlueData is a privately-held company headquar- tered in Santa Clara. BlueData’s software platform uses container technology to make it simpler and “BlueData has developed an in- novative and effective solution to address the pain points all compa- nies face when contemplating, im- plementing, and deploying AI/ML andbigdataanalytics.AddingBlue- Data’s complementary software platform to HPE’s market-leading Apollo Systems and professional services is consistent with HPE’s data-first strategy and enables our customers to extract insights from data – whether on-premises, in the cloud, or in a hybrid architecture,” said Milan Shetti, SVP and GM, Storage and Big For more information, please write to sales.value@redingtonmea.com
  • 2.
  • 3. 3 From page 1 From page 1 HPE to acquire... Symantec, Fortinet... Additionally, Symantec’s endpoint protection solution is planned to be integrated into the Fortinet Security Fabric platform, providing customers with real-time, actionable threat intelligence and automated response for exploit-driv- en attacks and advanced malware. Interoperability between Fortinet’s SD-WAN technology will also be certified to work with Symantec’s Web Security Service through Symantec’s Technology Integration Partner Program (TIPP). As part of the collaboration, both companies plan to engage in joint go- to-market activities. John Maddison, SVP of products and solutions, Fortinet said, “Upon completion of the integration, Symantec cloud web gateway customers will be able to benefit from Fortinet’s enterprise-class advanced firewall controls, and for the first time ever, Fortinet customers will be able to purchase the For- tiGate Next-Generation Firewall via FWaaS. With the addition of Symantec as a Fortinet Fabric-Ready Partner, Symantec’s endpoint security solution will be validated to seamlessly in- tegrate with the Fortinet Security Fabric platform to provide more consistent and effective protection for joint customers.” Fully integrated Cloud Firewall Service within WSS is ex- pected to be available in the 1st half of calendar 2019. Data Global Business Unit at HPE. “Growth in the volume and the types of data in the market contin- ues to accelerate, as does the de- mand for a fast, easy, and unified consumption experience for AI and big data analytics,” said Kumar Sreekanti, Co-founder and CEO of BlueData. “From our perspec- tive, data is fuel, and BlueData’s software is the engine that helps businesses consume their data and deliver insights in the most effec- tive and efficient way. We’ve had tremendous customer success by providing a turn-key solution that delivers an as-a-service experience for AI and big data, and are excited to reach even more customers as part of HPE.” The financial terms of the trans- action were not disclosed. Fujitsu to provide end-to-end enterprise transformation offering with AWS Fujitsu has announced a new end-to-end enterprise transformation offering which will fast track the move to the AWS cloud for organizations, helping them to improve business processes and speed up innova- tion. As the result of a new strategic collab- oration between Fujitsu and AWS, the new Fujitsu Cloud Service for AWS is available immediately in Europe, the Middle East, India and Africa (EMEIA) and enables customers to move their IT estates to the market-leading AWS Cloud. The new Cloud Service for AWS com- bines Fujitsu’s extensive expertise as a system integrator with the power and scope of the market-leading cloud platform from AWS. It will deliver a set of services that accelerate the customer journey to the AWS Cloud including business consultancy, stra- tegic assessment, and roadmap for change to advise the most appropriate and efficient way for an enterprise to move to AWS. It will also include additional consultancy services such as infrastructure design, build and test to help with the deployment of new applications on the AWS Cloud, as well as application modernization services, sup- porting the re-hosting, re-platforming, and re-architecting of existing applications. Duncan Tait, Senior Executive Vice President and Head of Fujitsu EMEIA, said, “For successful digital transformation, the two business imperatives are to get there fast, with minimal disruption. By introduc- ing the new Fujitsu Cloud Service for AWS, we are further expanding our capabilities in working together with hyper scale cloud vendors to seamlessly integrate cloud into enterprise IT environments. With this ap- proach, we empower customers with large and complex IT estates to modernize their applications and leverage the scale, securi- ty, agility and efficiency of AWS.” Fujitsu joined the AWS Partner Network (APN) in 2014 and since then has quickly grown to achieve Advanced Consulting status with hundreds of AWS Certified and Accredited employees. To address the rapidly growing customer demand for AWS cloud services, Fujitsu has also announced plans to train 4,000 employees in AWS over the next three years. This new offering will enable customers to improve business processes and accelerate innovation. We now live in a consumption-driven world and IT is no different. Business functions expect IT to play a pivotal role in helping them adapt to constant- ly changing demands. In order to re- main competitive and deliver business outcomes faster, organizations must adapt to flexible, economical and inno- vative ways to consume IT. Organiza- tions are more and more looking to in- vest in technologies which offers them consumptions choices, seamless ability to decide on capacity and address spe- cific functional requirements. The HPE GreenLake consumption-based solu- tion addresses the business needs with hardware, software and services in an on-prem or cloud environment. The new model offers multiple consump- tion-based solutions with uncomplicat- ed financing model for costumers. From our partners’ perspective, the launch of HPE GreenLake channel model also gives a massive opportu- nity for resellers to play a key role in the consumption solutions. With an extremely lucrative compensation in- centive, channel partners have a great opportunity to position themselves in the consumption-based requirements. Partners also have an opportunity to offer their own services in the current model. IT-as-a-service is defining the industry and it’s a completely different way of consuming technology, HPE GreenLake offering now allows every- one in the value chain to be a part of it. Embracing consumption- based IT By Kunal Singh, Server, Storage and Networking Head, MEA, Redington Value COLUMN: REDefined For more information, please write to sales.value@redingtonmea.com
  • 4. 4 SonicWall has announced its re- cord year-on-year growth in the EMEA region. Among the company’s key EMEA milestones include the opening of three new offices in Basingstoke, UK, Barcelona, Spain, and Dubai, UAE, as well as strategic new hires to drive addi- tional regional growth. Following unprecedented EMEA growth, SonicWall now has a direct presence in 16 countries across the EMEA region including Austria, Belgium, Denmark, France, Ger- many, Ireland, Italy, Netherlands, Poland, Romania, South Africa, Spain, Sweden, Switzerland, and the UK. The three new office loca- tions in Basingstoke, UK, Barcelo- na, Spain and Dubai, UAE provide the vendor with improved access to local channel partners, ensur- SonicWall boosts EMEA presence The company’s key milestones include the opening of new offices. and commitment to strengthen SonicWall’s value proposition among our valued customers and partners within this exciting and rewarding market. “By ensuring our channel exper- ing customers’ across EMEA gain access to SonicWall’s burgeoning channel presence. The move also demonstrates SonicWall’s focus on the EMEA region, as well as the enterprise market, alongside its continuing commitment to the SMB market. The success of SonicWall’s EMEA business is in part attrib- utable to new enterprise services announced during Q4 2018, which include zero-touch and Cloud de- ployment of SonicWall next gen- eration firewalls, as well as secure SD-WAN which is now delivered alongside SonicWall’s firewall pro- tection. Michael Berg, Executive Direc- tor Sales EMEA, SonicWall, said, “Our boosted presence across EMEA is part of a long-term plan, and proof of our determination tise is always within easy reach and that we are committed to speaking local languages, we are better placed tounderstandandrespondinavalu- able way to our customers’ individu- al cybersecurity challenges. In addition to new EMEA offices, SonicWall has invested in top tal- ents to bolster and lead its teams. Among which is the appointment of Mario Pucciarelli who is now the Strategic Partner Manager in SonicWall for the Middle East, en- abling telecom operators, MSSP and main system integrator to de- liver SonicWall cybersecurity solu- tions to their end customers. SonicWall is forecasting dou- ble-digit growth as it continues to grow its partner base, which has increased by over 45 percent since the company divested from Dell two years ago. Michael Berg, SonicWall Pivot3 delivers policy-based security for hybrid cloud solutions Pivot3’s expanded Intelligence Engine capabilities enable customers to streamline security and regulatory compliance across the edge, core and cloud. The hyperconverged infrastructure (HCI) performance and technology player Pivot3, has announced new policy-based security management capabilities in its core Intelligence Engine. These expanded capabil- ities allow organizations to au- tomate and simplify the process of protecting sensitive data with comprehensive, standards-based security for encryption and key management. Pivot3’s new plat- form enhancements also facilitate regulatory compliance as custom- ers acquire and manage data across the edge, core and cloud. John Spiers, Vice President of Strategy, Pivot3, said, “Customers rely on us every day to simplify man- agement at scale. This extension of Pivot3’s Intelligence Engine brings new confidence to IT in knowing that data can be secured and pro- tected as it moves across the entire hybrid cloud infrastructure.” Pivot3’s Intelligence Engine en- hances application performance, data placement, data protection, and monitoring and analytics, en- abling customers to confidently consolidate multiple, mixed-ap- plication workloads on HCI while reducing time, cost and complexity. To address the increased regula- tion and compliance requirements, the new capability includes flexible, secure multi-tenancy and data-at- rest encryption at a system, volume or virtual machine level, compliant with Federal Information Process- ing Standards (FIPS) 140-2. Pivot3 designed its data encryption algo- rithms to leverage Intel Xeon CPUs AES New Instructions (AES NI) to ensure minimal performance im- pact and low overhead. For more information, please write to sales.value@redingtonmea.com
  • 5. 5 “Cyber criminals have increas- ingly smart tools to scan for and to quickly exploit vulnerable devices, and they have new tools for spread- ing their malware and bypassing firewalls. If a vulnerable device is deployed on the internet, it will be exploited in a matter of minutes,” McNamee said. The Nokia NetGuard security suite provides protection against a wide variety of bots and malware. The suite aggregates, analyses and correlates security data from a va- riety of sources, including endpoint detection software, to help security teams control risks and costs and to improve decision making. The NetGuard Endpoint Security software includes an IoT behavior- al anomaly detection component that is capable of constantly track- ing devices against security threats. The individual traffic profiles of any device, including an IoT device, are machine-learned automatically by the Endpoint system; any anom- alies detected triggers immediate trouble-shooting against threats. Avaya has introduced a new Device as a Service (DaaS) offering that will enable businesses to purchase Avaya’s latest smart desktop devic- es on a monthly subscription basis. Similar to how smart devices are purchased in the consumer space, Avaya now provides three ways for businesses to enjoy the Avaya Desktop Experience: up front, fi- nanced, and by subscription. Avaya’s Device as a Service of- fering delivers the company’s latest smart devices including the Avaya Vantage portfolio, the complete Essential Experience J100 series portfolio of IP Phones, and the Avaya B109, B179, and B189 con- ferencing devices. With the plat- form agnostic capabilities of the Avaya Desktop Experience, these devices can be deployed on Avaya or Non-Avaya UC platforms. Customers can contract with terms of 1, 3, or 5 years, with lon- ger terms offering lower monthly prices. Customers can upgrade at any time to more advanced devices without any penalty. “Our customers and partners have been asking for this and we are very excited to announce this new offer,” said Greg Pelton, Vice Pres- ident, Collaboration and Devices, Avaya. “It brings a new level of sim- plicity to UC as a Service (UCaaS) where customers can now enjoy the best cloud service and latest cloud devices, all on one monthly bill.” 55 Avaya introduces new Device as a Service offering The company now provides three ways for businesses to enjoy the Avaya Desktop Experience - up front, financed, and by subscription. IoTbotsnowmakeup16%ofinfecteddevicesinCSPnetworks,upsignificantlyfrom3.5%ayearago. The use of malicious software to attack IoT devices like smart home security monitoring systems is rising substantially and growing more sophisticated as cyber crimi- nals take advantage of lax security, Nokia’s Threat Intelligence Report 2019 warned. Driven by financial and other nefarious purposes, IoT botnet ac- tivity accounted for 78% of malware detection events in communication service provider (CSP) networks in 2018, according to the report, which is based on data aggregated from monitoring network traffic this year on more than 150 million devices globally where Nokia’s Net- Guard Endpoint Security product is deployed. That is up sharply from 33% in 2016, when IoT botnets were first seen in meaningful numbers. “Cyber criminals are switching gears from the traditional comput- er and smartphone ecosystems and now targeting the growing number of vulnerable IoT devices that are being deployed. You have thou- sands of IoT device manufacturers wanting to move product fast to market and, unfortunately, security is often an afterthought,” said Kev- in McNamee, Director of Nokia’s Threat Intelligence Lab and lead author of the report. In 2018, IoT bots made up 16% of infected devic- es in CSP networks, up significantly from the 3.5% observed in 2017. As an indicator of the rising threat, the report found that mal- ware-infected crypto-coin mining is expanding from high-end servers with specialized processors to IoT devices as well as smartphones and web browsers. Crypto-coin mining is generally the process by which crypto currency transactions are verified and added to blockchain technology systems. Ivanti has announced Ivanti Package Studio, a new software packaging solution for Ivanti Uni- fied Endpoint Manager. Offering pre-packaged content for simpli- fied endpoint software distribu- tion, the new solution can reduce software packaging steps from hours to just minutes. “Creating packages for software distribution can be riddled with multiple steps, checks and tests,” said Duane Newman, Vice Pres- ident, Product Management and Marketing, Ivanti. “Ivanti Package Studio dramatically simplifies the process with ready-to-use setups for Windows applications giving IT administrators back valuable time for more strategic projects.” Ivanti simplifies endpoint software distribution with Ivanti Package Studio Reduces software packaging setup steps from hours to minutes. Ivanti Unified Endpoint Manag- er. Using Configuration Wizards, administrators can create trans- form files to customize the setups to align deployment with company guidelines and policies. Ivanti Package Studio integrates with Ivanti Unified Endpoint Man- ager, an all-in-one solution for reliable endpoint and user-profile management. Ivanti Unified End- point Manager discovers every- thing that touches the network, automates software delivery and speeds login performance. It also automates and integrates actions with multiple IT solutions to unify the IT management process. Ivanti Package Studio is available now in the Ivanti Marketplace Nokia warns on the evolving threat of malicious software targeting IoT devices Duane Newman, Ivanti Greg Pelton, Avaya Ivanti Package Studio provides a ‘Setup Store’ which contains ready- to-use setups for most typical Win- dows desktop applications. These can be downloaded and configured automatically and deployed using For more information, please write to sales.value@redingtonmea.com
  • 6. 6 Cryptocurrency mining affected millions of users in 2018: Kaspersky Lab The major driver behind the crypto gold rush was the installation and use of unlicensed software and content. unlicensed software, the more in- cidents of malicious crypto miner activity were detected. In short, an activity not generally perceived as dangerous: the downloading and installation of dubious software, underpins what is arguably the biggest cyberthreat story of the year – malicious crypto mining,” said Evgeny Lopatin, security ex- pert at Kaspersky Lab. Other key findings from the re- port include: • The total number of users who encountered miners rose by more than 83% from 2,726,491 in 2017 to 5,001,414 in 2018; • The share of miners detect- ed, from the overall number of threats detected also grew, from 5% in 2017 to 8% in 2018; • The share of miners detected, from the overall risk tool detec- tions is also on the rise – from 9% in 2017 to 17% in 2018; • The total number of users who encountered mobile miners also grew, increasing by over five times from 1,986 in 2017 to 10,242 in 2018. crypto-mining fever to discover what drove the global distribution of this threat. They analysed the regulatory landscape, electricity prices in the top 10 countries tar- geted by crypto miners and main infection vectors for the popular malware families. The analysis shows that neither cryptocurrency legislation nor the cost of power has a significant im- pact on the spread of malicious min- ing malware. However, the investi- gation of malware families reveals that they mainly infected devices by duping users into installing pirated software and unlicensed content. “Our analysis of the economic background of malicious cryp- to mining and the reasons for its widespread presence in certain regions revealed a clear correla- tion: the easier it is to distribute VeritasPredictiveInsightsusesAIandMLto predictandpreventunplannedservice Artificial Intelligence and Machine Learning create proactive maintenance experience for IT staff. In 2018, malicious cryptocur- rency mining prevailed over the main threat of the last few years: ransomware. The number of in- ternet users attacked by malicious cryptocurrency mining software increased steadily during the first half of the year, peaking in March, with around 1.2 million users a month coming under attack. Kaspersky Lab experts have investigated the economic back- ground of the sudden onset of The global outbreak in malicious cryptocurrency mining that un- folded in 2018 saw the number of attacks increase by more than 83%, with over five million users attacked online in the first three quarters of the year, compared to 2.7 million over the same period in 2017. The major driver behind the crypto gold rush was the installa- tion and use of unlicensed software and content, according to Kasper- sky Lab. Veritas Technologies has an- nounced the launch of Veritas Pre- dictive Insights, a new solution that utilizes artificial intelligence (AI) and machine learning (ML) algo- rithms to deliver always-on proac- tive support. Utilizing years of encrypted event data from thousands of Ver- itas appliances, Veritas Predictive Insights’ cloud-based AI/ML En- gine monitors system health, de- tects potential issues and creates proactive remediation before prob- lems can occur. Predictive Insights also enhances Veritas product availability and customer satisfac- tion by helping businesses reduce unplanned downtime, ensure fast- er time to fault resolution and low- er overall total costs of ownership. This latest offering from Veri- tas addresses the growing concern from customers to simplify their data and infrastructure manage- ment while reducing the risks and costs associated with downtime and access to critical business data. Veritas Predictive Insights pro- cesses millions of events, providing IT administrators with the ability to avoid alert fatigue and focus on significant incidents. “Having consistently available IT systems is increasingly important to organizations that are respon- sible for managing, analyzing and protecting more and more data points every day,” said David Noy, Vice President and General Man- ager, Product Management and Alliances, Veritas. “This new tech- nology harnesses the power of AI and continuous ML models to pro- vide predictive analytics to IT staff. Administrators can then proactive- ly support and remediate a wide range of potential issues before they occur, react much quicker and allow for less costly resolution.” Veritas Predictive Insights pro- vides prescriptive support ser- vices, such as proactive mainte- nance, performance and capacity forecasting, as well as compliance determination. The services are driven from the power of AI and continuous ML models that uti- lize years of collected data points from tens of thousands of Veritas customer installations. Combined with real-world input from service personnel, the Veritas AI/ML En- gine delivers predictive insights about a customer’s environment, resulting in proactive recommen- dations and actions to improve their business operations. Veritas Predictive Insights “Al- ways On” feature allows for intelli- gent, data driven decision-making capabilities and optimized services ensuring that customers have an enriched support experience, which is fast, proactive and pre- scriptive. Veritas Predictive Insights is available now on Veritas NetBack- up Appliances and will be available on Veritas Access and Flex appli- ances in the coming quarters. For more information, please write to sales.value@redingtonmea.com
  • 7. 7 EVENTS Fortinet End Customer Session with STS - Jordan, 5 December Fortinet NSE 5 Technical Workshop - Dubai, 27 and 28 November Fortinet SMB Roadshow - Jordan, 28 November Fortinet Security Day with Bahwan IT - Oman, 16 and 17 December Fujitsu and NetApp NFLEX Blitz Day with Veeras - Dubai, 30 November Kaspersky Launch Event - Dubai, 20 November Fortinet SMB Roadshow - Kuwait, 17 December Fujitsu and NetApp NFLEX Partner Event - Dubai, 27 November Kaspersky Launch Event - Qatar, 4 December Fortinet SMB Roadshow - Oman, 18 December Fujitsu and NetApp NFlex Partner Session - Qatar, 16 December Pivot3 Sales Enablement Session - Dubai, 5 December Barracuda Partner Enablement Session - Dubai, 10 December Fortinet ‘Power To Secure’ Event - Dubai, 6 December CyberArk Technical Training Session - Dubai, 19 and 20 December SonicWall Partner Event - Bahrain, 10 December Fortinet SMB Roadshow - Lebanon, 26 November For more information, please write to sales.value@redingtonmea.com
  • 8. 8 EVENTS Cisco Partner Enablement Session - Tanzania, 29 November Cisco SMB Partner Session - Tanzania, 4 December Cisco End Customer Event with Multiskills Nigeria Limit- ed - Nigeria, 29 November Microsoft CSP Partner Roundtable - Kenya, 22 November Dell EMC End Customer Event With Jo World Agencies Limited - Kenya, 30 November Palo Alto Networks and Redington partnership Launch - Kenya, 11 December SplunkPartner RookiesWorkshop-Nigeria,5December Fortinet Partner Enablement Session - Kenya, 29 November SAS Banking Event with Agile Data Global - Tanzania, 28 November Trend Micro Partner Enablement Session - Kenya, 27 November Malwarebytes and MobileIron Sales Session - Kenya, 13 December Splunk CIO Event - Nigeria, 28 November Cisco Service Partner Workshop - Nigeria, 19 December SonicWall Network Security day - Qatar, 29 November Veeam Partner Event with AWS - Dubai, 11 December SonicWall Partner Sales Workshop - Oman, 8 November Microsoft New Partner Roundtable - Dubai, 10 December SonicWall Network Security Day - Oman, 7 November For more information, please write to sales.value@redingtonmea.com
  • 9. 9 EVENTS Splunk For Rookies Workshop - Riyadh, 5 November Symantec Enablement Session - Jeddah, 21 November SonicWall Partner Enablement session - Bahrain, 10 December Splunk For Investigation - Jeddah, 5 December Kaspersky Launch Event - Riyadh, 28 November Huawei Day Forum - Riyadh, 4 December MobileIron Event - Riyadh,14 November Kaspersky Launch Event - Riyadh, 28 November Kaspersky Launch Event - Riyadh, 28 November Splunk End User Event - Riyadh,12 December MobileIron Event - Riyadh,14 November Kaspersky Launch Event - Riyadh, 28 November SonicWall Network Security Day - Kuwait, 5 December Symantec End User Event - Riyadh, 27 November Microsoft Technical Bootcamp - Egypt, 19 and 20 December Dell EMC Technologies Forum - Riyadh, 10 December Splunk For Investigation - Riyadh, 19 November For more information, please write to sales.value@redingtonmea.com
  • 10. 10 EVENTS Dell EMC Technologies Forum - Riyadh, 10 December Microsoft CSP Partner Roundtable - Kenya, 14 December Huawei Day Forum - Riyadh, 4 December AWS Certification training - Dubai, 21 and 22 November Fortinet NSE4 - Riyadh, 25 and 26 November Fortinet SMB - Riyadh,19 December Fujitsu NetApp Partner Event - Riyadh, 18 December Fortinet for SMB - Khobar,12 December Fortinet ‘Power To Secure’ Event - Riyadh, 5 December Huawei Day Forum - Riyadh, 4 December Fortinet Power To Secure - Khobar, 10 December Fortinet ‘Power To Secure’ - Riyadh, 5 December Huawei Day Forum - Riyadh, 4 December Aruba Clear Pass Session - Jeddah, 28 November Dell EMC Technologies Forum - Riyadh, 10 December Aruba Clear Pass - Khobar, 5 December Microsoft CSP Partner Roundtable - Ghana, 20 December Microsoft - Redington Partnership Launch - Egypt, 18 December For more information, please write to sales.value@redingtonmea.com