TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out...

16
Bringing Channel Together Vol-10 Issue-02, Krishna, September - 2015, Pages-16, `40/- REACH SOUTH INDIA Andhra Pradesh l Telangana l Tamilnadu l Pondicherry l Karnataka l Kerala TECHNOLOGY NEWS MAGAZINE

Transcript of TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out...

Page 1: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,

Brin

ging C

hann

el To

geth

er

Vol-10 Issue-02, Krishna, September - 2015, Pages-16, `40/-

REACH SOUTH INDIA

Andhra Pradesh l Telangana l Tamilnadu l Pondicherry l Karnataka l Kerala

TECHNOLOGY NEWS MAGAZINE

Page 2: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,
Page 3: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,
Page 4: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,

CELL IT, VOL-10, ISSUE-02 4 KRISHNA, SEPTEMBER-2015

From the very beginning of his election cam-paign, Prime Minister Narendra Modi has spoken about building 100 smart cities in India. The prom-ise has always been part of the great Modi vision to make this India’s century, alongside bullet trains, linked rivers and bringing back black money.

This development of smart cities is set to drive new opportunities and hence create more chances for profitability for the channel community of the country.

The Union Cabinet has finally cleared an approval for Rs 48,000 crore to be allocated to the Smart Cities Mission, with Rs 100 crore to be given to each city per year for the next five years. That represents a huge investment in urban renewal overall, although a relatively small amount per city, making it clear that the government still expects most of the real financial support for smart cities to come from private sources. Reports suggest the government plans to begin with shortlisting 20 cit-ies.

What are smart cities?There’s no simple definition for smart cities. The

term encompasses a vision of an urban space that is ecologically friendly, technologically integrated and meticulously planned, with a particular reliance on the use of information technology to improve effi-

ciency. In most parts of the world, the idea begins with using digital technology to make a city more efficient and to improve wellbeing.

The Modi government’s idea is a little different. The government’s reference note for Members of Parliament on the issue actually offers a fairly sim-ple definition: “Smart Cities are those that are able to attract investments.” Everything else, such as good infrastructure and simple processes that make it easy to start and run businesses, follow from this.

But the government isn’t going to be building entirely new cities with Rs 100 crore each. Instead, the money will mostly be spent on upgrading existing facilities, since the very selection process requires current cities to prove that they are eligi-ble. States could potentially suggest areas that are going to be built up as options for the smart city mission – Andhra Pradesh’s new capital for example – but most will come from existing cities.

This will open up huge opportunities for system integrators and solutions providers as well as local channel partners who can do the IT and communi-cations fulfillment for these cities in India.

Dinesh Shyam SukhaEditor

EDITORIAL

EDITOR: Dinesh Shyam SukhaCO-ORDINATOR : SiddhiPRODUCTION & OPERATION: RamayyaPOSTAGE & PACKING: L N ADVERTISING SALES: PhaniDESIGN : Dikshit CREATIVE DESIGNER: MKVSACCOUNTS: Murthy

MAGAZINE CUSTOMER SERVICE: [email protected], 0866-6525685

NOTE:All products, brands, service names mentioned may be trademarks of their respective owners

EDITED, PRINTED, PUBLISHED AND OWNED BY DINESH SHYAM SUKHA. PRINTED AT PRINT ZONE, 26/20/18, SWAMY STREET, GANDHI NAGAR, VIJAYAWADA - 520 003, KRISHNA, ANDHRA PRADESH. PUBLISHED AT CELL IT DIGITAL MEDIA, 54-20/3-11, PLOT NO. 3, GURUNANAK COLONY, VIJAYAWADA- 520 008, KRISHNA, ANDHRA PRADESH. EDITOR: DINESH SHYAM SUKHA.

HOW SMART CITIES CAN DRIVE PROFITABILITY FOR CHANNEL PARTNERS

Wishes you

Happy

GaneshChaturthi

Page 5: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,
Page 6: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,

WINNING WITH NETWORKING IN AN ERA OF CLOUD AND VIRTUALIZATION

As solution providers and system integrators deploy cloud infrastructure and operating mod-els in their enterprise customers, the role that networking plays and the impact of these models on enterprise networks is ever increasing today. There is growing importance of the network to cloud computing, why the network must change, and what SIs must do to lead these changes. Network Is Critical to Cloud Computing When it comes to enterprise IT deployments today, Cloud computing is quite a central model now and it is a model in which IT resources and services are abstracted from the underlying infrastructure and provided on demand and at scale in a multi-tenant environment. From a pure play networking standpoint, each service model requires the cloud provider to expose more or less of the network and provide more or fewer networking capabilities to cloud users. Conversely, each service model requires cloud users to understand and design more or less of the network to which they are exposed. The network is most exposed in the IaaS model and least in the SaaS model. When we look deeply, the essential technologi-cal difference between the deployment models is derived from the networking relationship between the cloud user and the cloud provider. In a private cloud, the user and provider are within the same trusted network boundary. On the other hand, in a public cloud scenario, they are on different networks. In a hybrid cloud, a secured connection may exist between the user’s and provider’s networks, or the user’s network may extend into the provider’s cloud. In a community cloud, the structure depends on the charter and architecture of the organizations operating the cloud. Most importantly, it must be noted that every cloud is some combination of a service and deployment model. Regardless of the type of cloud, however, one fact remains true: no net-work simply means no cloud. Without networks,

What are the key networking trends being driven by adoption in India?

As for networking area, Cloud and Vir-tualization technol-ogy is the foundation of IoT(Internet of Things). By using this technology, people can enjoy the high speed for internet and less redundancy and unlim-ited storage, more cost efficiency for share and control . So that, prod-uct and service related to IoT and high speed,

cloud services, will have the high demand for customer community and enterprise community. Networking with Intelligent, proactive, always-on smart home that can be accessed from anywhere will be the main trends in India.What are your offerings in this space?Firstly, TP-LINK basic wireless router will be built in cloud sever so that people can link home to check and storage information anytime by TP-LINK router APPs. TP-LINK cloud IP cameras is providing simple, flexible and cost-effective solution to secure people’ home which have

users cannot access their cloud services. With-out networks, applications, data, and users can-not move between clouds. Without networks, the infrastructure components that must work together to create a cloud cannot. Welcome to Cloud Era, Changing face of Net-working Networking must change to embrace next gen-eration capabilities, because the rise of cloud models is changing what is happening on the network: • New infrastructure: For example, everything is becoming virtualized, infrastructure is becom-ing programmable, and servers and applications have mobility • New applications: For example, data-intensive analytics, parallel and clustered processing, tele-medicine, remote experts, and community cloud services • New access: For example, mobile device-based access to everything and virtual desktops • New traffic: For example, predominantly server-to-server traffic patterns and location-independent endpoints on both sides of a ser-vice or transaction However, it is important to note that data is still quite central and always at the helm which needs to travel between the computing and stor-age components of an application and then to the user of the application. Security still must be applied to help make sure that the right users, devices, and systems have access to the right data at the right time while protecting against attacks, intrusions, breaches, and leaks. Different kinds of data and traffic have different levels of importance and network resource needs that still must be met across the entire network with quality-of-service (QoS) capabilities. However, how you do these things has to change: • In Cloud and virtualization era, network archi-tecture needs to be flexible, instead of being a static stumbling block • Network services need to be location indepen-

dent: delivered wherever data, applications, and users are and whenever the services are needed • Network resources need to be abstracted so that provisioning can be automated and actions orchestrated through common interfaces Network Flexibility Also, it must be noted that there is no single, fundamental architecture or design pattern that will satisfy the requirements of all cloud mod-els, all applications, all users, or all of custom-ers. Through the breadth and depth of its innova-tions, SIs must make sure that there is a solution for every use and that there is the correct mix of products and capabilities so that their custom-ers’ investment is protected for the longest term possible. Networking Integration Integration is needed both out from and in to the network. SIs are in ideal position today to creating a fabric that presents diverse systems’ capabilities as part of an integrated infrastruc-ture, as a cloud, with networking as the funda-mental platform: • A single network for all data and traffic in the cloud: one set of devices, one cable plant, and one management system • Security and encryption for every kind of traffic and data, controlled and implemented through the network • Advanced networking capabilities delivered deep into the servers and virtualization plat-forms running the cloud infrastructure (Figure 4) ConclusionAs network evolves with the introduction of cloud and virtualization - the implementation of the Internet of Things (IoT) is leading to rapid innovation and business opportunity, along with new challenges for IT leaders as well. This is also opening up new opportunities for the solution providers. And as a result, more often than ever, technology partners are connecting private, public, open, and hybrid clouds with the globally connected network of clouds.

CO

VE

R S

TO

RY

CELL IT, VOL-10, ISSUE-02 6 KRISHNA, SEPTEMBER-2015

become more and more popular in India market.Secondly, TP-LINK future IoT router will become the gateway for the IoT devices. For TP-LINK AC router, APP control has already become the truth and more and more function will be built in next step.Thirdly, Cooperate with Google, TP-LINK just launched the first IoT router Onhub in US and Canada. Meanwhile, TP-LINK smart home devices and sensors such as smoke, motion, contact, moisture and thermostat are under developing with TP-LINK R&D centre based in California.US. TP-LINK will be more active to cooperate more and more traditional manufacture company such as white-goods company for air-condition, TV, wash machine, fridge.How does the customer community look at cloud and virtualization today? are there any real demands com-ing from the enterprise community?Look at the rapid growth of smart phones and you will see people is seeking the most convenient way to net-working home and working place. Truly there are some people with little concern for the security and privacy about the application of cloud and virtualization tech-nology. At the matter of fact, cloud computing and vir-tualization computing application enhance the network security than before. As for the application of enterprise, Cloud and Virtualization is a very powerful solution that can improve company IT networking infrastructure and bring extremely high cost saving by using virtual net-

working virtual desktops, cloud server etc.What kind of enthusiasm do you see in the channel community when it comes to selling cloud or virtu-alization today? how can this be bettered in the near future?As for networking area, TP-LINK high speed 11.ac router will become popular for our channel partners. Because people have high demand for networking speed and have more devices to connect than before. However, for the IoT product, the worldwide standard still need some more time to be unique that need hardware and software companies and organizations stay and cooper-ate together.What are some of the big advantages that cloud and virtualization bring for the enterprise customers?Unlimited storage, More cost efficiency, Less redun-dancy for networking.How can channel benefit from this transformation?Channel customer will enjoy the great benefit from hard-ware upgrading and new market demand for selling IoT product that business scale is beyond imagination.What kind of growth do you expect from these seg-ment and where is this growth going to come from?We are looking at another 10 times growth from these new segment that come from IoT router, Smart home such as cloud IP cameras, smart LED lights, smart sen-sors for windows/door, detectors for smoke moisture and thermostat.

Brian DongSales Director, TP-LINK,

Asia-Pacific

Page 7: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,
Page 8: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,

CELL IT, VOL-10, ISSUE-02 8 KRISHNA, SEPTEMBER-2015

WITH INCREASING PENETRATION OF MOBILITY, THE SECURITY FOR MOBILE DEVICES IS NOW BECOMING A MAJOR CONCERN FOR

ENTERPRISES TO INDIVIDUAL UERS TODAY.

THE GLOBAL CLOUD SECURITY MARKET WILL BE WORTH A MAMMOTH $8.71 BILLION BY 2019

How does eScan look at the changing landscape of security solutions today?eScan has been focused towards providing a world-class product and experience for its users. With

i n c re a s i n g penetration of mobility, the security for mobile devices is now becom-ing a major concern for enterprises to individual users today. The number of smart-phone users is going to

be more than 200 million by 2016 according to some leading research estimates. Thus eScan Mobile Security for Android phones, iPhones & iPads and Tablet Security for Android are already been made ready to address the security threats emerging in the mobility segment. We have planned our strat-egies in order to aggressively penetrate into the market and have our market share increased by additional 15-20% from SOHO, SMB and Corporate Edition including MailScan for all Operating System.Cloud and virtualization is getting important today? How do you plan to utilise cloud for deliv-ering security?The benefits of cloud computing, its adoption among the Indian enterprises is driven at a very strategic level. Inclination towards private cloud model is observed amongst the Indian enterprises in order to understand the technology within their own premises in a better way before adopting pub-lic cloud model.eScan products are already compatible to cloud

What are your views on this emerging trend?Both cloud computing and virtualization have

scaled the p o p u l a r -ity charts in terms of adop-tion and b u s i n e s s integration because of their abil-ity to bring down capex and opex for busi-nesses. Over time, these

technologies have evolved to offer more cutting-edge benefits. The era of cloud and virtualization is gaining traction because they allow users to do more with less. Whether it’s deployment of new operations, use of advanced applications for rev-

technology. The revolutionary MWL (MicroWorld WinSock Layer) technology of eScan intimates about any malware outbreak irrespective from mail server, web server or file server. We get to know about such acts in no time. eScan rescue mode helps to boot into a secure environment during system start-up without using any optical media. It uses Windows based environment that not only helps to scan and clean the system but also allows to fix registry changes made by viruses and Root-kits.What are some of the innovations that eScan is bringing to the market?Currently eScan is chalking out the future plans with the following perspectives:Fortifying Smart Cities: We are focusing on the con-cerns related to Privacy, Network/ Data Security and detection/ prevention of inconsistencies to ensure 24×7 availability of all kinds of digital services that make smart cities. Proper security to this digital world can ensure an ideal smart city for next gen-eration.ICT (Information and Computing Technologies) & IoT (Internet of Things): ICT (Information and Com-puting Technologies) and IoT (Internet of Things) are an integral part of Smart Cities and we have extended the security umbrella to IoT with Secu-rity Intelligence Analytics and ensure Network/ Data integrity round the clock.Mobile and smartphones also need security these days? How are you looking at this segment?As mentioned above, Anti-virus market in India is witnessing constant growth and this will continue in 2015 as well. According to a research done by e-Marketer, by 2016, India will have the second largest online user-base with 283.8 million users, after China. Factors such as data usage on mobile devices, broadband penetration and rise of smart devices will fuel this growth. As far as the emerging trends are concerned, mobile computing, big data, virtualization, cloud services and social network-

enue generation, optimizing network operations or something else, cloud and virtualization are the future and the future is here.What is your go to market strategy to engage cli-ents keen on taking advantage of Cloud or Virtu-alization solutions?Cyberoam has launched a range of comprehensive virtual security solutions covering major use cases and supporting nearly 90% hypervisor infrastruc-ture including Microsoft Hyper-V, VMware, Citrix XenServer and KVM. You would soon hear from us on our cloud offerings.Our go-to market strategy is channel driven – we take the responsibility to lead, engage and moti-vate the channels to take Cyberoam’ s virtual secu-rity to SMEs / SMBs and Enterprise users who want to embrace virtual security solutions. We have been working with VMware partners and other resellers and VARs that specialize in virtualization portfolios. How do you look at the security as a service trend?The global cloud security market will be worth a

ing continue to be the emerging IT trends of 2015. The biggest driver of growth will be mobility that includes Smartphones and Tablets. We already have our Mobile & Tablet Security software for Android and Mobile Security for iPhones & iPads too. Con-sidering the features we have for these products, we are already experiencing a respectable feedback from the industry and end-users.How strong is your channel network in India?In the last couple of years, our sole focus was on creating awareness amongst channel partners across the country. Having reached to more than 5500 partners, we want to increase our bases fur-ther as well as engage with existing partners to achieve mutual growth.Our focus this year is again on creating strong part-ner engagement with SP partners for our SME and Enterprise growth. Whereas we have now started reaching to both the mid and large SI/SP partners and increase awareness through co-marketing activ-ities like road shows, POCs etc.Please share your growth plans and how you want to achieve this growth?The current scenario in Anti-Virus market in India among home users/ Retail is on growth path at a rate of 20-25% (approx.). The use of licensed and paid AV is increasing day by day. The distribution pattern or the reach to end customers is still largely through small resellers and IT dealers, even though the online stores are selling at reduced costs, still the consumer looks at service and buys from his trusted partner. Even though large number of peo-ple uses free AV, yet this is now coming down with increased threats.With continuous advancements in the IT landscape, the need to protect networks and all related digi-tal devices from evolving cyber security threats has led to an increase in the demand of IT security soft-ware. Hence, in the year 2015-2016, eScan expects an escalated growth curve in the IT security indus-try.

mammoth $8.71 billion by 2019. This figure alone illustrates the growing adoption of cloud comput-ing and the increasing demand for managed secu-rity services. While there is no doubt ‘on premise’ security solutions are getting better and better, we are also witnessing a move towards cloud-based security services for their ability to reduce capex , improve cost-efficiency, increase scalability and enhance a business’s ability to meet changing demands of the target market.Why it is important for SMBs and Enterprise to secure their networks? What are the biggest advantages?Data is the new currency that makes or breaks SMEs / SMBs and Enterprise organizations. The exchange of data and a business’s ability to lever-age the potential of its data determine the scope and scale of its growth. Imagine what will happen if this confidential data were to fall into wrong hands. It can irreparably harm the reputation of the organization and result in immense expenses to recover lost data and taking care of liabilities emerging from losing confidential customer data.

INTERVIEWS

Mr. Sunil Kriplani, Senior VP, Global Sales & Marketing, eScan

Sunil Sharma, VP Sales & Operations, India & SAARC, Cyberoam.

Page 9: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,
Page 10: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,

CELL IT, VOL-10, ISSUE-02 10 KRISHNA, SEPTEMBER-2015

What are the key priorities for Intel security today?

With an innovative approach to hardware-enhanced security, and unique Global Threat Intelli-

gence, Intel S e c u r i t y is deeply focused on d e v e l o p -ing proac-tive, proven s e c u r i t y s o l u t i o n s and services that protect s y s t e m s , n e t w o r k s , and mobile devices for b u s i n e s s

and personal use around the world. Intel Security delivers hardware-enhanced security solutions that provide deeper levels of protection for PCs and enterprises. Our priority is to ensure a safe digital footprint for our customers. As such we focus on offering one of the most comprehensive enterprise solutions in the industry that help in preventing attacks in real time, deliver robust security man-agement, and provide strong data encryption with minimal impact on productivity.

Intel Security is keen to add value to its cus-tomers by being able to provide both end-to-end connected security suites as well as ones that are predictive based on our Global Threat Intelligence and Threat Intelligence Exchange architectures. We have seen significant traction in the security-by-design concept to better protect every layer of computing, from chip to cloud and from devices to the data they hold.On the consumer side, our focus has been on securing the multiplicity of personal devices and the resultant digital footprint. This is where we innovated with McAfee LiveSafe™ which is a single subscription product that covers an unlimited number of devices.

How do you look at the changing security needs of enterprise and SME segment today?

On Enterprise front: The level of cyber-attacks in the country has increased tremendously with more aimed at lucrative targets like financial ser-vices and IT organizations. So while these segments are early adopters of technology, they remain prime targets for cyber criminals and that to me signals the need for organizations to look at security more holistically and move from a protection to detection and correction stance. Overall, IT environments in large organizations are growing ever more complex and difficult to manage, making the role of security information and event management (SIEM) technol-

ogy more important than ever.On SME front: Small and medium sized busi-

nesses (SMBs) are just as vulnerable to sophisti-cated cybersecurity threats as witnessed by larger corporations (in strength and type).That said, since SMEs are looking to adopt technology solutions like BYOD and cloud to grow faster and differenti-ate against competition, the threats also increase multi-fold for them. Cyber criminals perceive SMBs as easier yet still lucrative targets and therefore sig-nificant education and support of SMBs is needed in order that the benefits from technological solutions can be fully realized.

Today, Intel Security is the only vendor that plays across all threat vectors and all points of vul-nerability in the enterprise network while also pro-viding consumers with what they need to help keep their endpoints and devices secure. We offer one of the most comprehensive enterprise solutions in the industry that help in preventing attacks in real time, deliver robust security management, and provide strong data encryption with minimal impact on pro-ductivity.In many security services savvy markets, we provide and offer our next gen firewall technol-ogy through managed services partners effectively.An IDC report issued in March 2015 on digitization initiatives and IT spend forecasts across industry segments and enterprise applications indicates that security will see the maximum growth of 15% due to the vulnerabilities thrown open in today’s emerg-ing technology landscape. Clearly the prospects for Intel Security and its partners are tremendous as the demand for security focused technologies like McAfee LiveSafe and TIE, GTI increases.

Where are the big growth opportunities for Intel security today?

I believe that as technology advances, the need to secure the data that it generates is even more critical as the cost of losing that data will far exceed the cost of securing it. Today, India has the third largest internet savvy population in the world with a user base of around 250 million in 2014. Accord-ing our Digital Asset Survey, 2014, almost half of the surveyed Indian respondents said they per-sonally own three-to four devices in their homes. In fact, the average Indian has more than INR 25 lakh worth of under protected digital assets stored across multiple devices.

Given thegrowing adoption of smart phones and the growing sophistication of threats, the market has evolved from point solutions to more comprehensive protection suites which encompass cross device security. Internet of Things(IoT), while on one hand brings in advances in technologies that will drive productivity and convenience for a user like never before; its successful adoption on the other hand would also require an effective roll out of security at every layer.From an enterprise per-

spective, the Nexus of Forces or SMAC technologies are defining the next generation of IT infrastructure, consumerizing IT like never before. However, these also require an integrated approach to IT security.

With our Security Connected strategy, we are uniquely positioned to deliver an integrated secu-rity platform with a capability to deliver Protect, Detect and Correct to address challenges posed by ever changing threat landscape of today and the future.

How does the company look at the channel partner community towards enabling growth?

One of the biggest challenges for the customer is the lack of expertise at their end. As the threat landscape becomes increasingly complex, the need for security too is becoming a critical factor for organizations. In such a scenario the channel part-ners play a key role in bridging the gap and become trusted advisors for customers in their security pur-chase decision. Since our go-to-market strategy in India is through the channel, we ensure that our partners are adequately trained and aware of the wide expanse of our security portfolio of solutions.We’ve conducted extensive technical sessions and introduced multiple promotional campaigns for partners. In addition, channel incentives ensure a win-win situation, both to the brand as well as our channel partners.

Under profitability, we have the industry’s most aggressive deal registration process for partners and we have introduced high margins for ones bringing in new business. We work with over 5000 resellers in India that support both enterprise and consumer sales and are looking to consolidate as well as focus on empowering our existing partners strongly this year.

Security as a service is picking up, what is your experience on this?

More than half of the addressable market in security is services: implementation and integra-tion services, managed security services, consulting services. Our enablement initiatives help partners focus on providing consulting services to custom-ers, auditing customers’ security posture, and to service them by providing them with trained resources for implementations and troubleshoot-ing. It reinforces the philosophy of the change in the dynamics of the security industry to move more towards a service-oriented model. We will continue to train and build a curriculum professional services team through a partner ecosystem that will deliver those services. Intel Security wants to solve the problems of security with best-of-breed products and solutions to strengthen the security posture of India Inc. This approach will also bring new oppor-tunities for channel partners as both look forward to address the rapidly increasing market for security solutions and technologies.

OUR APPROACH IS FOCUSED ON INTERLOCKED, PROACTIVE, MULTI VECTOR, SMART AND PREDICTIVE TECHNOLOGIES TO HELP

BUSINESSES FIGHT AGAINST MODERN THREATS.Girish Gargeshwari, Director – Sales & Channels (India & SAARC), Intel Security

Deploying effective Network Security solutions makes it difficult for cyber criminals to cause data breaches. Securing networks is a way of securing data. This is why it’s super important for SMEs / SMBs and Enterprise organizations to secure their networks. The advantages also include protec-tion against viruses, Trojans, hacker attacks, DoS attacks, identity thefts, zero-day attacks, and data interception. Network security also ensures busi-

nesses are in compliance with industry and gov-ernment regulations.After sales, support is mainly important in UTM Firewall, how do you tackle this?What SMBs and Enterprise users look for, from UTM Firewall products is timely and extensive post-sales support. When a UTM Firewall goes down, it brings down the entire network, which impacts the availability of key business processes

and applications. Cyberoam, recognizes the importance of unwavering commitment towards after sales support and to this end it was the first UTM vendor to achieve ISO 20000:2011 certified customer support. We have a world class GSMC (Global Support Management Center) that adheres to best practices in delivering support through multiple channels including email, live chat, phone and support through customer portal.

INTERVIEWS

Page 11: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,
Page 12: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,

CELL IT, VOL-10, ISSUE-02 12 KRISHNA, SEPTEMBER-2015

Our Managed Security Services offerings cover broad range of technology portfolio(hardware and software form factor) that support Multi-tenant architecture; which is a key prerequisite for any MSSP platform. Wrapping these with Pay as you GO or TCV packaging offers a compelling offering to our channel partner who is keen to build MSSP as a GTM model.

What are the key trends in security today?Be it the booming ecommerce market, competi-

tively priced smartphone devices, the pervasiveness of BYOD solutions, the Indian Government’s Digital India initiatives, or the Aadhaar card program, all of these have created a new economy for businesses and customers alike. Security is rapidly coming at the core of every organisation’s business policies.

• Mobile first economy will drive adoption of security solutions for endpoint security: India has been blessed with a young demographic where a majority of its internet users are likely to be access-ing it from their smartphones thus ushering in the mobile first era.Intel Security Labs research has seen an uptick in attacks of ransomware aimed at mobile devices as more business shifts to mobile, and with the adoption of BYOD, this can become a large scale problem in the enterprise too

• Rise of the tech and ecommerce savvy con-sumer generation:With the spectacular rise of ecommerce in India, the focus is on creating secure

transaction platforms so that confidential data of consumers can be secured from cyber threats

• Focus on vision of Digital India and Smart cities initiative will boost security spending:Cyber security will be applicable for securing broadband highways, universal access to phones, and the Public Internet Access program under the anvil of National Rural Internet Mission. Additionally data collated under e-Governance platforms and for redressal forums will need to be secured. With digitization comes the need to secure one’s digital footprint and assets and we at Intel Security are committed to providing a safe and secure digital environment.

• The mega trends in IT; IoT, cloud, and mobil-ity, also drive security: This is because security must adjust to new attack surfaces and vectors.

What are some of the innovations being driven by Intel security today?

Intel Security is the only vendor that plays across all threat vectors and all points of vulner-ability in the enterprise network while also provid-ing consumers with what they need to help keep their endpoints and devices secure.Our approach is focused on interlocked, proactive, multi vector, smart and predictive technologies to help busi-nesses fight against modern threats. Portfolio wise, Intel Security is the only vendor that plays across all threat vectors and all points of vulnerability in the enterprise network while also providing consumers

with what they need to keep their endpoints and devices secure. While we offer a number of prod-ucts and solutions that are relevant to consumers and organizations in India, there are two key ele-ments that define our security agenda:

Security Connected: Our underlying the focus is on reliable and uninterrupted service delivery through a combination of endpoint, network, and data-centric controls for discovery, prevention, detection, response, and audit. This integrated approach, which we call Security Connected, yields a robust, secure architecture that is more easily managed than frameworks operated with security controls in disparate silos of operation. The Security Connected framework from Intel Security enables integration of multiple products, services, and partnerships for centralized, efficient, and effec-tive risk mitigation. It helps organizations across segments and sizes to improve security, optimize it for greater cost effectiveness, and align security strategically with business initiatives.

Threat Intelligence: That said, for Intel Security, providing customers with intelligence on the threat landscape is about as important (if not more) as providing them with products to secure themselves from those threats. In doing this, we empower our customers to remain ahead of the curve and take a more proactive approach to security.

THE INDIAN MARKET FOR SECURITY AND SURVEILLANCE MARKET GROWTH IS EXPECTED TO ACCELERATE IN FUTURE

What are the key focus areas for Quantum today? List out the product range you deal with...

Our prime focus is to continue providing most reliable and supe-rior quality products to our customers at reasonable prices as this has built our key differentiation than the competition and helped us build a niche for ourselves. Very recently in Secu-rity and Surveillance

range we have launched Tribrid DVRs that work on analogue, Analogue High Definition and IP Cam-eras. Currently Tribrid DVR’s along with Quantum’s dedicated high speed server and user friendly ui is our prime focus for promotion. Other than these we also have Power banks which are built in with dedicated RISC microprocessors for high speed charging of smart phones and tablets and are also a key focus product from promotion point of view.

Added to this we also have Computer Acces-sories, Mobiles Accessories and data logger in our product range.

How important is innovation for the company and how does it make sure that all its products are innovative?

At Quantum Hi Tech, One of the biggest dif-ferentiations that set us apart from several other IT Brands in India is – We don’t just buy products internationally and sell it here. But we have our own R&D Team which does extensive modifications technically to suit every product as per the Indian conditions based on market research of customer needs . It is tailor made to the audience here. “Reli-able IT Solutions” drives the key differentiation for our brand. Every product you see in the market might appear similar but what gives us an edge over

others is the robust electronics inside as we leave no stone unturned to make the products most reli-able for Indian power conditions.

How do you see the future of Surveillance busi-ness? List some special range of Surveillance prod-ucts you deal with...

The Indian market for security and surveillance market growth is expected to accelerate in future, led by strong demand from every sector be it home/office/services etc as awareness and understanding that security is the need of the hour is increasing each day. However,with every opportunity comes, its share of risk and this industry is no different. With the ever-changing technology enhancements, there is an added risk keeping pace with fast chang-ing technologies, which inturn increases the risk of controlling inventory and not falling in the trap of high inventory of obsolete technology products

However, In Security andSurveillance we are launching Tribrid DVRs that work on Analog ,Analog High Definition and IP Cameras. To add up to our current HD series range, we have launched 1.3 & 2 MegaPixel cameras in our A- HD series. Our Home segment wireless IP cameras with cloud service is in its final stage of evaluation and testing and shall be launched in Q3 so you can safely say a lot of new products are in pipeline.

How big is your channel base? How do you look at expanding your channel network?

India is a big market to feed. Thus, QHMPL with its 24 company operated service centres across India, along with many partnered service centres, over 50 pickup/ collection centres & a dedicated call centre in place for telephonic assistance and remote troubleshooting makes us a leader in Sup-port thus ensuring end user satisfaction.

The company also plans to open another 15 ser-vice centres in next 2 yrs to increase the support enabled areas.

For all 3 verticals we have sales channel part-

ners more than 1000 spread across India and this channel is fast increasing each month.

How does the company take care of the design and packing of the product?

For the design and packaging we have initiated tie up with xtremeworx one design and develop-ment lab in Australia and the company has been updating us with the latest trends in international market and has also been providing us with all round product development support.

How is the service/replacement part taken care? Do you have service centres or do you take care through your distributors & how effective is that?

QHMPL’s products are priced between Rs 50 to Rs 15K and come with a minimum of 1 year repair warranty broadly speaking. All product lines such as IT Peripherals and its Accessories, Mobile Accesso-ries and Security and Surveillance products has the same warranty policy, though our niche products like ADH cameras come with 2 yrs warranty .In case the defect in the product doesn’t get rectified by our qualified engineers then we replace the prod-uct.

However, India is a big market to feed. Thus, QHMPL with its 24 company operated service cen-tres across India, along with many partnered service centres, over 50 pickup/ collection centres & a dedi-cated call centre in place for telephonic assistance and remote troubleshooting makes us a leader in Support by making customer Happy.

Whereas, In areas where the company don’t have service centre, we have set up collections cen-tres where in customer can deposit the defective product and collect the rectified product in couple of days. The only difference in the policy is the TAT (Turn around Time), in areas where our collection centres are there, TAT is smaller than where the ser-vice centre is not present as of now.

Mr.Ashish Mutneja, Director, Quantum Hi Tech Merchandising Pvt Ltd

INTERVIEWS

Page 13: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,
Page 14: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,

1920 x1080 @60Hz (Full HD)16:9

250 nits1000:1 staticAntiglare Panel

178/178(degrees)16.7mColors

VGA/DVI-D/HDMI/HDCP

F191 (18.5”) Resolution : 1366x768With a 2,000,000:1

Dynamic Contrast Ratio and5ms response time, movies and games

have never looked this good.

Secunderabad RegionASM: Kishore - 9391778804

P.L. Computers - 09246352400, Prime Distributors - 9849457428

Vijayawada RegionASM: Joshi - 9247800202

Vijayawada : Digital World - 9866312666, Microcare Computers Pvt ltd - 9849914796, Guntur : Sri Lakshmi Vigneswara Electronics - 9618721111

Visakhapatnam RegionASM: Trinadh - 7799330770

Visakhapatnam : Microcare Computers Pvt. Ltd. - 9849996682/9849914748, Kakinada: Sravya Technologies - 9848483680, SS Computer Shoppe - 9246645588, VJ Sales Corporation - 9849117614,

Rajahmundry: City Computers - 9949164777/9000405832

Asli Warranty3 year

on site warrantyAll HP / Compaq Standalone monitors

come with 3 years onsite warranty as deafult

WIDE VIEWING ANGLE

HP 22vx / 23vxIPS LED Backlit Monitor

Affordable and uniqueCompaq F191

LED Backlit LCD Monitor

LEDBacklighting

LED Arsenic-freedisplay glass

5msresponsetime

Backlighting

5ms

33

NATIONAL DISTRIBUTOR:

Savex Technologies Pvt. Ltd.

Page 15: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,
Page 16: TECHNOLOGY NEWS MAGAZINEcellit.in/wp-content/uploads/2015/09/Cellit_September_2015_web.pdf · out networks, applications, data, and users can-not move between clouds. Without networks,

RNI NO-APENG/2006/19824 POSTAL REGD. NO.VJ/102/2013-15LICENCED TO POSTING WITHOUT PREPAYMENT No. PMG/VJA/PWPP/9/2014-15

CELL IT, September - 2015