SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
deliver maximum performance,
high availability, and secure
enterprise IT systems. In
addition, to accelerate
innovation
Issue 20 // March 2018
Celebrating its 25th year, the distributor has unveiled a new logo and tagline.
REDINGTON REVEALS NEW
GLOBAL LOOK
Continued on page 3
Continued on page 3
services, Oracle is setting a
new industry standard for
autonomous cloud capabilities.
The firm is applying AI and
machine learning to its entire
next-generation Cloud Platform
services to help customers
lower cost, reduce risk,
accelerate innovation, and get
predictive insights.
As organizations focus
on delivering innovation
fast, they want a secure set
of comprehensive, integrated
cloud services to build new
applications and run their
most demanding enterprise
workloads. Oracle’s cloud
services can automate key
operational functions like
tuning, patching, backups and
upgrades while running to
Oracle President of Product
Development Thomas Kurian
demonstrated the latest
advances in its Cloud Platform,
expanding its Cloud Platform
Autonomous Services beyond
the Oracle Autonomous
Database, to make its Cloud
Platform services self-driving,
self-securing and self-repairing.
With its enhanced suite of
autonomous Cloud Platform
Oracle demonstrates advances
in autonomous cloudSelf-driving services use AI and machine learning to help organizations lower cost,
reduce risk, accelerate innovation, and get predictive insights
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:
Redington, the $6 billion
distribution and supply chain
provider for international brands
in the IT and mobility sectors,
has unveiled its new global brand
identity – a new logo and tagline
– ‘Seamless Partnerships’.
According to the firm, as
it steps into its 25th year since
inception, the new branding builds
on Redington’s well-established
reputation in the industry.
The new brand identity reflects the core values
of Redington as a contemporary and innovative
company, which has developed its messaging
strategy to reflect its evolution as a brand and its
global role as one of the largest provider in the
supply-chain solution industry. The distributor
said that the new logo and tagline epitomizes the
new direction that the company would like to take
in the years to come.
Redington’s Managing Director, Raj Shankar,
said, “I am proud to launch our rejuvenated
brand and visual identity that
For more information, please write to sales.value@redingtonmea.com
VJ March 2018.indd 1 3/11/18 10:02 AM
VJ March 2018.indd 2 3/11/18 10:02 AM
3
Huawei unveils new solutions at Mobile
World Congress 2018
The new offerings include Intent-Driven Network and AUTIN Automation and Intelligence
solutions.
At Mobile World Congress (MWC)
2018, Huawei launched over
20 new products, among those
are the Intent-Driven Network
and AUTIN Automation and
Intelligence solutions.
The Intent-Driven Network
will bridge the gaps between the
physical network and business
goals by creating a digital twin of
the network infrastructure. These
technologies will enable software-
defined networks (SDNs) to evolve
into intent-driven networks, and
maximize business value.
Making use of cloud, big data,
and artificial intelligence (AI)
technologies, Huawei has launched
the Intent-Driven Network
solution to deliver networks driven
by business logic and service
strategies based around end
user experience. They are user-
centric networks, incorporating
intelligence, simplicity, ultra-
broadband, security, and
openness.
Kevin Hu, President, Huawei
Network Product Line, said,
“Intent-Driven Networks
can accurately read a user’s
intention, and make it happen,
because network configuration is
automated from end to end. These
networks can also sense the quality
of the user experience in real time,
and perform predictive analysis so
that they can proactively optimize
performance.”
He added, “The Intent-Driven
Network solution will usher in a
new era of network evolution. It
will be extensively used in both
the enterprise and carrier sectors.
The march toward autonomous
networks will help us embrace the
intelligent era.”
The second solution launched
at MWC 2018 is AUTIN, which
is an Operations Consulting and
Software as a Service (SaaS)
solution for Digitized Operations
Services which helps operators
manage complex hybrid ICT
environments. AUTIN delivers
AUTomation and INtelligence to
modernize and reshape operations
for the digital era.
Building on its award-winning
Operation Web Services (OWS),
Huawei’s new AUTIN brand is
introducing new functionality and
machine learning for intelligent
operations. AUTIN leverages big
data and AI to help operators move
from a reactive to more proactive
and predictive operations. The
solution is vendor and technology
agnostic and can manage multiple
technologies and services in a
constantly changing environment.
From page 1From page 1
Oracle demonstrates...Redington...
The economies of West African
(WA) countries have recovered to a
fair bit over the last two years. One
of the main growth drivers is the
rapid technology adoption rates in
the region. Factors such as stable
exchange rate, increase in oil prices
and availability of US dollars have
further contributed to the increasing
receptiveness of technology in the
WA markets.
High-speed and affordable
internet coupled with steep increase
in mobile users have driven
implementation of several large-
scale government projects. Internet
of Things (IoT) technology is also
seeing a swift growth in the region.
Regional governments are
now emphasizing on the need for
digital processes to control, not only
corruption but to provide ease-of-
life to citizens.
Redington’s approach continues
to be solutions-centric rather
than a product-centric one. We
have played a significant role in
supporting our partners to help
them structure their deals with
financing tools, which have helped
them win big contracts.
Partners should look at
investing in technologies such
as infrastructure modernization,
cloud, cybersecurity and advance
analytics to be successful. Early
movers to new technologies will
reap the benefits quicker.
Our endeavor continues to be
enabling partners and aid them
to add value to their customers.
Redington will play a vital role in
this market for the years to come
and we look forward to winning
together with our partners.
Enabling
partners
By Sunil Zarekar, Regional Sales Manager, West
Africa, Redington Gulf - Value Division
COLUMN: REDefined
fully reflects what we stand
for as an organization. This is
not a mere change of brand
identity but a coming of age for
Redington, a transformation
that the company is engineering
to take it to the next level. The
new identity carries forward
our core values on which our
company is built – adaptability,
collaboration, know-how,
objectivity, simplicity,
transparency and trust. We look
to expand our horizons from
being a ‘Brand behind brands’
to a platform that enables
‘Seamless partnerships’.”
He added that Redington
is committed to do everything
to achieve its ultimate goal of
being the preferred company for
connecting buyers and sellers.
and smarter decision-making,
Oracle Cloud Platform is
incorporating additional
autonomous capabilities
specific to application
development, mobile and bots,
app and data integration,
analytics, security and
management.
“The future of tomorrow’s
successful enterprise IT
organization is in full end-to-
end automation,” said Kurian.
“At Oracle, we are making
this a reality. We are weaving
autonomous capabilities into
the fabric of our cloud to help
customers safeguard their
systems, drive innovation
faster, and deliver the ultimate
competitive advantage with
smarter real-time decisions.”
In addition to the Oracle
Autonomous Database, Oracle
Cloud Platform autonomous
capabilities for application
development, mobile and bots,
integration, analytics, security
and system management, are
scheduled to be available in the
first half of calendar year 2018.
Oracle also demonstrated a
single Oracle Digital Assistant
for users to interact across the
firm’s SaaS and PaaS services
including analytics. Oracle
Digital Assistant provides
centralized connection for the
user to converse across the
user’s CRM, ERP, HCM, custom
applications and business
intelligence data and uses AI to
intelligently correlate data and
automate user behavior.
Kevin Hu, Huawei
For more information, please write to sales.value@redingtonmea.com
VJ March 2018.indd 3 3/11/18 10:02 AM
4
Cybersecurity vendor for phishing
readiness and security awareness
automation PhishRod has signed
up with Redington Gulf to be its
authorized distributor across Middle
East and North Africa region. The
partnership is aimed to leverage the
strong footprint and experience of
Redington Gulf in value distribution
coupled with solutions from
PhishRod for phishing readiness,
security awareness and advisory
management, said the company.
Ali Abid, Chief Commercial
Officer, PhishRod said, “Despite
having the most complex and
advance technology based solutions
in place, organizations keep
suffering from cyber-attacks. It’s
simply because that the hackers
Dell EMC has expanded its
converged infrastructure (CI)
system with the addition of the next
generation Dell EMC VxBlock
System 1000. The new system
breaks the physical boundaries
of traditional CI and offers
enterprises even greater simplicity
and flexibility to help accelerate
their IT and digital transformation
efforts, said the firm.
Designed to support workloads
of all types, the VxBlock 1000
includes a substantially broader
choice of storage arrays, data
protection and compute than
has the right mix and capacity of
IT resources and data services that
evolving applications require, but
with pooled resources, so the data
center is more efficient even as
workload requirements change. We
offer this with a focus on reducing
administrative burden for IT teams
under constant pressure to deliver
more with less.”
The VxBlock 1000 builds on
Dell EMC’s industry leadership in
CI with a host of new capabilities.
These help enterprises reap
greater benefits than ever
before from a wider breadth of
technologies than previously
supported. These are in addition
to traditional CI advantages such
as lower operating expenses and
a five-year return on investment
of up to 640 percent. Compared
to previous generation Dell EMC
VxBlock Systems, the VxBlock
Dell EMC expands converged
infrastructure portfolio
Designed to support workloads of all types, the VxBlock 1000 includes a substantially broader choice of storage arrays,
data protection and compute than previous-generations.
1000 offers improved business
agility, data center efficiency and
operational simplicity.
The Dell EMC VxBlock 1000 is
available globally via Dell EMC
and its channel partners.
previous-generation VxBlock
Systems. This new system’s all-in-
one, multiple-technology design
expands upon CI’s promise by
further simplifying IT infrastructure
lifecycle management through
extensive pre-validation, according
to the company.
“When customers deploy CI,
what they are really looking to
do is invest in technology that
removes data center cost while,
ultimately, improving outcomes,”
said Jeff Boudreau, President, Dell
EMC Storage Division. “Our role
is to deliver CI innovation that
Redington Value onboards
cybersecurity vendor PhishRod
The partnership will extend across the Middle East and North Africa region.
now target the end-users. Socially
engineered attacks such as phishing
are becoming the most widely used
mechanism to drop malwares.”
He added that in the current
threat landscape, technology and
process are important but no
cybersecurity strategy would be
a success without engaging the
end-users.
“We are extremely excited
to announce this partnership
with Redington to achieve our
common goal that is to prepare
end-users to take on the fight
against cyber-attacks.”
According to the company,
PhishRod helps organizations to
identify vulnerable end-users and
automates the entire cybersecurity
awareness program. PhishRod suit
comes with PhishRod Simulator
to identify vulnerable end-users
and determine phishing index of
an enterprise. PhishRod Security
Awareness Manager is a complete
solution for analytics and KPI driven
cybersecurity awareness across the
organization while the PhishRod
Advisory Manager helps to cascade
the threat intelligence to the end-user
level using the PhishRod Reporter.
PhishRod supports both English
and Arabic language for security
awareness and comes with both on
premise and cloud-based solution.
Ramkumar Balakrishnan,
President, Redington Value
Distribution said, “Analytics
driven phishing readiness and
cybersecurity awareness is a high
growth area in cybersecurity. We
are glad that we have PhishRod
onboard now that covers the people
part of cybersecurity strategy from
a 360-degree perspective. We are
looking forward to work very closely
with PhishRod to expand this
portfolio across the Middle East and
North Africa region.”
Jeff Boudreau, Dell EMC
Ramkumar Balakrishnan, Redington Value
Distribution
Our role is to deliver CI innovation that has the
right mix and capacity of IT resources and data
services that evolving applications require, but
with pooled resources, so the data center is
more efficient.”
For more information, please write to sales.value@redingtonmea.com
VJ March 2018.indd 4 3/11/18 10:02 AM
555
SonicWall has revealed that a
new Capture Cloud engine has
discovered hundreds of new
malware variants not seen before
by sandboxing technology.
Through the use of previously
unannounced patent-pending
technology, SonicWall Capture
Labs security researchers
SonicWall unveils new capture cloud engine
SonicWall Capture Labs security researchers have engineered an advanced method for identifying and mitigating threats
through deep memory inspection.
engineered an advanced method
for identifying and mitigating
threats through deep memory
inspection — all in real time, said
the firm.
“Threat actors have been so
far ahead of the game they’ve
been able to create highly evasive
malware without the greater
industry even knowing,” said
SonicWall President and CEO Bill
Conner. “This new real-time deep
memory inspection technology
(RTDMI), coupled with more than
a decade of machine-learning
experience, will help level the
playing field and eliminate some
of the most challenging attack
vectors. The new engine is the
latest addition to our Capture
Cloud Platform that reinforces our
leadership position.”
via deep memory inspection in
real time. It detects and blocks
malware that does not exhibit any
malicious behavior and hides its
weaponry via custom encryption.
It forces malware to “reveal”
its weaponry into memory.
It identifies and mitigates
sophisticated attacks where
weaponry is exposed for less than
100 nanoseconds.
SonicWall deployed the
RTDMI engine into the SonicWall
Capture Cloud Platform and is
leveraging the technology to
support SonicWall’s layered
security platform, which includes
next-generation firewalls,
wireless network security, email
security, secure mobile and
remote access offerings, as well
as cloud and IoT solutions.
Operational for a while,
the new SonicWall Capture
Cloud Real-Time Deep Memory
Inspection (RTDMI) technology
and engine is discovering
hundreds of malware strands
not detected by sandboxing
technology, said the firm.
SonicWall said it is unveiling
this new technology to strengthen
the company’s automated real-time
breach detection and prevention
platform. SonicWall RTDMI is a
patent-pending technology and
process utilized by the SonicWall
Capture Cloud to identify and
mitigate even the most insidious
modern threats, including future
Meltdown exploits.
The new RTDMI technology
proactively detects and blocks
unknown mass-market malware
Nokia unveils new services to
cater to the digital era
OperatorscanwhitelabelManagedSecurityServicestoenterprisesundertheirownbrand,whichoffersrevenuepotentialinthe
enterprisesecuritymarketandoptimizestimetomarket.
assessing operators’ security risks
across various security domains,
benchmarking against industry
peers, and providing a 360-degree
gap analysis and suggestions for
performance improvements. This
is the essence of the Security Risk
Index, said the firm.
After the assessment, a
managed service, powered by
Nokia NetGuard software, will
complete the holistic security
approach. Nokia experts
design the network security
infrastructure, information
management and monitoring
systems to ensure that critical
information assets are adequately
protected against known and
unknown threats, and that
the operator meets applicable
security compliance standards
and regulations.
Having secured their own
networks, operators can go on
to offer the Managed Security
Services, or selected elements of it,
to their enterprise customers. In
partnership with Nokia, operators
can implement a security portfolio
to open a new revenue source and
increase customer loyalty.
“Operators must be prepared
for a security breach. A dynamic,
managed security proposition
is needed to eliminate possible
threats, so we are taking a
comprehensive approach to
security from assessing risks
to managing and maintaining
our customers’ security
infrastructure,” said Friedrich
Trawoeger, Head of Managed
Services, Nokia. “This is the
best approach to defend against
attacks. In addition, the resale
white label model will allow
our customers to monetize the
security opportunity.”
The company said that its
security services also utilize Nokia
NetGuard, a portfolio of end-to-
end software solutions that detect,
prevent and mitigate cyber-
attacks by securing traditional
and cloud-based network
architectures and protecting end-
users and IoT devices.
To address rising security
threats to telecom networks,
Nokia has launched its Security
Risk Index assessment service
and Managed Security Service.
According to the firm, together,
they form a “unique, holistic
approach” to targeting security
challenges across mobile, IP
and fixed networks in the digital
transformation era, when new
services and virtualized systems
also introduce new vulnerabilities.
In addition to addressing their
own security needs, operators
can white label Managed Security
Services to enterprises under their
own brand, which offers revenue
potential in the enterprise security
market and optimizes time to
market, according to Nokia.
Nokia is offering an integrated
approach that starts from
Bill Conner, SonicWall
Operators must
be prepared for a
security breach. A
dynamic, managed
security proposition
is needed to eliminate
possible threats.”
For more information, please write to sales.value@redingtonmea.com
VJ March 2018.indd 5 3/11/18 10:02 AM
VJ March 2018.indd 6 3/11/18 10:02 AM
7
EVENTS
Cisco - Partner Enablement on C-Space product &
Market positioning - Kenya - 21 February
Fortinet - Partner Workshop With Africa
Neurotech - Kenya - 23 February Splunk4Rookies - Riyadh - 4 February
Veritas - Partner Enablement Session
Kenya - 22 February
Dell EMC - Partner Enablement Session - Kenya - 22 February Dell EMC - Partner Enablement Session - Tanzania - 20 February
Cisco - Security Workshop - Kenya - 8 February
Oracle - Partner Hub Launch Event - Kenya -
21 February
AVAYA Partner Technincal Session-
14 February - Riyadh
Check Point CSSA Workshop - Qatar -
18-20 February
Dell EMC - Partner Enablement Session
Ethiopia - 13 February
Red Hat - End Customer Event With
Adex Technology - Algeria - 6 February
Fortinet & Bahwan IT Security Seminar - Oman -
19 February
ARUBA RED Techtalk -14 February - Riyadh
For more information, please write to sales.value@redingtonmea.com
VJ March 2018.indd 7 3/11/18 10:02 AM
8
Fortinet FortiMail Workshop - Kuwait -
19-20 February
Fujitsu Partner Enablement Session
Dubai - 6 February
Jellyfish Exclusive Seminar with B Infosec -
Bahrain - 6 February
Microsoft Azure Incubation Training -
7 February - Riyadh
Fortinet SMB Workshop - Kuwait - 11 February
Huawei GPON Post Sales Workshop with Ensure
Services - Dubai - 20-22 February
Microsoft Azure Roundtable - Qatar - 7 February Red Hat Technical Workshop - Dubai - 5 February Sage VAT Enablement Session - Dubai - 1 February
Microsoft Partner Roundtable - Oman - 21 February
Journey to Automation - Red Hat and GBM
Roundtable Seminar - Oman - 19 February
AVAYA Partner Tech Session -
7 February - Riyadh
Fortinet SMB Workshop - Qatar - 5 February
Rising towards the Cloud with Oracle
IaaS and PaaS with Partner iApps -
Dubai - 13 February
PhishRod Partner Enablement Session -
Dubai - 14 February
Red hat Customer Event - 6 February - Riyadh
Mimecast Partner Enablement Session -
Dubai - 25 February
Fortinet Partner Tech Session -14 February - Riyadh
For more information, please write to sales.value@redingtonmea.com
VJ March 2018.indd 8 3/11/18 10:02 AM
VJ March 2018.indd 9 3/11/18 10:02 AM
10
Red Hat Decision Manager 7 is designed to enable organizations to quickly build applications
that automate business decisions.
Red Hat has introduced Red
Hat Decision Manager 7, a
decision management platform
that simplifies the development
and deployment of rules-based
applications and services. Red
Hat Decision Manager 7 is the
next generation of the company’s
business rules management offering,
Red Hat JBoss BRMS, and is
designed to enable organizations
to quickly build applications that
automate business decisions.
Low-code development tools
such as Red Hat Decision Manager
enable business users to take a
more active role in application
development, and by fostering
greater collaboration between
business and IT stakeholders,
can accelerate the application
development process.
Red Hat unveils decision
management offering
Red Hat Decision Manager
7 delivers an improved user
experience and a more robust set
of tools specifically designed to
enable business users and citizen
developers to directly modify
business logic, which can help IT
re-prioritize resources to support
other tasks. Feature highlights
include support for the direct
execution of models expressed
in Decision Model and Notation
(DMN); redesigned decision tables
and a new decision table editor; and
an improved data modeller.
Built for both traditional and
cloud-native applications, the
offering can be used to create
rules-based decision and planning
microservices that can be deployed
on-premise within a customer’s data
center, or as containerized services
on Red Hat OpenShift Container
Platform. Red Hat OpenShift
enables customers to enhance
business value and accelerate
digital innovation for their process-
driven applications using DevOps
capabilities such as automated
testing and continuous integration
and delivery (CI/CD), and to govern
them using practices designed to
provide greater security, scalability
and interoperability.
Red Hat Decision Manager
is available for download by
members of the Red Hat Developers
community. Customers can get the
latest updates from the Red Hat
Customer Portal.
Mike Piech, Vice President and
General Manager, Middleware,
Red Hat, said, “The notion of
low-code development is less
about eliminating code or cutting
traditional programmers out of the
application development process,
and more about helping business
and IT users to do what they need to
do quickly and efficiently, and in a
complementary manner. Ultimately,
what low-code tools should offer,
and what we have built with Red Hat
Decision Manager, is not a platform
geared toward one or the other, but
rather a rich and tightly integrated
feature set designed to provide a
better user experience regardless of
whether you are a business analyst
or hard-core developer.”
Fortinet has announced at
its global partner and user
conference, Accelerate 18, the
evolution of its Security Fabric
architecture with the release of
FortiOS 6.0.
Michael Xie, Founder,
President and Chief Technology
Officer, Fortinet, said, “As the
speed and scale of cyber threats
expands, security must take on its
own transformation by integrating
into all areas of digital technology
and be able to translate user intent
into automated business response.
FortiOS 6.0 delivers new
capabilities that were designed
to provide the broad visibility,
integrated threat intelligence and
automated response required for
digital business.”
With more than 200 new
features and capabilities,
Fortinet announced FortiOS 6.0
The firm delivers third generation of network security with the evolution of its Security Fabric
security capabilities across the
key solution areas within its
Security Fabric architecture,
including management and
analytics, multi-cloud, network,
advanced threat protection,
unified access, web applications,
email, IoT and endpoint security.
Industry-leading secure SD-
WAN functionality, threat
detection services, and expanded
visibility from IoT to multi-cloud
networks protect the vast attack
surface resulting from digital
transformation (DX) strategies.
The Fortinet Security
Fabric is an integrated and
automated security framework
designed to protect today’s
dynamic networks, said the
firm. It provides the broad
visibility, integrated detection
of advanced threats, and
automated response, combined
with the continuous trust
assessment required to secure
today’s digital business. FortiOS
6.0 is available in Q1 2018
As the speed and scale of cyber threats
expands, security must take on its own
transformation by integrating into all areas of
digital technology.”
Michael Xie, Fortinet
Mike Piech, Red Hat
enterprises will benefit from
new levels of security operations
automation and advanced
protections for their expanding
digital attack surfaces.
Fortinet introduces new
For more information, please write to sales.value@redingtonmea.com
VJ March 2018.indd 10 3/11/18 10:02 AM
Brought to you by HPE & Intel®
. Intel Inside®
. Powerful Productivity Outside.
*HPE internal testing on StoreVirtual VSA software-defined storage, February 16, 2016. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. © 2016 HPED LP.
IT resiliency and security for everyone.
Keep your business moving forward with secure, right-sized networking, servers, and storage
from Hewlett Packard Enterprise. If disaster strikes, minimize disruption with powerful backup
and recovery that delivers 99.999%* continuous data availability. See how easy it is to make
uptime a key advantage.
HPE Just Right IT for any size business.
Stu & Mitch
IT Team of Two
Retailer
198 Employees
Technology:
HPE Aruba Access Points and Switches HPE
StoreVirtual
HPE ProLiant Servers
VJ March 2018.indd 11 3/11/18 10:02 AM
VJ March 2018.indd 12 3/11/18 10:03 AM

Weitere ähnliche Inhalte

Was ist angesagt?

Change the Game
Change the GameChange the Game
Change the Gameaccenture
 
Thrive with accenture product and platform engineering services
Thrive with accenture product and platform engineering servicesThrive with accenture product and platform engineering services
Thrive with accenture product and platform engineering servicesAccenture Technology
 
The Industrialist: Trends & innovations - Aug 2021
The Industrialist: Trends & innovations - Aug 2021The Industrialist: Trends & innovations - Aug 2021
The Industrialist: Trends & innovations - Aug 2021accenture
 
Gcr featured in Bisinfotech Magazine, August 2018
Gcr featured in Bisinfotech Magazine, August 2018Gcr featured in Bisinfotech Magazine, August 2018
Gcr featured in Bisinfotech Magazine, August 2018GCR India
 
Gartner Webinars: Top 5 Post-COVID Workforce Planning
Gartner Webinars: Top 5 Post-COVID Workforce Planning Gartner Webinars: Top 5 Post-COVID Workforce Planning
Gartner Webinars: Top 5 Post-COVID Workforce Planning Rustin Richburg
 
7 ways to drive Digital Transformation
7 ways to drive Digital Transformation7 ways to drive Digital Transformation
7 ways to drive Digital TransformationJonathan Beardsley
 
The Industrialist: Trends and Innovations That Matter - July 2021
The Industrialist: Trends and Innovations That Matter - July 2021The Industrialist: Trends and Innovations That Matter - July 2021
The Industrialist: Trends and Innovations That Matter - July 2021accenture
 
TBytes Agile & AI Operations
TBytes Agile & AI OperationsTBytes Agile & AI Operations
TBytes Agile & AI OperationsEGBG Services
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Codit
 
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...Amazon Web Services
 
Tech Vision 2021: The Analytics Angle with SAS | Overview
Tech Vision 2021: The Analytics Angle with SAS | OverviewTech Vision 2021: The Analytics Angle with SAS | Overview
Tech Vision 2021: The Analytics Angle with SAS | Overviewaccenture
 
The Industrialist: Sparks
The Industrialist: SparksThe Industrialist: Sparks
The Industrialist: Sparksaccenture
 
Accenture SaaS Reference - FullForce Solution
Accenture SaaS Reference - FullForce SolutionAccenture SaaS Reference - FullForce Solution
Accenture SaaS Reference - FullForce SolutionTarik Schmidt
 
How To Improve Processes 25% to 10x With RPA & Workflow - CRE8 Independent Co...
How To Improve Processes 25% to 10x With RPA & Workflow - CRE8 Independent Co...How To Improve Processes 25% to 10x With RPA & Workflow - CRE8 Independent Co...
How To Improve Processes 25% to 10x With RPA & Workflow - CRE8 Independent Co...George Dunn
 
Driving change, leading with the SAP®ecosystem
Driving change, leading with the SAP®ecosystemDriving change, leading with the SAP®ecosystem
Driving change, leading with the SAP®ecosystemaccenture
 
Technology Vision for Insurance 2020
Technology Vision for Insurance 2020Technology Vision for Insurance 2020
Technology Vision for Insurance 2020Accenture Insurance
 

Was ist angesagt? (20)

Change the Game
Change the GameChange the Game
Change the Game
 
Redington Value Journal - August 2017
Redington Value Journal - August 2017Redington Value Journal - August 2017
Redington Value Journal - August 2017
 
Thrive with accenture product and platform engineering services
Thrive with accenture product and platform engineering servicesThrive with accenture product and platform engineering services
Thrive with accenture product and platform engineering services
 
The Industrialist: Trends & innovations - Aug 2021
The Industrialist: Trends & innovations - Aug 2021The Industrialist: Trends & innovations - Aug 2021
The Industrialist: Trends & innovations - Aug 2021
 
Gcr featured in Bisinfotech Magazine, August 2018
Gcr featured in Bisinfotech Magazine, August 2018Gcr featured in Bisinfotech Magazine, August 2018
Gcr featured in Bisinfotech Magazine, August 2018
 
Gartner Webinars: Top 5 Post-COVID Workforce Planning
Gartner Webinars: Top 5 Post-COVID Workforce Planning Gartner Webinars: Top 5 Post-COVID Workforce Planning
Gartner Webinars: Top 5 Post-COVID Workforce Planning
 
7 ways to drive Digital Transformation
7 ways to drive Digital Transformation7 ways to drive Digital Transformation
7 ways to drive Digital Transformation
 
Urbanclap clone
Urbanclap cloneUrbanclap clone
Urbanclap clone
 
The Industrialist: Trends and Innovations That Matter - July 2021
The Industrialist: Trends and Innovations That Matter - July 2021The Industrialist: Trends and Innovations That Matter - July 2021
The Industrialist: Trends and Innovations That Matter - July 2021
 
TBytes Agile & AI Operations
TBytes Agile & AI OperationsTBytes Agile & AI Operations
TBytes Agile & AI Operations
 
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)
 
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
AWS Summit Singapore - Building DXC's Digital Insurance as a Service (DIaaS) ...
 
Tech Vision 2021: The Analytics Angle with SAS | Overview
Tech Vision 2021: The Analytics Angle with SAS | OverviewTech Vision 2021: The Analytics Angle with SAS | Overview
Tech Vision 2021: The Analytics Angle with SAS | Overview
 
Highlights on the five key trends
Highlights on the five key trendsHighlights on the five key trends
Highlights on the five key trends
 
The Industrialist: Sparks
The Industrialist: SparksThe Industrialist: Sparks
The Industrialist: Sparks
 
Accenture SaaS Reference - FullForce Solution
Accenture SaaS Reference - FullForce SolutionAccenture SaaS Reference - FullForce Solution
Accenture SaaS Reference - FullForce Solution
 
How To Improve Processes 25% to 10x With RPA & Workflow - CRE8 Independent Co...
How To Improve Processes 25% to 10x With RPA & Workflow - CRE8 Independent Co...How To Improve Processes 25% to 10x With RPA & Workflow - CRE8 Independent Co...
How To Improve Processes 25% to 10x With RPA & Workflow - CRE8 Independent Co...
 
Driving change, leading with the SAP®ecosystem
Driving change, leading with the SAP®ecosystemDriving change, leading with the SAP®ecosystem
Driving change, leading with the SAP®ecosystem
 
Accenture and Mercedes Case Study
Accenture and Mercedes Case StudyAccenture and Mercedes Case Study
Accenture and Mercedes Case Study
 
Technology Vision for Insurance 2020
Technology Vision for Insurance 2020Technology Vision for Insurance 2020
Technology Vision for Insurance 2020
 

Ähnlich wie Redington Value Journal - March 2018

Business in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology TrendsBusiness in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology TrendsSoftClouds LLC
 
Network security solutions and services selling
Network security solutions and  services sellingNetwork security solutions and  services selling
Network security solutions and services sellingALEX CHANG
 
T-Byte Digital Customer Experience July 2021
T-Byte Digital Customer Experience July 2021T-Byte Digital Customer Experience July 2021
T-Byte Digital Customer Experience July 2021EGBG Services
 

Ähnlich wie Redington Value Journal - March 2018 (20)

Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
 
Value Journal - April-May 2021
Value Journal - April-May 2021 Value Journal - April-May 2021
Value Journal - April-May 2021
 
Redington Value Journal - June 2017
Redington Value Journal - June 2017Redington Value Journal - June 2017
Redington Value Journal - June 2017
 
Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
 
Redington Value Journal - July 2019
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
 
Redington Value Journal - February 2018
Redington Value Journal - February 2018Redington Value Journal - February 2018
Redington Value Journal - February 2018
 
Redington Value Journal - June 2016
Redington Value Journal - June 2016Redington Value Journal - June 2016
Redington Value Journal - June 2016
 
Redington Value Journal - April 2019
Redington Value Journal - April 2019Redington Value Journal - April 2019
Redington Value Journal - April 2019
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
Business in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology TrendsBusiness in 2020 and the Top Technology Trends
Business in 2020 and the Top Technology Trends
 
Redington Value Journal - November 2016
Redington Value Journal - November 2016Redington Value Journal - November 2016
Redington Value Journal - November 2016
 
Redington Value Journal - June 2019
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
The Value Plus Magazine - October GITEX Issue
The Value Plus Magazine - October GITEX IssueThe Value Plus Magazine - October GITEX Issue
The Value Plus Magazine - October GITEX Issue
 
Network security solutions and services selling
Network security solutions and  services sellingNetwork security solutions and  services selling
Network security solutions and services selling
 
T-Byte Digital Customer Experience July 2021
T-Byte Digital Customer Experience July 2021T-Byte Digital Customer Experience July 2021
T-Byte Digital Customer Experience July 2021
 
Redington Value Journal - December 2017
Redington Value Journal - December 2017Redington Value Journal - December 2017
Redington Value Journal - December 2017
 
The 20 most valuable it solution provider companies
The 20 most valuable it solution provider companiesThe 20 most valuable it solution provider companies
The 20 most valuable it solution provider companies
 
Redington Value Journal - December 2016
Redington Value Journal - December 2016Redington Value Journal - December 2016
Redington Value Journal - December 2016
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
 

Mehr von Redington Value Distribution

Mehr von Redington Value Distribution (20)

Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
 
Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
 
Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
 
Value journal September_2019
Value journal September_2019 Value journal September_2019
Value journal September_2019
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Redington Value Journal - March 2019
Redington Value Journal - March 2019Redington Value Journal - March 2019
Redington Value Journal - March 2019
 
Redington Value Journal - January 2019
Redington Value Journal - January 2019Redington Value Journal - January 2019
Redington Value Journal - January 2019
 
Redington Value Journal - November 2018
Redington Value Journal - November 2018Redington Value Journal - November 2018
Redington Value Journal - November 2018
 

Kürzlich hochgeladen

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Kürzlich hochgeladen (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Redington Value Journal - March 2018

  • 1. deliver maximum performance, high availability, and secure enterprise IT systems. In addition, to accelerate innovation Issue 20 // March 2018 Celebrating its 25th year, the distributor has unveiled a new logo and tagline. REDINGTON REVEALS NEW GLOBAL LOOK Continued on page 3 Continued on page 3 services, Oracle is setting a new industry standard for autonomous cloud capabilities. The firm is applying AI and machine learning to its entire next-generation Cloud Platform services to help customers lower cost, reduce risk, accelerate innovation, and get predictive insights. As organizations focus on delivering innovation fast, they want a secure set of comprehensive, integrated cloud services to build new applications and run their most demanding enterprise workloads. Oracle’s cloud services can automate key operational functions like tuning, patching, backups and upgrades while running to Oracle President of Product Development Thomas Kurian demonstrated the latest advances in its Cloud Platform, expanding its Cloud Platform Autonomous Services beyond the Oracle Autonomous Database, to make its Cloud Platform services self-driving, self-securing and self-repairing. With its enhanced suite of autonomous Cloud Platform Oracle demonstrates advances in autonomous cloudSelf-driving services use AI and machine learning to help organizations lower cost, reduce risk, accelerate innovation, and get predictive insights Redington Value is a value added distributor for the following brands in parts of Middle East & Africa: Redington, the $6 billion distribution and supply chain provider for international brands in the IT and mobility sectors, has unveiled its new global brand identity – a new logo and tagline – ‘Seamless Partnerships’. According to the firm, as it steps into its 25th year since inception, the new branding builds on Redington’s well-established reputation in the industry. The new brand identity reflects the core values of Redington as a contemporary and innovative company, which has developed its messaging strategy to reflect its evolution as a brand and its global role as one of the largest provider in the supply-chain solution industry. The distributor said that the new logo and tagline epitomizes the new direction that the company would like to take in the years to come. Redington’s Managing Director, Raj Shankar, said, “I am proud to launch our rejuvenated brand and visual identity that For more information, please write to sales.value@redingtonmea.com VJ March 2018.indd 1 3/11/18 10:02 AM
  • 2. VJ March 2018.indd 2 3/11/18 10:02 AM
  • 3. 3 Huawei unveils new solutions at Mobile World Congress 2018 The new offerings include Intent-Driven Network and AUTIN Automation and Intelligence solutions. At Mobile World Congress (MWC) 2018, Huawei launched over 20 new products, among those are the Intent-Driven Network and AUTIN Automation and Intelligence solutions. The Intent-Driven Network will bridge the gaps between the physical network and business goals by creating a digital twin of the network infrastructure. These technologies will enable software- defined networks (SDNs) to evolve into intent-driven networks, and maximize business value. Making use of cloud, big data, and artificial intelligence (AI) technologies, Huawei has launched the Intent-Driven Network solution to deliver networks driven by business logic and service strategies based around end user experience. They are user- centric networks, incorporating intelligence, simplicity, ultra- broadband, security, and openness. Kevin Hu, President, Huawei Network Product Line, said, “Intent-Driven Networks can accurately read a user’s intention, and make it happen, because network configuration is automated from end to end. These networks can also sense the quality of the user experience in real time, and perform predictive analysis so that they can proactively optimize performance.” He added, “The Intent-Driven Network solution will usher in a new era of network evolution. It will be extensively used in both the enterprise and carrier sectors. The march toward autonomous networks will help us embrace the intelligent era.” The second solution launched at MWC 2018 is AUTIN, which is an Operations Consulting and Software as a Service (SaaS) solution for Digitized Operations Services which helps operators manage complex hybrid ICT environments. AUTIN delivers AUTomation and INtelligence to modernize and reshape operations for the digital era. Building on its award-winning Operation Web Services (OWS), Huawei’s new AUTIN brand is introducing new functionality and machine learning for intelligent operations. AUTIN leverages big data and AI to help operators move from a reactive to more proactive and predictive operations. The solution is vendor and technology agnostic and can manage multiple technologies and services in a constantly changing environment. From page 1From page 1 Oracle demonstrates...Redington... The economies of West African (WA) countries have recovered to a fair bit over the last two years. One of the main growth drivers is the rapid technology adoption rates in the region. Factors such as stable exchange rate, increase in oil prices and availability of US dollars have further contributed to the increasing receptiveness of technology in the WA markets. High-speed and affordable internet coupled with steep increase in mobile users have driven implementation of several large- scale government projects. Internet of Things (IoT) technology is also seeing a swift growth in the region. Regional governments are now emphasizing on the need for digital processes to control, not only corruption but to provide ease-of- life to citizens. Redington’s approach continues to be solutions-centric rather than a product-centric one. We have played a significant role in supporting our partners to help them structure their deals with financing tools, which have helped them win big contracts. Partners should look at investing in technologies such as infrastructure modernization, cloud, cybersecurity and advance analytics to be successful. Early movers to new technologies will reap the benefits quicker. Our endeavor continues to be enabling partners and aid them to add value to their customers. Redington will play a vital role in this market for the years to come and we look forward to winning together with our partners. Enabling partners By Sunil Zarekar, Regional Sales Manager, West Africa, Redington Gulf - Value Division COLUMN: REDefined fully reflects what we stand for as an organization. This is not a mere change of brand identity but a coming of age for Redington, a transformation that the company is engineering to take it to the next level. The new identity carries forward our core values on which our company is built – adaptability, collaboration, know-how, objectivity, simplicity, transparency and trust. We look to expand our horizons from being a ‘Brand behind brands’ to a platform that enables ‘Seamless partnerships’.” He added that Redington is committed to do everything to achieve its ultimate goal of being the preferred company for connecting buyers and sellers. and smarter decision-making, Oracle Cloud Platform is incorporating additional autonomous capabilities specific to application development, mobile and bots, app and data integration, analytics, security and management. “The future of tomorrow’s successful enterprise IT organization is in full end-to- end automation,” said Kurian. “At Oracle, we are making this a reality. We are weaving autonomous capabilities into the fabric of our cloud to help customers safeguard their systems, drive innovation faster, and deliver the ultimate competitive advantage with smarter real-time decisions.” In addition to the Oracle Autonomous Database, Oracle Cloud Platform autonomous capabilities for application development, mobile and bots, integration, analytics, security and system management, are scheduled to be available in the first half of calendar year 2018. Oracle also demonstrated a single Oracle Digital Assistant for users to interact across the firm’s SaaS and PaaS services including analytics. Oracle Digital Assistant provides centralized connection for the user to converse across the user’s CRM, ERP, HCM, custom applications and business intelligence data and uses AI to intelligently correlate data and automate user behavior. Kevin Hu, Huawei For more information, please write to sales.value@redingtonmea.com VJ March 2018.indd 3 3/11/18 10:02 AM
  • 4. 4 Cybersecurity vendor for phishing readiness and security awareness automation PhishRod has signed up with Redington Gulf to be its authorized distributor across Middle East and North Africa region. The partnership is aimed to leverage the strong footprint and experience of Redington Gulf in value distribution coupled with solutions from PhishRod for phishing readiness, security awareness and advisory management, said the company. Ali Abid, Chief Commercial Officer, PhishRod said, “Despite having the most complex and advance technology based solutions in place, organizations keep suffering from cyber-attacks. It’s simply because that the hackers Dell EMC has expanded its converged infrastructure (CI) system with the addition of the next generation Dell EMC VxBlock System 1000. The new system breaks the physical boundaries of traditional CI and offers enterprises even greater simplicity and flexibility to help accelerate their IT and digital transformation efforts, said the firm. Designed to support workloads of all types, the VxBlock 1000 includes a substantially broader choice of storage arrays, data protection and compute than has the right mix and capacity of IT resources and data services that evolving applications require, but with pooled resources, so the data center is more efficient even as workload requirements change. We offer this with a focus on reducing administrative burden for IT teams under constant pressure to deliver more with less.” The VxBlock 1000 builds on Dell EMC’s industry leadership in CI with a host of new capabilities. These help enterprises reap greater benefits than ever before from a wider breadth of technologies than previously supported. These are in addition to traditional CI advantages such as lower operating expenses and a five-year return on investment of up to 640 percent. Compared to previous generation Dell EMC VxBlock Systems, the VxBlock Dell EMC expands converged infrastructure portfolio Designed to support workloads of all types, the VxBlock 1000 includes a substantially broader choice of storage arrays, data protection and compute than previous-generations. 1000 offers improved business agility, data center efficiency and operational simplicity. The Dell EMC VxBlock 1000 is available globally via Dell EMC and its channel partners. previous-generation VxBlock Systems. This new system’s all-in- one, multiple-technology design expands upon CI’s promise by further simplifying IT infrastructure lifecycle management through extensive pre-validation, according to the company. “When customers deploy CI, what they are really looking to do is invest in technology that removes data center cost while, ultimately, improving outcomes,” said Jeff Boudreau, President, Dell EMC Storage Division. “Our role is to deliver CI innovation that Redington Value onboards cybersecurity vendor PhishRod The partnership will extend across the Middle East and North Africa region. now target the end-users. Socially engineered attacks such as phishing are becoming the most widely used mechanism to drop malwares.” He added that in the current threat landscape, technology and process are important but no cybersecurity strategy would be a success without engaging the end-users. “We are extremely excited to announce this partnership with Redington to achieve our common goal that is to prepare end-users to take on the fight against cyber-attacks.” According to the company, PhishRod helps organizations to identify vulnerable end-users and automates the entire cybersecurity awareness program. PhishRod suit comes with PhishRod Simulator to identify vulnerable end-users and determine phishing index of an enterprise. PhishRod Security Awareness Manager is a complete solution for analytics and KPI driven cybersecurity awareness across the organization while the PhishRod Advisory Manager helps to cascade the threat intelligence to the end-user level using the PhishRod Reporter. PhishRod supports both English and Arabic language for security awareness and comes with both on premise and cloud-based solution. Ramkumar Balakrishnan, President, Redington Value Distribution said, “Analytics driven phishing readiness and cybersecurity awareness is a high growth area in cybersecurity. We are glad that we have PhishRod onboard now that covers the people part of cybersecurity strategy from a 360-degree perspective. We are looking forward to work very closely with PhishRod to expand this portfolio across the Middle East and North Africa region.” Jeff Boudreau, Dell EMC Ramkumar Balakrishnan, Redington Value Distribution Our role is to deliver CI innovation that has the right mix and capacity of IT resources and data services that evolving applications require, but with pooled resources, so the data center is more efficient.” For more information, please write to sales.value@redingtonmea.com VJ March 2018.indd 4 3/11/18 10:02 AM
  • 5. 555 SonicWall has revealed that a new Capture Cloud engine has discovered hundreds of new malware variants not seen before by sandboxing technology. Through the use of previously unannounced patent-pending technology, SonicWall Capture Labs security researchers SonicWall unveils new capture cloud engine SonicWall Capture Labs security researchers have engineered an advanced method for identifying and mitigating threats through deep memory inspection. engineered an advanced method for identifying and mitigating threats through deep memory inspection — all in real time, said the firm. “Threat actors have been so far ahead of the game they’ve been able to create highly evasive malware without the greater industry even knowing,” said SonicWall President and CEO Bill Conner. “This new real-time deep memory inspection technology (RTDMI), coupled with more than a decade of machine-learning experience, will help level the playing field and eliminate some of the most challenging attack vectors. The new engine is the latest addition to our Capture Cloud Platform that reinforces our leadership position.” via deep memory inspection in real time. It detects and blocks malware that does not exhibit any malicious behavior and hides its weaponry via custom encryption. It forces malware to “reveal” its weaponry into memory. It identifies and mitigates sophisticated attacks where weaponry is exposed for less than 100 nanoseconds. SonicWall deployed the RTDMI engine into the SonicWall Capture Cloud Platform and is leveraging the technology to support SonicWall’s layered security platform, which includes next-generation firewalls, wireless network security, email security, secure mobile and remote access offerings, as well as cloud and IoT solutions. Operational for a while, the new SonicWall Capture Cloud Real-Time Deep Memory Inspection (RTDMI) technology and engine is discovering hundreds of malware strands not detected by sandboxing technology, said the firm. SonicWall said it is unveiling this new technology to strengthen the company’s automated real-time breach detection and prevention platform. SonicWall RTDMI is a patent-pending technology and process utilized by the SonicWall Capture Cloud to identify and mitigate even the most insidious modern threats, including future Meltdown exploits. The new RTDMI technology proactively detects and blocks unknown mass-market malware Nokia unveils new services to cater to the digital era OperatorscanwhitelabelManagedSecurityServicestoenterprisesundertheirownbrand,whichoffersrevenuepotentialinthe enterprisesecuritymarketandoptimizestimetomarket. assessing operators’ security risks across various security domains, benchmarking against industry peers, and providing a 360-degree gap analysis and suggestions for performance improvements. This is the essence of the Security Risk Index, said the firm. After the assessment, a managed service, powered by Nokia NetGuard software, will complete the holistic security approach. Nokia experts design the network security infrastructure, information management and monitoring systems to ensure that critical information assets are adequately protected against known and unknown threats, and that the operator meets applicable security compliance standards and regulations. Having secured their own networks, operators can go on to offer the Managed Security Services, or selected elements of it, to their enterprise customers. In partnership with Nokia, operators can implement a security portfolio to open a new revenue source and increase customer loyalty. “Operators must be prepared for a security breach. A dynamic, managed security proposition is needed to eliminate possible threats, so we are taking a comprehensive approach to security from assessing risks to managing and maintaining our customers’ security infrastructure,” said Friedrich Trawoeger, Head of Managed Services, Nokia. “This is the best approach to defend against attacks. In addition, the resale white label model will allow our customers to monetize the security opportunity.” The company said that its security services also utilize Nokia NetGuard, a portfolio of end-to- end software solutions that detect, prevent and mitigate cyber- attacks by securing traditional and cloud-based network architectures and protecting end- users and IoT devices. To address rising security threats to telecom networks, Nokia has launched its Security Risk Index assessment service and Managed Security Service. According to the firm, together, they form a “unique, holistic approach” to targeting security challenges across mobile, IP and fixed networks in the digital transformation era, when new services and virtualized systems also introduce new vulnerabilities. In addition to addressing their own security needs, operators can white label Managed Security Services to enterprises under their own brand, which offers revenue potential in the enterprise security market and optimizes time to market, according to Nokia. Nokia is offering an integrated approach that starts from Bill Conner, SonicWall Operators must be prepared for a security breach. A dynamic, managed security proposition is needed to eliminate possible threats.” For more information, please write to sales.value@redingtonmea.com VJ March 2018.indd 5 3/11/18 10:02 AM
  • 6. VJ March 2018.indd 6 3/11/18 10:02 AM
  • 7. 7 EVENTS Cisco - Partner Enablement on C-Space product & Market positioning - Kenya - 21 February Fortinet - Partner Workshop With Africa Neurotech - Kenya - 23 February Splunk4Rookies - Riyadh - 4 February Veritas - Partner Enablement Session Kenya - 22 February Dell EMC - Partner Enablement Session - Kenya - 22 February Dell EMC - Partner Enablement Session - Tanzania - 20 February Cisco - Security Workshop - Kenya - 8 February Oracle - Partner Hub Launch Event - Kenya - 21 February AVAYA Partner Technincal Session- 14 February - Riyadh Check Point CSSA Workshop - Qatar - 18-20 February Dell EMC - Partner Enablement Session Ethiopia - 13 February Red Hat - End Customer Event With Adex Technology - Algeria - 6 February Fortinet & Bahwan IT Security Seminar - Oman - 19 February ARUBA RED Techtalk -14 February - Riyadh For more information, please write to sales.value@redingtonmea.com VJ March 2018.indd 7 3/11/18 10:02 AM
  • 8. 8 Fortinet FortiMail Workshop - Kuwait - 19-20 February Fujitsu Partner Enablement Session Dubai - 6 February Jellyfish Exclusive Seminar with B Infosec - Bahrain - 6 February Microsoft Azure Incubation Training - 7 February - Riyadh Fortinet SMB Workshop - Kuwait - 11 February Huawei GPON Post Sales Workshop with Ensure Services - Dubai - 20-22 February Microsoft Azure Roundtable - Qatar - 7 February Red Hat Technical Workshop - Dubai - 5 February Sage VAT Enablement Session - Dubai - 1 February Microsoft Partner Roundtable - Oman - 21 February Journey to Automation - Red Hat and GBM Roundtable Seminar - Oman - 19 February AVAYA Partner Tech Session - 7 February - Riyadh Fortinet SMB Workshop - Qatar - 5 February Rising towards the Cloud with Oracle IaaS and PaaS with Partner iApps - Dubai - 13 February PhishRod Partner Enablement Session - Dubai - 14 February Red hat Customer Event - 6 February - Riyadh Mimecast Partner Enablement Session - Dubai - 25 February Fortinet Partner Tech Session -14 February - Riyadh For more information, please write to sales.value@redingtonmea.com VJ March 2018.indd 8 3/11/18 10:02 AM
  • 9. VJ March 2018.indd 9 3/11/18 10:02 AM
  • 10. 10 Red Hat Decision Manager 7 is designed to enable organizations to quickly build applications that automate business decisions. Red Hat has introduced Red Hat Decision Manager 7, a decision management platform that simplifies the development and deployment of rules-based applications and services. Red Hat Decision Manager 7 is the next generation of the company’s business rules management offering, Red Hat JBoss BRMS, and is designed to enable organizations to quickly build applications that automate business decisions. Low-code development tools such as Red Hat Decision Manager enable business users to take a more active role in application development, and by fostering greater collaboration between business and IT stakeholders, can accelerate the application development process. Red Hat unveils decision management offering Red Hat Decision Manager 7 delivers an improved user experience and a more robust set of tools specifically designed to enable business users and citizen developers to directly modify business logic, which can help IT re-prioritize resources to support other tasks. Feature highlights include support for the direct execution of models expressed in Decision Model and Notation (DMN); redesigned decision tables and a new decision table editor; and an improved data modeller. Built for both traditional and cloud-native applications, the offering can be used to create rules-based decision and planning microservices that can be deployed on-premise within a customer’s data center, or as containerized services on Red Hat OpenShift Container Platform. Red Hat OpenShift enables customers to enhance business value and accelerate digital innovation for their process- driven applications using DevOps capabilities such as automated testing and continuous integration and delivery (CI/CD), and to govern them using practices designed to provide greater security, scalability and interoperability. Red Hat Decision Manager is available for download by members of the Red Hat Developers community. Customers can get the latest updates from the Red Hat Customer Portal. Mike Piech, Vice President and General Manager, Middleware, Red Hat, said, “The notion of low-code development is less about eliminating code or cutting traditional programmers out of the application development process, and more about helping business and IT users to do what they need to do quickly and efficiently, and in a complementary manner. Ultimately, what low-code tools should offer, and what we have built with Red Hat Decision Manager, is not a platform geared toward one or the other, but rather a rich and tightly integrated feature set designed to provide a better user experience regardless of whether you are a business analyst or hard-core developer.” Fortinet has announced at its global partner and user conference, Accelerate 18, the evolution of its Security Fabric architecture with the release of FortiOS 6.0. Michael Xie, Founder, President and Chief Technology Officer, Fortinet, said, “As the speed and scale of cyber threats expands, security must take on its own transformation by integrating into all areas of digital technology and be able to translate user intent into automated business response. FortiOS 6.0 delivers new capabilities that were designed to provide the broad visibility, integrated threat intelligence and automated response required for digital business.” With more than 200 new features and capabilities, Fortinet announced FortiOS 6.0 The firm delivers third generation of network security with the evolution of its Security Fabric security capabilities across the key solution areas within its Security Fabric architecture, including management and analytics, multi-cloud, network, advanced threat protection, unified access, web applications, email, IoT and endpoint security. Industry-leading secure SD- WAN functionality, threat detection services, and expanded visibility from IoT to multi-cloud networks protect the vast attack surface resulting from digital transformation (DX) strategies. The Fortinet Security Fabric is an integrated and automated security framework designed to protect today’s dynamic networks, said the firm. It provides the broad visibility, integrated detection of advanced threats, and automated response, combined with the continuous trust assessment required to secure today’s digital business. FortiOS 6.0 is available in Q1 2018 As the speed and scale of cyber threats expands, security must take on its own transformation by integrating into all areas of digital technology.” Michael Xie, Fortinet Mike Piech, Red Hat enterprises will benefit from new levels of security operations automation and advanced protections for their expanding digital attack surfaces. Fortinet introduces new For more information, please write to sales.value@redingtonmea.com VJ March 2018.indd 10 3/11/18 10:02 AM
  • 11. Brought to you by HPE & Intel® . Intel Inside® . Powerful Productivity Outside. *HPE internal testing on StoreVirtual VSA software-defined storage, February 16, 2016. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. © 2016 HPED LP. IT resiliency and security for everyone. Keep your business moving forward with secure, right-sized networking, servers, and storage from Hewlett Packard Enterprise. If disaster strikes, minimize disruption with powerful backup and recovery that delivers 99.999%* continuous data availability. See how easy it is to make uptime a key advantage. HPE Just Right IT for any size business. Stu & Mitch IT Team of Two Retailer 198 Employees Technology: HPE Aruba Access Points and Switches HPE StoreVirtual HPE ProLiant Servers VJ March 2018.indd 11 3/11/18 10:02 AM
  • 12. VJ March 2018.indd 12 3/11/18 10:03 AM