8
60 Mins Show dates: 9-13 October 2011, Dubai World Trade Centre | AT GITEX TECHNOLOGY WEEK | Exhibition hours: 10am - 5pm We are showcasing our latest reknowned ultra short throw products which form part of the Ultimate range, including our brand new interactive short throw for corporate applications, the BZ-1M which is an intuitive, easy to use tool to enhance collaboration in meetings and presentations. In addition, we will have networking with Crestron demos available on demand and a first look at some of our brand new chasses. We also want to show our latest technolgy in projectors to our regular business partners, prospective new partners and, of cours, to the customers. Arman Khan, Regional Manager B2B, Hitachi Europe Largest-ever presence from Avaya Visitors to this year’s GITEX are among the first in the region to experience Avaya’s newest and most advanced solutions for contact centres, unified communications, and networking. Avaya has increased its GITEX participation for 2011 by more than 50%, creating the largest-ever Avaya presence at the exhibition and enabling visitors to view and trial Avaya’s business solutions. WHAT’S INSIDE WatchGuard reports 20% growth @cpiatgitex FOLLOW US Strategic ICT Partner Visit us at Gitex: Zabeel Hall ZL-C5 and Z-C10 Our partners: Adding value to your business www.almasa.com Technology Partners 4 CONTINUED ON PAGE 3 Security player WatchGuard reports a 20% growth in their Middle East business. Virtualisation solutions at Aptec stand Veeam Software, provider of VMware data protection, disaster recovery and VMware management solutions for virtual data centre environments, is exhibiting for the first time at GITEX, on the Aptec sxtand. Mixed reality unveiled my Infocomm Nidal Abou-Latif, Vice President, emerg- ing Markets, Avaya “We see the Middle East to be an exceptionally strong market for vendors like WatchGuard, as mainstream businesses look to boost their security position. The IT spend for security is constantly increasing, and the integrated security appliance market (UTMs) has grown around 14%..” Eric Aarrestad, Vice President of Marketing, WatchGuard Partnering with Emirates NBD, Avaya will display at the stand one of the Middle East’s first-ever video contact centre ATMs, which allows direct contact with an agent via video and also will highlight its newest contact centre offerings, The Avaya Aura-based contact centres enable organisations to offer their customers a diversity of choice in AM

60mins Day 2 - 11am

Embed Size (px)

DESCRIPTION

60 Minutes is the only publication offering up to date news on what is happening across GITEX and updating visitors on the latest happenings. It will be distributed across all the show halls via CPI stands and distribution points as well as via partner stands within the halls themselves. Covering all the show elements GITEX Business solutions, Gulf Comms, Consumer Technology & Infocomm each with their own section you can ensure you promote your stand location to the correct audience. Interviews with your key personnel will be carried both in the print edition as well as being uploaded on to our supporting website www.cpiatgitex.com.

Citation preview

60 MinsShow dates: 9-13 October 2011, Dubai World Trade Centre | AT GITEX TECHNOLOGY WEEK | Exhibition hours: 10am - 5pm

We are showcasing our latest reknowned ultra short throw products which form part of the Ultimate range, including our brand new interactive short throw for corporate applications, the BZ-1M which is an intuitive, easy to use tool to enhance collaboration in meetings and presentations. In addition, we will have networking with Crestron demos available on demand and a first look at some of our brand new chasses. We also want to show our latest technolgy in projectors to our regular business partners, prospective new partners and, of cours, to the customers.Arman Khan, Regional Manager B2B, Hitachi Europe

Largest-ever presence from Avaya Visitors to this year’s GITEX are among the first in the region to experience Avaya’s newest and most advanced solutions for contact centres, unified communications, and networking.

Avaya has increased its GITEX participation for 2011 by more than 50%, creating the largest-ever Avaya presence at the exhibition and enabling visitors to view and trial Avaya’s business solutions.

WHAT’S INSIDE

WatchGuard reports 20% growth

@cpiatgitexFOLLOW US

Strategic ICT Partner

Visit us at Gitex: Zabeel Hall ZL-C5 and Z-C10

Our partners:

Adding value to your business

www.almasa.com

Technology Partners

4 CONTINUED ON PAGE 3

Security player WatchGuard reports a 20% growth in their Middle East business.

Virtualisation solutions at Aptec standVeeam Software, provider of VMware data protection, disaster recovery and VMware management solutions for virtual data centre environments, is exhibiting for the first time at GITEX, on the Aptec sxtand.

Mixed reality unveiled

my Infocomm

Nidal Abou-Latif, Vice President, emerg-ing Markets, Avaya

“We see the Middle East to be an exceptionally strong market for vendors like WatchGuard, as mainstream businesses look to boost their security position. The IT spend for security is constantly increasing, and the integrated security appliance market (UTMs) has grown around 14%..”Eric Aarrestad, Vice President of Marketing, WatchGuard

Partnering with Emirates NBD, Avaya will display at the stand one of the Middle East’s first-ever video contact centre ATMs, which allows direct contact with an agent via video and also will highlight its newest contact centre offerings, The Avaya Aura-based contact centres enable organisations to offer their customers a diversity of choice in

AM

P3@cpiatgitex

4 CONTINUED FROM PAGE 1

Largest-ever presence from Avaya

SonicWALL’s plans

“Key technology trends including virtualisation, cloud computing, Software as a Service (SaaS), mobile devices and, most particularly, Web 2.0 are changing the business world and making the security landscape far more complex than ever.”

my Gitex

Florian Malecki, Senior Product Mar-keting Manager – EMEA, SonicWALL

how they would like to communicate – including video, voice, Web, chat and e-mail.

Visitors are also able to see for themselves the opportunities Unified Communications can bring to an organisation. Avaya is showcasing its Flare technology at the booth. Across the Middle East, Avaya embraces the fact that customers are setting business communications trends through social media and handheld devices.

Also being showcased this year at Avaya’s stand is the VSP 9000. The Virtual Services Platform 9000 (VSP 9000) is a next-generation solution for mission-critical data centres and campus core networks, designed for the needs of large enterprises and other such as multi-tenant operators. The VSP 9000 easily and cost-effectively helps to facilitate services integration and offer a more agile virtual network infrastructure.

What is your primary objective of participating in Gitex 2011?SonicWALL’s main focus is to meet its existing and new enterprise customers and channel partners at the venue. GITEX is an effective platform to build business. The event is also a gathering place for all major players in ICT. It is a great way to assess the ICT needs of verticals, thereby assessing which markets SonicWALL can expand into as well as provide direction for next year’s product development. Product presentations and demonstration by key product managers is also part of the GITEX focus from our corporate office. We intend to achieve a successful communication of our new products and technologies to the potential end-customer and channel partners alongside signing new partnerships for newer products or in newer markets.

GITEX is a key event for SonicWALL in the region, therefore a few executives are also attending including Marvin Blough, (Vice President, Worldwide Sales).

Any new products and solutions this year?SonicWALL has a theme on Web 2.0, Mobility and SuperMassive. We are displaying all our product ranges, including the SuperMassive E10000 series and recently launched WAN Acceleration solution. We will have three presentations per day on the SuperMassive (Monday to Wednesday). We are also showcasing some state-of-the-art technologies and products such as SupperMassive, the fastest next generation firewall, WAN acceleration and optimisation and backup and recovery with enhanced feature set with flexible deployment options.

How is business generally?Kkey technology trends including virtualisation, cloud computing, Software as a Service (SaaS), mobile devices and, most particularly, Web 2.0 are changing the business world and making the security landscape far more complex than ever. Cyber-crime has become a more lucrative business than the global drug trade, and the threat of cyber-crime and

industrial espionage is now a reality. As a result, over the last 24 months, SonicWALL has seen a high level of demand for its market leader Next-Generation fsolutions.

WatchGuard reports 20% growthSecurity player WatchGuard reports a 20% growth in their Middle East business, with the regional market being one of their fastest growing segments over the past three years.

“For a long time, industry analysts have considered WatchGuard to be a top competitor in the UTM (unified threat management) market. This seems to resonate very well with our customers and channel partners in the region, where WatchGuard already works with an important number of small, medium and large enterprises in retail and hospitality, education, healthcare, finance, telecoms, government and oil and gas. We have witnessed above 20% growth in our business in the region and we expect this trend to continue well past 2012,” said Eric Aarrestad, Vice President of Marketing at WatchGuard.

The unprecedented increase in cybercrime around the world is forcing companies to prioritise their security investments. “We see the Middle East to be an exceptionally strong market for vendors like WatchGuard, as mainstream businesses look to boost their security position. The

P4 @cpiatgitex

Since our products are 100 % customisable, we hope to have the opportunity to meet system integrators and AV consultants with who we can work hand by hand in the development of their specific projects for meeting and conference rooms and reception and public areas in general. We are showing our latest generation of moving screens for table integration, as well as smart monitors to be integrated into walls and digital signage totems.

“We see the Middle East to be an exceptionally strong market for vendors like WatchGuard, as mainstream businesses look to boost their security position. The IT spend for security is constantly increasing, and the integrated security appliance market (UTMs) has grown around 14%..”

Montse Romero, International Sales, Arthur Holm

Eric Aarrestad, Vice President of Marketing, WatchGuard

Veeam Software, provider of VMware data protection, disaster recovery and VMware management solutions for virtual data centre environments, is exhibiting for the first time at GITEX, on the Aptec sxtand.

Veeam has brought a number of its firsts for the show, including Veeam Backup and Replication v6 with a support for Windows Server Hyper-V and Microsoft Hyper-V

Server, the leading data protection solution for virtual environments used with more than 1.5 million virtual machines (VMs) worldwide.

Being the first vendor who delivers the capabilities for image-based data protection that organizations have come to expect with traditional file-based backups, Veeam is taking virtual data protection to the next level. More than 25,000 customers

now use Veeam’s award-winning Backup and Replication to protect their mission-critical VMs. The total number of worldwide customers (for all products) now exceeds 30,000.

Veeam is aiming to expand to the Middle East market and has recently appointed a Regional Sales Manager, Gregg Petersen, for the region to drive regional growth.

Virtualisation solutions at Aptec stand

IT spend for security is constantly increasing, and the integrated security appliance market (UTMs) has grown around 14%.” he added Eric Aarrestad.

WatchGuard expects a great demand for security solutions in the region as businesses adopt the use of social media applications in their daily activities. “Probably the biggest technology development over the last year is related to how social media is making an

impact in the region. Social media applications, such as Facebook and Twitter, are extremely powerful, but also present a major risk to businesses for both security reasons, as well as for employee productivity. One of our recent technology developments, Application Control, allows businesses to harness the power of social media, without having to sacrifice security or productivity.”

Watchguard is showcasing its latest security solutions such as the new Apple iOS, Application Control, Reputation Enabled Defense and other security services. Since its expansion into the UAE market three years ago, GITEX has played a vital role in WatchGuard success in the region.

my Infocomm

With thoughts of Steve Jobs.

“Think different”

P5@cpiatgitex

Paramount – The regional leader in Information Security

www.paramountassure.com

Suite 102, Building No 1, Dubai Internet City

P.O Box 25703,Dubai, UAETel: 971-4-3918600

Email: [email protected]

Network security essentials

Network security problems are part of daily IT life these days. There are myriad issues, from patching Windows machines to stopping worms and protecting your assets from nasty insider threats.

Study after study of late finds more security managers are seeing advanced threats, but few have the support and technology to deal with them. This year is turning out to be even worse for getting hacked than last year with most large companies reporting this to be worse than last in terms of suffering at least one network intrusion of their user machines, office network or servers.

In an increasingly federated, network-based IT environment, perimeter security is insufficient to protect a company’s secrets. “Not even the smallest of companies will not be best served when relying on just perimeter security. For a long time companies were focused on building this impenetrable wall of security

around their organisations. This often results in defining extremely technical rule sets to cover almost any attack vectors. Due to internal and external business pressures, companies are required to become more open, collaborative and dynamic to allow it to meet its stakeholders’ requirements,” says Franz Erasmus, Practice Manager, Information Security – CA Technologies Middle East & North Africa.

Companies relying on perimeter security are now faced with a new set of problems; how to define these new set of technical rules and expectations in a daily, hourly and more frequently at the event level? Clearly this type of security is becoming highly impractical if not impossible to protect a company’s resources and secrets, he adds.

James Lyne, Director of Technology Strategy, Sophos, agrees that perimeter security alone is not going to be sufficient to deal with today’s threat landscape. “SophosLabs now sees on average over 150,000 malware samples every day and a new infected web page every few seconds. The velocity of content generation and the prevalence of low volume, targeted attacks are placing increasing pressure on content based security technologies. More and more context is required to make effective decisions, such as the reputation of a file, its URL or perhaps the behaviour of the item when running.”

He points out that users also have a greater tendency to roam today, often not routing their traffic back to the office network - they of course continue to require protection in this scenario demonstrating the importance of persistent endpoint protection. Equally, users will enter your network with consumerised or untrusted devices, such as smartphones, where you do not have the option of an endpoint deployment. These use cases are among the many which demonstrate the importance of both the network and endpoint layers.

Changing face of securityNow with the perimeter being

permeated by dozens of connections to the outside world, and mobile devices and users regularly crossing the perimeter, companies are forced to make security ubiquitous throughout the network. “This is a

“I am happy to be here at GITEX and find local partners to join forces with. We at Astec aim to lower information risks of our clients. This is my first time at GITEX with Astec and I must say that I am very glad with the feedback about our experience and knowledge. Being here, I am confident that GITEX is the right platform that will enable us to find the right partner. I am very pleased with it so far.”

my Gitex

Publisher Dominic De Sousa, COO Nadeem Hood, Managing Director Richard Judd, Sales Director Rajashree R Kumar, Editorial Director Dave Reeder Senior Editors Sathya Mira Ashok, Jeevan Thankappan, Arun Shankar Circulation Manager Rajeesh M, Production Manager James Tharian, Art Director Kamil Roxas, Designers Analou Balbero, Froilan Cosgafa IV, Glenn Roxas, Digital Services Manager Tristan Troy Magma

Web Developers Jerus King Bation, Erik Briones, Jefferson De Joya, Louie Alma, Jay Colina

P6 @cpiatgitex

Uros Slak, director of projects at Astec.

Key concepts and strategies for building an effective network security model.

valuable proprietary information. The reality, they say, is that these so-called “advanced persistent threats” are so rampant and unrelenting they are forcing IT to rethink network security. They state bluntly that focusing on fortifying perimeter is a losing battle. What kind of defense model do you need then?

Lyne from Sophos believes: “Defense in depth, the use of multiple layers and different classes of protection technology provide the most effective strategy. This concept, which is far from new, has never really been adopted widely due to the high cost of adopting individual best-of-breed solutions. However, it is still the best way to deal with the unknown, since building a high net increases the chances of catching a targeted attacker. Organisations should look to security vendors to provide a wide array of security controls spanning the endpoint and the network. Critically however, these controls must be sufficiently simple to be realistically usable.”

Security-as-a-service or cloud-based security service is catching on as technology managers find them to provide more flexibility than they found when running their own network and security equipment. “Whether you are an IT manager, or a security specialist, chances

are you are rethinking assumptions about what security solutions to buy, how to implement them, and even how to manage them. Your existing requirement is to sustain or, better still, enhance protection against malware,  spyware, spam, and the myriad other intrusions and vulnerabilities that threaten precious information and systems. Your new requirement is for more efficiency and more seamless protection, with less thought and effort. The definitive solution to this dilemma is easier and safer than you think: Security-as-a-Service,” says Essam Ahmed, Regional Presales Manager, McAfee.

Erasmus agrees that network security will remain an element of IT architecture as long as there are private and public networks to protect.  

Mixed reality unveiledSMART Technologies is demonstrating the successful incorporation of new mixed reality tools with interactive whiteboards, including the manipulation of 3D images, for the first time in the Middle East.

Mixed reality and 3D enhancements are designed to make teaching and learning even more interactive and engaging. The mixed reality tools enable teachers and students to engage with mixed reality content by manipulating 3D images in a SMART Notebook lesson. They can also highlight parts of a 3D image using 3D

P7@cpiatgitex

must to protect the company from both external and internal threats. What is important to keep in mind is that the level of security should be proportionally applied to the resources protected and threat involved,” says Erasmus.

Steven Huang , Director of Solutions and Marketing, Huawei Enterprise Business, adds that before applying network security controls, it is essential that organisations have a thorough understanding of both their network and critical assets. “Security controls should not impede business continuity and the organizations priorities must come first. Information and resources should be available freely but securely to all the users.”

Increasingly, companies are shifting their security model from location-centric to information-centric, which will likely take a while before becoming the predominant security model. In the meantime, most companies end up with a hybrid model of both location- and information-centric elements. The perimeter is still important, but is increasingly just one of the layers of protection and is supplemented by strong user authentication, application controls and user-centric logging and auditing.

Rethinking prioritiesThe biggest business challenge

“Most certainly we are seeing renewed focus on application and data security, but this should not be seen as a silver bullet to securing the organisation. In fact companies are best served with security initiatives that are collaborative and complimenting to the overall security posture of the organisation.”Franz Erasmus, Practice Manager, Information Security – CA Technologies Middle East & North Africa.

and mixed reality is the logical next step. Studies have shown that the use of interactive whiteboards, especially when supplemented with digital resources, lead to improved student learning outcomes and we are pleased to be at the forefront

labels that remain fixed to the designated point, even when the image is rotated and manipulated.

Teachers can currently access thousands of digital resources from the Google 3D Warehouse and, they will also have access to a library of 3D content via the SMART Exchange Web site.

“ICT deployment and the use of interactive whiteboards is increasingly becoming a staple in schools across the Middle East and the incorporation of 3D images

of the ICT revolution,” commented Aaron Fright, Area Manager, SMART Technologies Middle East.

today, in the minds of many security experts, is the stealthy on-line infiltration by attackers to steal