You are on page 1of 36

17 GLORIOUS YEARS OF SERVING IT INDUSTRY (SINCE 1999) www.ncnonline.

net

Data Security In The Cloud

FORTNIGHTLY
MAGAZINE
Jan. 30 - Feb. 14
VOLUME 19
ISSUE 02 / 2018
NO. OF PAGES - 36

Mr. Rahul Kumar, Country Manager, WinMagic


Guest Column P> 32
2 T /OnlineNCN f /ncnonline.net W /ncnonline.net
Issue Contents 30 January2018 NSS

6... Editor’s Desk 26... Report


India Networking Market Posted a
Strong YoY Growth of 15.8 Percent
8... NSS News in Q3 2017: IDC India

14... Hot ‘n’ Happening 27... Case Study


Hikvision Empowers Kachchh
CP PLUS Hosts Grand Treat-
University with Surveillance
ment for its Partners
and Broadcasting Solutions

28... Special Report ISODA TechSummit 2018 Concluded


Seclore wins CIO CHOICE
2018 Award ISODA TechSummit 2018 with the Best Interaction Experience
Concluded with the Best
Interaction Experience

30... Solution of Fortnight


Fujitsu Maximizes Storage Perfor-
16... Hot Product mance with Next-Generation ETERNUS
D-Link: CCTV Bullet Camera All-Flash and Hybrid Storage Systems

NETGEAR: Nighthawk R7000P AC2300 Wireless


Router
32... Guest Column
Data Security In The Cloud

18... Special Story Mr. Rahul Kumar


Country Manager, WinMagic

Information Security
Landscape in 2018 33... Curtain Raiser
The stage is all set for 14th
edition of Pragyan 2018

24... Trend 34 ... Product Revew


Ethernet Switch
2018 – Year of the Hybrid
Cloud

Mr. Anjan Srinivas


Sr. Director, Nutanix

Cisco : TP-LINK : D-Link :


SF95D-08-IN TL-SF1008D DGS-1008A

EDITOR : SWAPAN ROY BRANCH OFFICE:


CHIEF EDITOR : MANOJ JHA MUMBAI : E-mail: mumbai@ncnonline.net
KOLKATA: 105/19, Dum Dum Road, Sil Colony,
ASSOCIATE EDITOR (TECH) : JAYANTA GHOSH Kolkata-74 (INDIA)
ASST. EDITOR : E. J. JAWAHARDATHAM Contact : 09891666264, 09330922965; 09903392620
E-mail : kolkata@ncnonline.net
PRODUCT HEAD : ANIT KUMAR
ORISSA : Saraswati Behera Building, Kharavella Nagar,
FINANCE & ACCT. : SANDIP SARKAR 2nd Lane, Near Jyoti Nagar,
MARKETING MANAGER : TRIDIP DEY Berhampur-760001 (Orissa) (India)
Contact : Raj Kumar-09338410809, 09439263711
MARKETING : SUJIT GOSWAMI Email : info@ncnonline.net
PRATAP ncn_reporter@yahoo.com
CIRCULATION MANAGER : BISWAS
National Computrade News Fortnightly News Paper, Printed,
PRODUCTION ASST. : ASHISH GHOSH Published & Owned by Swapan Roy at 38-B / 56 Block, C. R.
SYSTEM MANAGER : VIJAY Park, New Delhi-110019 (India).

CIRCULATION ASST. : ASHOK KUMAR PAUL Printed at Pushpak Printer,


ASHISH GHOSH C-96, Okhla Industrial Area-I, New Delhi-20.

H.O.: DELHI / EDITORIAL OFFICE Retail selling price of News Paper Rs. 10.
ROY MEDIATIVE Annual subscription Rs. 240.
A-23, 1st Floor, Okhla Industrial Area,
Phase-I, New Delhi-110020 (INDIA) Editor : edit@ncnonline.net
Ph: 91-11-41602841, 65683896, 40536384-87 swapan@ncnonline.net
Mob: 09810380882, 09811346846 Marketing : tridip@ncnonline.net
marketing@ncnonline.net
REGD.OFF.: Info : info@ncnonline.net
38-B / 56 Block, C. R. Park, New Delhi-110019 (India). Subscribe : subscription@ncnonline.net

4 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Editor’sDesk 30 January2018 NSS

How the information security


landscape will evolve in 2018?
Some of the biggest cyber incidents in 2017 revolved around the issue
of self-replicating malware that can spread between networks. WannaCry
and NotPetya were examples of this. As well as these we’ve seen the Bad
rabbit ransomware that reportedly spreads via a combination of Windows
Management Instrumentation (WMI) and Server Message Block (SMB)
protocol, and a wormable Trickbot banking Trojan was also reported in Jul
2017.
We expect malware modified with self-replicating capabilities to continue
in 2018, particularly given the disruption caused by WannaCry and NotPetya
inspiring similar attacks. Another driver for this is that many organizations
around the world will be slow to mitigate against these methods, whether
by applying appropriate patches and updates, restricting communication
between workstations, and disabling features such as SMB to reduce the
capability of malware to propagate within organization networks.
2018 would be the year of crypto currencies, with numerous players
vying for the stability of their currency and the latter half of 2018 may lead
to market consolidation, with the emergence of top crypto currencies. Due
to the spiraling price of the Bitcoin, in 2018, criminals would shift their
focus to other crypto-currencies and this would be the game changer in the
popularity of the crypto-currencies.

Swapan Roy
(visit us at www.ncnonline.net) royncn@gmail.com

Zyxel introduces NebulaFlex for access


points

B usinesses facing the struggle between cloud


and on-premise network deployment will be
able to put their mind at ease with Zyxel’s new
NebulaFlex feature announced. Currently supported
by three Zyxel wireless access points, NebulaFlex
frees traditional standalone APs to be managed in
two modes – either cloud-managed or on-premises,
giving businesses true flexibility in deployment while
reducing extra hardware and software costs.

www.zyxel.com

6 T /OnlineNCN f /ncnonline.net W /ncnonline.net


7
NSSNews 30 January2018 NSS

a portable 300Mbps Mini USB Adapter sharing of critical data in real-time


Tenda organised Partner from multiple devices, facilitating far
U3 & its entry-level gigabit POE Switch
Training programme in Delhi TEG1105P. Tenda’s partner training more engaged and involved meeting
Tenda India recently held a partner program served its purpose as partners room discussions and allowing decision-
training program titled as Networking were more confident about the products making to be more information-
Conclave for its partner in New Delhi. with better functional knowledge about driven and accurate.”The present
The meet was attended by 30+ Prime them. With this initiative, Tenda wants meeting room experience is severely
Partners across New Delhi Region. The to be sure that Tenda’s partners pitch the hampered by outdated presentation
objective of Tenda’s Partner Training perfect product to a respective customer technology, which does not provide the
program was to help partners gain according to their demand. After a kind of flexibility, seamlessness, and
insight into Tenda’s hot-selling units as successful conclusion of Networking functionality that new-age boardrooms
well as to make partners equipped for its Conclave in New Delhi, Tenda has a demand. This is the gap that we are
further checklist of Mumbai, Bangalore, addressing through our cutting-edge
Chennai to tick off from the list. wireless presentation solutions such
as ClickShare and we present,” said
Barco Appointed Supertron Ramya Chatterjee, Director – Sales
as its national distribution (Visualization & Entertainment) Barco
partner India.
Barco has appointed Supertron India
as its national distribution partner for
DIGISOL launches GEPON
its meeting room & boardroom range ONU 300Mbps Wi-Fi Router
new soon to be launch products, Plus to of solutions in India. The association DIGISOL Systems Ltd. announced
address numerous challenges they face. will enable a more robust market and the release of the GEPON ONU 300Mbps
After a slowdown in IT Market due to channel penetration on a pan-India level Wi-Fi Router with 1 PON and 1 Giga
some uncalled reasons, Tenda wanted to for ClickShare and we present. The vision Port. The DG-GR1310 is a Mini GEPON
be certain it makes it partners ready and behind Routing ONU designed
capable to work unitedly during market’s the move for fulfilling FTTH
crucial situation. With a perfect run is to ultra-broadband access
through of Networking Conclave, Tenda meet the request of home and
plans to inform its partners that they are growing demand for cutting-edge SOHO users. It supports
soon going to get chance to sell more technological solutions that enable more NAT/firewall and the
number of Tenda products in India. productive, interactive, and seamless technology of 802.11n
With respect to it, Partners received a meeting room experiences. The ‘plug- WiFi so on functions.
chance to sneak peek and test and feel and-play’ solutions from Barco employ It is based on the stable
Tenda’s soon to be launch Nova MW6; state-of-the-art technology to optimize and mature GEPON technology, which
a true mesh networking router, along meeting room operations and drive has high performance/price ratio. It is
with other new products such as two productivity. The platform-agnostic highly reliable and easy to maintain, with
all-new AC Standard dual-band routers, approach employed also enables guaranteed QoS and fully compliant to
IEEE 802.3ah EPON standards.

RAH Infotech Signs Up with Infoblox Sasken unveils new logo to


reflect its 30-year-old heritage
R AH Infotech announced that it has signed
a distribution agreement with Infoblox.
Infoblox delivers Actionable Network Intelligence
Sasken Technologies Ltd., (formerly
Sasken Communication Technologies
to enterprise, government, and service provider Ltd.), a leading product engineering
customers around the world. As the industry and digital transformation solutions
leader in DNS, DHCP, and IP address management, provider, today unveiled its new logo.
the category known as DDI, Infoblox provides This logo is designed to reflect Sasken’s
control and security from the core—empowering heritage and reliability that spans
thousands of organizations to increase efficiency almost three
and visibility, reduce risk, and improve customer decades.
experience. “This association with Infoblox will Sasken’s new
take our business portfolio to a different level logo is an
and we are very excited about the prospects in the amalgamation
coming days. Dynamic and complex trends in data of the symbol
security, cloud, internet of things etc. are having for Air and the three distinct values
grave effects on Network landscapes. One needs to that define Sasken – World-Class,
think of network management solutions that are out Intellectual Integrity, and Tech First.
of the box. Infoblox with its years of experience will The colors, Purple and Orange, signify
bring in Intelligence, Insight, and Automation to stability and evoke vibrancy or energy
solve many of the toughest networking challenges respectively. A single beam within the
Indian corporate may have,” shared Ashok Kumar, triangle breaks into a burst of energy,
CEO, RAH Infotech. signifying the diversification and
the march forward towards its new

8 T /OnlineNCN f /ncnonline.net W /ncnonline.net


NSSNews 30 January 2018 NSS

5x5 vision. Speaking on the occasion, performance microphone also enables, the new Avaya, which is more focused
Rajiv C Mody, Chairman, Managing ‘Two Way Conversation’. The Two-Way than ever on leading the industry’s
Director & CEO at Sasken, said, “Sasken Conversation is a system which comes digital transformation,” said Jim
has embarked on a new journey, as with a built-in Microphone, letting Chirico, president and chief executive
outlined in our 5x5 vision, to build a you converse with kids or families at officer of Avaya. “Building upon our
robust organization as well as achieve home from anywhere, anytime from history of innovation and expertise in
profitable growth and revenues of $250 your smartphone app. Speaking on the deploying globally scalable solutions,
million by 2021. We are confident of launch, Sandeep Parasrampuria (CEO Avaya sits today at the strategic nexus
catapulting ourselves to a leadership and Director – iBall) says, “This New of connectivity for the enterprise—
position in Product Engineering and Years, iBall focuses to bring high utility with more than 130,000 customers
Digital Transformation services. products for everyone. iBallGuard PT HD in 220,000 locations worldwide, 90%
Therefore, it is an ideal time to launch Camera with two way communication plus of the Fortune 100, and more
an identity that provides positivity, and 350 degree tilt and pan, allows you than 100 million users. ” Chirico
motivation, and inspiration to achieve to see your loved one from anywhere. added, “Avaya is also the largest pure
our goals. It is time to energize and Be it worrying for the Grandpa at home, play Unified Communications and
invigorate all our stakeholders to or baby under maid surveillance, iBall Contact Center provider in the cloud.
believe and invest in our 5x5 journey. Guard lets you watch every step.” We have unparalleled opportunities
ahead of us. For example, only about
iBall Guard presents Home Avaya to Ring Opening Bell, 10 percent of our contact center
Security PT HD Camera Begin Trading on the New York customers have migrated to the cloud.
iBall announced the newest safety Stock Exchange We are passionate about providing
partner to every family, ‘iBall Guard the flexibility, open architectures, and
Avaya Holdings Corp. will ring
PT HD Camera’. Introducing a space- deployment options that our customers
the Opening Bell® on January 17th to
age security camera which safeguards need to exceed expectations, move ahead
celebrate the company’s listing on the
your home and workplace, every single of the competition, and quickly take
New York Stock Exchange (NYSE). Avaya
microsecond even while you are away advantage of such new technologies as
embarks on a new journey following a
at work or on-the-go! artificial intelligence, blockchain and
successful balance
This New Year makes the Internet of Things.”
sheet restructuring
a resolution to bring that shed billions
Safety FIRST! Easy to
Hikvision Tops IHS Markit List
of dollars in debt,
configure, the iBall freeing up $300
of Enterprise Storage Providers
Guard PT HD Camera million in cash for the First Time
lets you connect flows for investment Hikvision announced that the
the devices such in technology company has been ranked as the world’s
as Android and iPhone smartphones innovation and growth. “On behalf of largest provider of branded SAN, NAS
with Wi-Fi Hotspot enabling Real our entire team, our customers and and external DAS storage used in video
Time Viewing. Its truly exceptional partners, it is an honor to mark this surveillance in 2016, with the largest
feature is the embedded best-in-class first day of trading on the NYSE for

Qlik appoints Arun Balasubramanian as new Country


Manager for India
Q lik has announced the appointment of Arun
Balasubramanian as its Country Manager for India.
In his role at Qlik, Arun will be responsible for leading
estimated market share of 22.1%,
according to the latest reports from IHS
and expanding Qlik’s operations in India. His deep Markit. “This is the first time Hikvision
experience in the Indian IT market and with cloud and has been ranked as the number-one
subscription delivery models will add greater depth to provider in the enterprise storage
and drive growth for Qlik’s countrywide operations. Arun business. It speaks about the success, we
will report to Julian Quinn, Regional Vice President, Asia had in the video surveillance market,
Pacific. With over 20 years of experience in the IT industry, especially in large-scale projects with
Arun has a distinguished track record of sales and market city-wide storage demands,” said Keen
accomplishments in India, and has held senior executive Yao, VP at Hikvision International
positions at HP, CA Technologies, and Salesforce. .Julian Business Centre. “As our customers
Quinn, Regional Vice President, Asia Pacific, Qlik, said, “We continue to see the great value of
are delighted to welcome Arun to the Qlik family. India is employing surveillance data to boost
a growing market for Qlik, and we believe in the immense end users’ businesses, enterprise-level
potential and promise that data analytics and user- data storage is becoming an increasingly
driven business intelligence holds for the country. Arun’s important part of a solutions approach
proven expertise in leading high-performance teams and to data-centred needs.” Yao explained
delivering sales accuracy and execution, combined with Hikvision’s growth in storage capacity
his cross-industry market knowledge and ability to build by increased customer demand for
partner ecosystems to drive scale, makes him the right valued data.
candidate to drive Qlik’s next chapter of growth in India.”

9
NSSNews 30 January2018 NSS

delivers application control and and evaluated by an independent


Fortinet Protects Operational panel of IoT industry experts, with
defensive signatures specific to critical
Technology Deployed in the infrastructure and industrial sector the highest scored nominee being
Harshest Environments organizations, including utility, oil and named the winner in each category.
Fortinet announced the availability of gas, transportation, and manufacturing. Data is now generated faster than
its Operational Technology (OT) Security Critical infrastructure is being ever before as increasing numbers of
solution for critical infrastructure increasingly targeted by cyber criminals, devices and purpose-built business and
and industrial organizations. The new with a reported 51% of organizations industrial machinery are connected to
solution integrates ruggedized firewall, experiencing a SCADA/ICS security the internet. Many enterprises face a
switching, and wireless access point breach within the past 12 months. The formidable, three-pronged challenge:
consequences of a successful attack they must manage and analyze the
can lead to the disruption, and even volume, variety and complexity of data
destruction of physical assets and generated from disparate sources, both
appliances with FortiGuard industrial essential services like water, electricity, at the edge and in the core, and then
threat intelligence to provide integrated and fuel. extract insight and generate business
cybersecurity protections for industrial value. It was with these challenges in
control systems (ICS) and supervisory
Hitachi Vantara Wins IoT mind that Hitachi developed Lumada.
control and data acquisition (SCADA) Breakthrough Award for IoT
systems deployed in the field and Innovation eScan establishes its
non-environmentally controlled Hitachi Vantara announced that Commitment to Global
facilities across an organization’s OT Hitachi’s Lumada IoT platform has Standards with ISO Certification
infrastructure. The Fortinet Security been awarded a 2018 IoT Innovation MicroWorld Software Services Pvt. Ltd.
Fabric enables critical infrastructure Award for Enterprise Solution of has retained its ISO 9001, ISO 14001 and
and industrial organizations to deliver the Year by IoT Breakthrough. The ISO 27001 certification by Euro Veritas,
advanced segmentation, access control, IoT Breakthrough Awards program a global certification leader. Standing
and malware protection needed to
true to its commitment to providing
unify their security architecture and
the highest quality products and
defend their OT networks regardless
services, the certification is a significant
of the operating environment. recognizes innovative technologies and milestone
Fortinet’s ruggedized security products exemplary companies that are driving in the
enable industrial organizations to innovation in the internet of things continual
protect their OT infrastructure and (IoT) market. This year’s program efforts to
devices, even those deployed in harsh attracted more than 3,000 nominations improve
environments that would render other globally in a broad range of categories, and reflects MicroWorld’s ongoing
security devices inoperable. Fortinet’s including industrial and enterprise IoT, investment in technological
industrial-grade appliances leverage smart city, connected home and home advancements and product
its recently announced FortiGuard automation, connected car and more. development. Euro Veritas has audited
Industrial Security Services, which All award nominations were reviewed the company MicroWorld to confirm
the determination towards security and
Toovio Forays in Indian Market protection of the client data and that of
users complies with the requirements
T oovio, announced its entry and direct presence in
the fast-growing India market. Toovio is a SaaS-
based marketing solution provider focused on enabling
of the standard. MicroWorld’s
certification of compliance applies
to all facets of the business and
multi-channel offer orchestration, built from the most
validates that its policies, practices
sophisticated decisioning framework and capable of
and procedures ensure consistent
managing the complete customer life cycle. Toovio
quality of the services and products
assists a range of industries in driving profitable business
that are delivered every day to its
between the organization and its customers. Ashutosh
clients. The important ISO 27001:2013
Mehrotra, Business Head at Toovio Software said, “As
information security management
businesses head towards the modern age of analytics,
systems (ISMS) certification is the most
we are excited to officially introduce ‘Toovio’ in India.
widely recognized and prestigious
We envision teaching machines to understand people.
standard for information security
Specifically, to teach machines to customer behavior and
management. ISO 9001:2015 stands for
understand marketers’ strategy, tactics and objectives so
the integrated quality control processes.
it may better apply advanced data technology solutions
ISO 14001:2015 stands for workspace
that are consumable and deployable by organizations at
compliance with environmental
large. Toovio values stand tall as we judge ourselves by
standards to protect and safeguard
quality, speed and the cost of applying data technology
towards emissions of harmful
solutions.” Toovio is committed to provide zero-cost
substances and hazardous materials and
based deployment, short time to value, most trusted,
to reduce pollution and destruction of
truly scalable, cutting edge technology for wireless
the environment. According to Govind
telecommunications, retail, banking, healthcare, and
Rammurthy, Managing Director and
other consumer-based companies.
CEO, MicroWorld Software Services

10 T /OnlineNCN f /ncnonline.net W /ncnonline.net


NSSNews 30 January 2018 NSS

Pvt. Ltd., “We are delighted of this It is equipped with the latest generation D-Link Expands Range of
accomplishment for the second time of Intel® Xeon® processors and offers
in a row owing to the continuing highly predictable performance across
Google Assistant-Compatible
challenging work and dedication of our millions of configuration options to meet Products
team. It demonstrates our adherence any use case. Gurpreet Singh, Managing D-Link announced that its
to the standards of best practices and Director at Arrow PC Network said, mydlinkDCS-8000LH HD Mini Wi-
processes for information security “Hyper convergence is and will play Fi Camera, DCS-8100LH HD Wi-
management.” Shweta Thakare, a crucial role in coming years. Today, Fi Camera, DSP-W115 Wi-Fi Smart
Senior AVP - Europe, APAC & SAARC, Hyper convergence Plug, and DSP-W245 mydlink Wi-Fi
MicroWorld Software Services Pvt. Ltd., infrastructure is Power Strip will work with the Google
said, “Priding ourselves on the highest a hot topic and Assistant by the end
standards of quality, together we have undoubtedly market is witnessing a of the month. Users
created a workplace that values and shift towards it. HCI helps in bringing can ask the Google Assistant to show
operates to benefit our clients moving together all the important trends that their camera’s live view on a television
ahead. ” enterprise IT struggles to handle.” “We or display when connected to a Google
are thrilled to take VxRail solution/ Chromecast device. The mydlink Wi-
Arrow PC Network is the appliance to the Indian market as it is Fi Smart Plug and Wi-Fi Power Strip
Platinum Partner for Dell EMC the only solution in the market, which can also be turned on and off with the
VxRail has been developed keeping the specific Google Assistant. “D-Link’s new product
needs of the companies in mind. It will integrations with the Google Assistant
Arrow PC Network has recently
definitely deliver the new standard provide users the ability to control their
added Dell EMC VxRail solution to their
in hyper-converged infrastructure mydlink Cameras and mydlink Smart
kitty. Powered by vSAN and offered with
transformation. It provides the Plugs with the power of their own voice,”
Dell EMC PowerEdge servers, VxRail is
flexibility and agility required to meet said President and CEO Anny Wei. “We
the only specifically developed and fully
current and future business needs plan to continue expanding the range of
optimized hyper-converged appliance. It
without ripping and replacing current Google Assistant-compatible products
is a joint effort of Dell EMC and VMware
infrastructure components, which to provide more home automation
for organizations looking to shift to HCI.
makes it exceptional,” he added further. possibilities for smart homes.”

11
NSSNews 30 January2018 NSS

Chief Research Officer, Jyrki Rosenberg, consolidating security components. All


F-Secure organizes APJ business sectors are now experiencing
EVP, Corporate Security Business Unit
Partner Summit 2018 in Bali and Jimmy Ruokolainen, Vice President, Gen V (5th Generation) cyber attacks
for its business associates Product Management at F-Secure. Amit which are characterized by being large-
from India, South East Asia and Nath, Head of Asia Pacific (Corporate scale and fast moving across multiple
Japan Business), F-Secure said, “Our global industries. These sophisticated attacks
success is incomplete without the on mobile, cloud and various enterprise
F-Secure organized a three-day networks, easily bypass conventional,
contribution of regional channel
‘APJ Partner Summit’ for more than 50 static detection-based defenses being
partners in their respective countries,
channel partners hailing from India, used by most organizations today. To
who have constantly worked in tandem
South East Asia, Australia and Japan. protect networks and data against these
with us to ensure F-Secure’s top-of-the-
The event was held in Holiday Inn attacks, organizations need to move up
line security products are extended
seamlessly to our end-users. Meanwhile, to Gen V cyber-security using Check
they’ve also served as an active Point Infinity, which combines real-time
communication link, giving us first hand threat prevention, shared intelligence
inputs of customers’ requirements, for and the most advanced security across
further evolving our product offerings networks, cloud and mobile.“Enterprises
and making them even more relevant need to protect themselves from
in today’s bourgeoning and complex sophisticated—and dangerous—attacks
Resort, Baruna Bali, and witnessed the on all fronts: network, endpoint, mobile
business landscape. This summit is a
participation of the global leadership and cloud,” said Doug Cahill, group
token of appreciation for our channel
team of F-secure. The vision behind the director and senior cyber security
partners’ unrelenting and extraordinary
summit was to recognize, appreciate and analyst at market research firm,
efforts that have built the truly global
underline the significant contributions Enterprise Strategy Group. “These latest,
and prominent identity enjoyed by
of F-Secure’s valued channel fifth generation attacks (Gen V) require
F-Secure today.”
partners while apprising them of the a comprehensive fifth generation cyber-
developments in the emerging threat Check Point Technologies security solution, such as Check Point’s
landscape. The summit took place in the Announces Infinity Total Infinity Total Protection, to keep critical
presence of F-Secure’s top management
who addressed the channel partners on
Protection business data safe from potentially
Check Point Software Technologies devastating attacks across the entire
a variety of subjects that would help enterprise.”
them better understand the dynamics Ltd. has announced Infinity Total
Protection: a revolutionary security
of the cyber security realm, its complex
consumption model that enables
Huawei Unveils Whole Home
demands and how F-Secure’s products Wi-Fi Solution at CES 2018
are perfectly poised to cater to this enterprises to prevent Gen V cyber
dynamic space. The key note speakers attacks. This innovative model utilizes At CES 2018, Huawei Consumer
included Samu Konttinen, President & Check Point Infinity Architecture Business Group unveiled a hybrid
CEO, F-Secure Group, Mikko Hypponen, components, providing the highest levels whole home Wi-Fi system, a ground-
of security, while also reducing cost by breaking solution that delivers
blazing fast wireless connectivity for
today’s smart, connected homes. The
VIVOTEK and Trend Micro Announce Strategic Partnership in HUAWEI WiFi Q2 features a dynamic
Cybersecurity interplay of advanced hardware and

V IVOTEK and Trend Micro Incorporated announced


a strategic partnership to offer cutting-edge cyber-
defense solutions. With VIVOTEK’s profound experience
software to boost speed, reliability, and
range; delivers full-coverage wireless
connectivity that’s simple to set up; and
in IP surveillance and Trend Micro’s extensive expertise guarantees a
in cybersecurity, the partnership enables users to enjoy stable signal
higher levels of network security when deploying throughout
VIVOTEK’s network cameras and strengthen defenses the entire
in response to the emerging security challenges of the home. “We
Internet of Things (IoT). The brand new VIVOTEK are streaming
cybersecurity enhanced products will be launched more content
by the end of January. Dr. Steve Ma, Vice president of than ever before, more music, more
VIVOTEK Brand Business Research & Development movies, and more social media on
Division, commented, “Our approach requires a tight more connected devices, which makes
integration between hardware-based security features fast and reliable Wi-Fi an essential
and software applications. Joining forces with Trend need,” said Richard Yu, CEO, Huawei
Micro is a vital step and together we are proud to roll Consumer Business Group. “The
out the first cybersecurity enhanced network cameras HUAWEI WiFi Q2 offers today’s
in the IP surveillance industry. Thanks to Trend Micro families a hybrid whole home Wi-Fi
IoT Security for Surveillance Cameras (TMIS-CAM) system with a reliable, flexible solution
solution, these cameras are able to automatically detect that expands Wi-Fi throughout our
and prevent credential attack and block suspicious homes.”Current home Wi-Fi Systems
events.” depend heavily on the shape and size of

12 T /OnlineNCN f /ncnonline.net W /ncnonline.net


NSSNews 30 January 2018 NSS

home, and even on the location of the Chhattisgarh. CHiPS had selected protecting their identities with personal
power sockets to efficiently transmit Aurionpro, a recognized leader known monitoring, financial monitoring and
signal. In addition, cumbersome for its expertise and experience across recovery tools needed to keep identities
installation and configuration processes various leading government projects personal and secured. Additionally,
can create unnecessary complications and initiatives, through an open bidding through new partner innovations with
for most consumers. Huawei WiFi Q2 process, as its System Integrator. D-Link and Samsung, McAfee delivers
addresses those setbacks through a Aurionpro worked with Dassault in the key areas of the connected home,
mesh Wi-Fi with a unique G.hn gigabit Systemes to create a feature called mobile security and privacy. The rapid
PLC module, which can easily traverse e-MB based monitoring that is used evolution of today’s threat landscape
walls and break physical barriers. extensively in the Centralized Project extends security needs into all facets of
HUAWEI WiFi Q2 also features an Monitoring Unit. The e-MB feature consumer’s digital lives. Realizing this,
easily installation and configuration seamlessly uplinks to the highest level of McAfee understands that consumers
process, able to set up the main unit in dashboards and provides Real Time data need more than traditional antivirus
five steps and enjoying plug-and-play on all ongoing projects. This facilitates software and has expanded its offerings
connectivity for all sub-units. effective monitoring, informed decision to protect privacy on the go, connected
making and timely interventions to home devices, family safety and
Aurionpro wins Dr. Abdul ensure projects progress on time, as per identity from theft or misuse. McAfee
Kalam Award for CHiPS schedule and within budget. Identity Theft Protection, McAfee
Aurionpro Solutions announced that Secure Home Platform, McAfee Safe
their initiative along with CHiPS, nodal
McAfee Moves Beyond Family and McAfee Safe Connect help
Agency of State of Chhattisgarh has been Traditional Antivirus to Protect offer consumers peace of mind in an
accredited by the most prestigious 2nd Customers’ Identity, Connected ever-changing digital world fueled by
edition of Dr. Abdul Kalam Award for Homes and Wi-Fi Connections volume, speed and complexity. With
innovation in IT applications category. the addition of these products, McAfee
McAfee announced a new identity has realized growth in customers
Government of Chhattisgarh (GoCG)
theft solution that goes beyond along with global OEM, TEM, ISPs
has been investing significantly in the
traditional antivirus to empower and telecommunications companies
state to build physical Infrastructure -
consumers to stay protected in the wake partnering with McAfee to help keep
Highways, Bridges, Water & Electrical
of recent massive data breaches. With their customers safe.
distribution systems, etc. Chhattisgarh
Infotech Promotion Society (CHiPS) is
the nodal agency and prime mover for
Hitachi Systems Micro Clinic
propelling IT growth & implementation to Strengthen its Workforce by
of the IT & e-Governance projects in
McAfee Identity Theft Protection, the
20%
the state. CHiPS initiated a Central Hitachi Systems Micro Clinic Pvt.
company continues to deliver innovative
Project Management Unit (CPMU) Ltd. announced its plan to increase its
solutions that help make the digital
for monitoring and ensuring timely workforce by 20%. The company will
world a safer place to live, work and play.
execution of projects to support add campus hires and experienced
McAfee Identity Theft Protection allows
these state development projects in candidates in all functions to fuel
users to take a proactive approach to
growth and is making existing talent
compatible with the changes. The thrust
SUSE Names Infosys to Top Tier of Partner Program on hiring talent is driven by the rapid
disruption and inroads to automation,

S USE has named global consulting, technology


and next-generation services provider Infosys
as its first global Solution Partner in the top tier
of the SUSE Partner Program. In addition, Infosys
has chosen SUSE Linux Enterprise Server for SAP
Applications - the leading platform for SAP HANA digital and cloud computing. For college
and SAP S/4HANA among customers globally - as its recruitment, an all India campus hiring
preferred platform for SAP HANA Transformation process will begin in Tier II colleges
Programs. This reflects Infosys’s commitment to offering specialised IT courses. The
build SUSE solutions into their IT transformation conscious decision to recruit graduates
offerings, particularly the cutting-edge services from Tier II colleges is aimed at hiring
Infosys has developed around SAP and ecosystem bright and ambitious students by not
applications on Infosys managed private cloud. only focussing at Tier I institute but also
Infosys is a global leader in technology services towards the quality of students and the
and consulting that enables clients in 45 countries culture of the university. This process
to create and execute strategies for their digital of recruitment has been envisioned to
transformation. From engineering to application hire bright and ambitious candidates
development, knowledge management and according to their capability and job
business process management, Infosys helps clients fitment, with no biases related to age,
find the right problems to solve, and to solve these gender, religion and geography.
effectively.

13
Hot ‘n’ Happening 30 January2018 NSS

CP PLUS Hosts Grand Treatment for its


Partners
C P PLUS, recently treated its
partners with premier tickets to
the blockbuster Tiger Zinda Hai; a real-
time sneak peek into the Bigg Boss
House; and exclusive tickets to Salman
Khan’s The“Da-Bangg– The Tour”.
Managed under the CP PLUS Partner
Reward Program, these initiatives are
taken towards engaging and rewarding
partners for their outstanding
contribution towards the organization’s
growth.
CP PLUS has always placed a lot of
emphasis on facilitating and enabling
its partners through a variety of
initiatives such as training & hands-
on experience, service support and
exciting performance rewards. To keep
its partners motivated and engaged with
the brand, special attention is given
designing and executing such initiatives India were treated to the premier of the inside the house. CP PLUS also gave
from time to time. blockbuster Tiger ZindaHai, starring select partners tickets to the popular live
“Our partners are important to us; Salman Khan and Katrina Kaif. Select entertainment show, Da-Bangg– The
they lay an important role in the growth partners were also given a once in a Tour, which stages star performances by
of our organization. Through such lifetime opportunity of visiting the BIGG Salman Khan and his troupe (Sonakshi
events, we wish to reward their efforts BOSS House, for which CP PLUS was the Sinha, Prabhu deva, Kriti Sanon, Meet
and keep them motivated”, said Yogesh official security partner. Partners could Bros, Maniesh Paul & Daisy Shah) world
B. Dutta, COO, CP PLUS. watch the inmates live, uninterrupted over. CP PLUS was the official security
More than 4200 partners from across and unfiltered, living a regular day partner for this show as well.

Seclore wins CIO CHOICE 2018 Award


S e c l o r e
R i g h t s
Management,
Vishal Gupta, CEO at Seclore.Seclore’s Rights Management
solution enables organizations to control the usage of files
wherever they go, both within and outside of organizations’
the most boundaries. Featuring dozens of pre-built connectors for
w i d e l y leading enterprise applications (EFSS, DLP, ECM, ERP, and
a d o p t e d email), Seclore automates the protection of documents as
solution for they are downloaded, discovered, and shared to accelerate
persistently adoption. With over 6 million users in over 1000 companies
securing in 29 countries, Seclore is helping organizations achieve their
and auditing data security, governance, and compliance objectives. “We
enterprise live in a hyper-connected world where the sharing of data is
data, has been recognized by CIO CHOICE for driving essential to conducting business. With Rights Management, we
innovation in data-centric security. Seclore’s fully browser-based create a business ecosystem where information can be shared
Rights Management Solution enables enterprises to leverage seamlessly and securely while giving organisations complete
the power of data-centric security, without requiring downloads control over its usage,” stated Vishal Gupta.Seclore’s efforts
or agent installs. The Seclore solution is also equipped with in ensuring seamless sharing of data without compromising
powerful features and pre-built connectors that automate the on security for organizations have been duly recognized by
protection of files and reduce the friction of adoption. “The leading global analysts, associations and industry bodies.
CIO CHOICE recognition is a huge validation of our consistent It has been named a “Gartner Cool Vendor”, “Information
endeavor to build innovative products that address pressing data Rights Management Vendor of the Year” by Frost & Sullivan
security concerns and enable secure external collaboration,” said and has received the “Cyber Security Excellence Award”.

14 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Hot Product 30 January2018 NSS

D-Link: CCTV Bullet Camera


O ver the years D-Link has developed an
extensive line of surveillance solution
suitable for deployment across various
industries. D-Link comprehensive range of
CCTV Analog HD camera & DVR solution
are suited for both indoor as well as outdoor
application. D-Link CCTV bullet cameras
are designed for easy deployment, and can
be mounted anywhere be it indoor, outdoor,
wall, ceiling etc. All these cameras feature
exclusive D-Link CCTV App that allows
ones to monitor home or business in real
time. D-Link CCTV cameras also support
DCMS software, a surveillance solution for
managing multiple cameras /NVR /DVR. It
is useful for Camera /NVR management, real
time surveillance and video management.
D-Link CCTV product range includes Analog
HD Camera (Dome + Bullet), DVR, DVR
Enclosure, and CCTV Cable box.D-Link also
offers free DCMS Software that is capable of
viewing up to 64 channels.

NETGEAR:
Nighthawk R7000P AC2300 Wireless
Router
T he R7000P is a unique
solution in that it fits itself
into a new class between AC1900
app for iOS and Android. NETGEAR
markets this solution to consumers
with very large homes with its dual
and AC2600. This new class band configurations. As mentioned
offers a 600 Mbps above, this router is equipped with
802.11n 2.4GHz Beamforming+ allowing for increased
band with 256QAM range. Five Gigabit Ethernet ports aid in
support and a 1625 both wired network connections and the
Mbps 5GHz band, WAN connection to your modem. Two
together making USB ports allow for high throughput
this an AC2300 class storage access to ReadyShare features
solution. NETGEAR such as Vault and ReadyShare Cloud.
has added in some On the hardware side, this platform
technologies to its houses a dual-core processor operating
Wave 2 Nighthawk at 1GHz. 256MB of DDR3 and 128MB
solution including MU-MIMO, of flash are paired with it. Dimensions
Beamforming+, and the come in at 11.2 x 7.2 x 1.9 Inches with
introduction of NETGEAR Up weight topping.

16 T /OnlineNCN f /ncnonline.net W /ncnonline.net


17
Special Story 30 January2018 NSS

A s we step into the new year, 2018


and embrace the fast changing
digital world, on the behind we leave a
“Ransomware is big business on the
dark web”
extorting currency from their victims,
but by selling kits buyers could use to
make and distribute their own.
trail of 2017 marred with cyber-attacks Mr. Sunil Sharma, Managing Director Sales for
We’ve seen a number of different
which have been more sophisticated Sophos India & SAARC
services and pricing models in the past
and lethal in a way that sabotaged many Businesses of year, and expect to see many more
industries to individuals with huge all sectors and in 2018. One of the biggest examples
financial loses as well as personal data sizes, institutions is Cerber. With this in perspective
loss. This raises the bar towards stronger of learning, WannaCry, RaaS will continue to alter
cyber security and defence against the corporate boards, the ransomware landscape.
growing menace of cyber-attacks, which the insurance
That being said, it’s impossible to
needs round the clock vigil and vigor to industry and
predict what will happen in 2018 with
protect the industries and individuals governments
100-percent accuracy. But it’s a fair bet
for protecting the valuable data and are increasingly
that Android and Windows will continue
business continuity. t r e a t i n g
to be heavily targeted with ransomware
The trends also showed that AI and information security seriously and
and other malware, given the success
machine learning becoming the de facto saliently. Attitudes toward information
attackers have had this far.
norms of adoption for future growth security are shifting from an
afterthought that is taxing or punitive, As attackers continue to exploit
of businesses and industries. Cyber
to a forethought that is among any flaws in software, fragility in complex
security solutions also now adopted it to
project’s core requirements. systems, human susceptibility to social
be prepared for any untoward incidents
engineering, and remain under the
arising out of the weakest link of cyber According to a SophosLabs report,
shroud of anonymity provided by
security that is human error. India was amongst the top 7 countries
the internet and crypto-currencies,
We asked the security professionals to be affected by ranswomware in 2017.
innovation in information security
for predictions and thoughts as to how A recent Sophos global survey revealed
seeks to anticipate and stay one step
the information security landscape will that 54% of organizations were hit by
ahead of this, powered by deep learning
evolve in 2018 and were overwhelmed ransomware in 2017 and on average
technology that can prevent, detect and
by the response, so we want add new companies reported 2 ransomware
respond to today’s and tomorrow’s cyber
predictions from the industry experts attacks. Ransomware is big business on
threats.
offering insight and thoughts for 2018. the dark web. Its creators realized they
could make more money not just by SophosLabs will continue to do

18 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Special Story 30 January 2018 NSS

its part to stop malware in its tracks. Reaper, we predict that cybercriminals take on a new face by leveraging AI
Enterprises must continue to educate will replace botnets with intelligent to create sophisticated new code that
employees and end users on the social clusters of compromised devices called can learn to evade detection through
engineering tactics attackers use to hivenets to create more effective attack machine written routines. With the
trick them into downloading malware. vectors. Hivenets will leverage self- natural evolution of tools that already
They must also continue to keep track learning to effectively target vulnerable exist, adversaries will be able to develop
of vulnerabilities and patches that affect systems at an unprecedented scale. They the best possible exploit based on the
their systems. will be capable of talking to each other characteristics of each unique weakness.
and taking action based out of local Malware is already able to use learning
“Cybercriminal marketplace is adept intelligence that is shared. Additionally, models to evade security, and can
at adopting the latest advances in “zombies” will become smart, acting produce more than a million virus
areas” on commands without the botnet variations in a day. But so far, this is all
Mr. Jitendra Ghughal, Director Channels, India herder instructing them to do so. As just based on an algorithm, and there is
& SAARC, Fortinet a result, hivenets will be able to grow very little sophistication or control over
exponentially as swarms, widening their the output. FortiGuard Labs recorded
Individuals
ability to simultaneously attack multiple 62 million malware detections in one
have a growing
victims and significantly impede quarter in 2017. Out of the millions
expectation for
mitigation and response. Although of malware detections we recorded,
instant access
these attacks are not using swarm we saw 16,582 variants derived from
to highly
technology yet, because they have the 2,534 malware families. One in five
personalized
footprint in their code, adversaries organizations also reported malware
information
could convert it to act with more self- targeting mobile devices. The increased
and services
learning behavior. Adversaries will automation of malware will only make
through a
use swarms of compromised devices, this situation more urgent this year.
variety of
or swarmbots, to identify and target Critical Infrastructure to the Forefront:
interconnected devices. This demand
different attack vectors all at once Recently, critical infrastructure
is driving the digital transformation of
enabling enormous speed and scale. providers continue to be at the top of the
both business and society. Keeping pace
FortiGuard Labs recorded 2.9 billion list in terms of the highest concern due
requires things like machine learning
botnet communications attempts all to both strategic and economic threats.
and artificial intelligence in order to
in one quarter in 2017, adding some These organizations run high-value
accelerate the ability to see, predict, and
context to the severity of what hivenets networks that protect vital services
respond to market trends.
and swarmbots could cause. and information. However, most
There is also a growing criminal
Ransom of Commercial Services is Big critical infrastructure and operational
element looking to exploit these new
Business: The threat magnitude of technology networks are notoriously
technologies. The proliferation of
ransomware has already grown 35 times fragile as they were originally designed
online devices accessing personal and
over the last year with ransomworms to be air-gapped and isolated. The
financial information, and the growing
and other types of attacks, but there is expectation to respond at digital speeds
connection and interconnection of
more to come. The next big target for to employee and consumer demands
everything – from armies of IoT devices
ransomware is likely to be cloud service has begun to change the requirements
and critical infrastructure in cars,
providers and other commercial services of these networks, driving the need for
homes, and offices, to the rise of smart
with a goal of creating revenue streams. advanced security on networks that
cities – have created new disruptive
The complex, hyperconnected networks were originally designed to operate
opportunities for cybercriminals.
cloud providers have developed can in isolation. Given the importance
Over the next couple of years, we will produce a single point of failure for of these networks, and the potential
see the attack surface continue to expand hundreds of businesses, government for devastating results if they are
while broad visibility and control over entities, critical infrastructures, and compromised or knocked offline,
today’s infrastructures diminish. The healthcare organizations. We predict critical infrastructure providers are
proliferation of online devices accessing that cybercriminals will begin to now finding themselves in an arms
personal and financial information, and combine AI technologies with multi- race with nation-state, criminal, and
the growing connection of everything vector attack methods to scan for, detect, terrorist organizations. The boldness
– from armies of IoT devices and and exploit weaknesses in a cloud of adversaries and the convergence of
critical infrastructure in cars, homes, provider’s environment. The impact operational and information technology,
and offices, to the rise of smart cities of such attacks could create a massive makes critical infrastructure security a
– have created new opportunities for payday for a criminal organization and priority in 2018 and beyond.
cybercriminals and other threat actors. disrupt service for potentially hundreds The Dark Web and Cybercrime Economy
The cybercriminal marketplace is adept or thousands of businesses and tens of Offer New Services Using Automation: As
at adopting the latest advances in areas thousands or even millions of their the world of cybercrime evolves, so
such as artificial intelligence to create customers. does the dark web. We expect to see
more effective attacks. We anticipate this
Next-gen Morphic Malware: If not this new service offerings from the dark
trend to accelerate into 2018, enabling
year, soon we will begin to see malware web as Crime-as-a-Service organizations
the destructive trends mentioned below.
completely created by machines based use new automation technology for
The Rise of Self-learning Hivenets and on automated vulnerability detection their offerings. We are already seeing
Swarmbots: Building on sophisticated and complex data analysis. Polymorphic advanced services being offered on dark
attacks like Hajime and Devil’s Ivy or malware is not new, but it is about to web marketplaces that leverage machine

19
Special Story 30 January2018 NSS

learning. For example, a service known landscape’s “ T h e


as FUD (Fully Undetectable) is already evolution, it adoption of
part of several offerings. This service is evident that cloud, the
allows criminal developers to upload both attackers i nv a s i v e
attack code and malware to an analysis and defenders Internet of
service for a fee. Afterwards, they receive will deploy Things, and
a report as to whether security tools artificial the growing
from different vendors are able to detect i n t e l l i ge n c e traditional
it. To shorten this cycle, we will see in earnest physical and
more machine learning used to modify in 2018. It s o f t w a r e
code on the fly based on how and what will be very s u r f a c e s
has been detected in the lab in order to interesting to see how businesses and have only increased organizations’
make these cybercrime and penetration authorities brace for its impact. Here is vulnerability to attacks. Topping it all,
tools more undetectable. Sandbox our perspective on how this development social engineering presents one of the
tools bolstered with machine learning, will unfold. largest threats to businesses. Today,
allow us to quickly identify previously New age cyber-attacks will target traditional security mechanisms have
unseen threats and dynamically create an exponentially larger number of little edge in combating the various
protections. There is no reason why this nodes than previously possible, taking menaces plaguing the security landscape.
same approach couldn’t be automated advantage of the ever-increasing Governments too have stepped in with
and used in the other direction for interconnectivity within businesses new regulations- initiatives such as EU
mapping networks, finding attack created by Cloud, Mobile and IoT GDPR don’t merely protect information
targets, determining where those attack devices. These attacks will be faster and but also authenticate legitimate users.
targets are weak, or blueprinting a will evolve on their own. They will learn The consequences of noncompliance are
target to conduct a virtual penetration from their interactions with customer huge, prompting industry bodies to set
test and then building and launching a devices and applications, and adapt their the framework for information security
custom attack. approach to maximize their chances of in business operation. The focus on
Staying Ahead of the Threats: Trends and success. These AI-led attacks will evolve compliance; virtual, cloud and endpoint
Take-Aways: There is an opportunity over time allowing attackers to rapidly security; and emerging technologies
for enterprising cybercriminals discover and exploit vulnerabilities in will dominate much of the discussion in
enabled by advances in automation your network. 2018 security landscape. “
and artificial intelligence to use the In short, in 2018 any business still “2018–Bringing future of work to
right tools to severely compromise our using traditional MSSPs, or solely
digital economy. Security solutions
life”
depending on monitoring tools like
need to be built around integrated Mr. Makarand Joshi –Area Vice President and
SIEM, will find themselves vulnerable to
security technologies, actionable Country Head, India Subcontinent, Citrix
a host of cybersecurity threats including
threat intelligence, and dynamically data breaches, ransomware attacks and Organisations’
configurable security fabrics. Security service disruptions. reliance on
should operate at digital speeds by technology has
There will be only one solution - fight
automating responses as well as never been as
fire with fire. We predict cybersecurity
applying intelligence and self-learning, pronounced as
experts will combat the new wave of AI-
so that networks can make effective it is today. The
powered cyber-attacks with their own
and autonomous decisions. This will last few years
AI-driven security solutions.AI-driven
not only expand visibility and centralize have been crucial
Managed Detection and Response
control, but also enable strategic for technology
(MDR) services – which combine threat
segmentation in order to drive security adoption and
prevention, detection and response for
deep into the network infrastructure to evaluation in India. On one hand we saw
end-to-end cybersecurity – will emerge
quickly identify, isolate, and remediate the emergence of digital native, cloud
as the only effective cyber defence
compromised devices and thwart first start-ups eager to disrupt established
to outrun attackers. As a leader in the
attacks, even across different network business process, and on the other we
cybersecurity domain, we at Paladion
ecosystems, from endpoint devices and saw traditional businesses embrace
have combined AI capabilities with
local network resources to the cloud. transformational technologies at an
human expertise to extend high-
In addition, basic security hygiene astounding pace to help maintain their
touch Managed IT security services to
needs to become part of fundamental competitive edge. As new technologies
hundreds of global businesses. In 2018,
security protocols. It is something often get further integrated into the fabric of
we expect more businesses around the
overlooked, but crucial to limit the bad IT infrastructures, opportunities aiding
world will adopt AI-driven MDR services
consequences we want to avoid. growth and development of efficiency
to counter the new threat landscape.
enhancing processes will be unveiled.
“New age cyber-attacks will target “Virtual, cloud and endpoint This year, Citrix, has been focusing
an exponentially larger number of security, and emerging technologies on delivering technologies and solutions
nodes” will dominate” that help redefine the workplace. With
Mr. Jose Varghese - EVP and Head MDR our digital workspace offerings, we have
Mr. Rahul Kumar, Country Manager, WinMagic
Services, Paladion Networks helped multiple organizations unlock
India
Evaluating the cyber threat productivity gains, thus improving their

20 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Special Story 30 January 2018 NSS

overall reaction time to the market learning is practised, should be endorsed. Furthermore, productivity analytics
realities and helping them position Organisations need to encourage will also be required as AI gets heavily
themselves to quickly take advantage of adaption of digital technologies like integrated into business processes, thus,
opportunities coming their way. automation, internet-connected devices, helping users to make more informed
Given this, we, at Citrix feel that and online communication tools, to data driven decisions that impact value
the following trends will play a major reduce the technology awareness gap delivery.
role in shaping the coming year and across groups. In conclusion, we believe that 2018
thus will need serious consideration by Digital Upskilling will be the year enterprises will work
organisations who intend on revamping In an increasingly digital India, towards harnessing opportunities
their IT construct in tandem with the digital literacy has become imperative created by integration of new
evolving technology landscape - and almost every job today requires technologies. We see a huge surge in the
The future is cloudy employees to interface with a digital adoption and usage of digital workspace
medium. With technology drastically technologies, which will create ripples
Cloud and cloud enabled SaaS
changing older operational efficacies in the earlier established organisational
apps are here to stay. Cloud opens a
across the board, businesses are hard structures. Digital workspaces will help
completely new facet for technology
pressed to transform their business organizations across various facets of
adoption and operational efficiency.
processes and workflows to remain operation, ranging from talent retention
Capabilities around analytics, AI,
relevant in their operational space. in HR, productivity in operations, data
robotics that have been integrated into
Organizations will have to reskill their driven decisions in finance, improved
cloud based offerings are proving hard
staff and re-architect their IT strategy customer engagement in sales and so
to emulate using traditional on-premise
to stay relevant. Hiring trends will on.
deployments due to cost, complexity,
and skill considerations. Businesses, also see a shift the newer generations In the bargain, stakeholders will
therefore, will have to evaluate the joining the workforce are increasingly experience both the benefits and
capabilities of the cloud offerings mobile and technology savvy, it will the transitional side-effects of this
alongside on-premise offerings and be increasingly difficult to attract the wave of change. However, workspace
accordingly implement an environment best people in this talent pool without transformation is inevitable, and the
spread across cloud platforms that best extending capabilities like mobile benefits far outweigh the transitional
meets their capability and productivity digital workplaces and BYOD. As hurdles that might come up.
goals. Applied cloud strategy, evolving uncertainty continues to surround the
technology landscape, it has become
“Crypto industry is witnessing such
workload, need for business agility,
freedom of usage and usage based critical to create a system which focuses an extraordinary boom”
costs, will help businesses better on employee engagement and at the Mr. Shrenik Bhayani, General Manager,
understand the relevance of a multi- same time paves a transformative path. Kaspersky Lab (South Asia)
cloud approach, further accelerating the This fundamental adjustment is pivotal Businesses
pace of technology transformation we for businesses to ensure they keep up and individuals
are experiencing today. with the fast-changing needs of digital alike make use
transformation. of financial
Rise of multigenerational workforces
Invasion of Analytics services. And
Employees are a critical driving
Multiple analysts state that in the wherever there’s
force powering the expansion and
coming couple of years as much as money, there
growth of businesses. Today’s workplace
75% of the applications used by the will always be
represents a vibrant mix of employees
enterprises will have some form of criminals both
comprising 4 generations. Each one
embedded AI. There is consensus common and cyber. Our experts reckon
of these generations have a different
amongst technologists that analytical that in 2018, the financial services
degree of comfort when it comes to
tools will become obligatory as market should brace itself for a new
technology usage and adoption. As job
companies try to improve customer round of cyberthreat development. Here
profiles become increasingly skill-set
interactions and increase value delivery. are some of our predictions:
focused and age-agnostic, organizations
need to work on simplifying and Application of analytic tools will be Cryptocurrency — in vogue in the
normalizing their technology platforms sought to ensure that secure digital cybercriminal world: Crypto industry is
to minimise productivity gaps between workspace provide the end-user with witnessing such an extraordinary boom
the digital natives and the non-digital the best possible experience across the that many financial institutions are set
natives. As work paradigms and devices they use. In addition, security to introduce cryptocurrency support
technologies change, we will see an analytics is also expected to gain for their services. On the downside,
even wider gap between generations. traction, as organizations will have cybercriminals smell an opportunity.
With 50 % of employees being digital to actively address threats from an Therefore, the industry will have to learn
natives who prefer not to be restrained increasingly mobile workforce and an to ward off attacks on cryptocurrency
by a location, and the rest comprising application base that spans multiple wallets and marketplaces.
of traditional non-digital employees, clouds. This approach will require the Speed increases danger: Payments
organisations will have to invest in enterprise security to level up and processed by financial services are
creating systems that regulate this gap. explore alternate security paradigms, constantly growing in terms of speed
In order to optimally utilize the talent at by detecting, predicting, and averting and volume, as is the load on information
disposal, a collaborative system wherein threats through accumulation and systems, including security solutions. At
knowledge is shared, and peer-to-peer analysis of data from different sources. the same time, consumers have already

21
Special Story 30 January2018 NSS

grown used to payments being near is too high – both for organizations who security portfolio that can address many
instantaneous, and they are not prepared purchase the products and the device pieces of security infrastructure, but
to tolerate delays. Amidst all the haste, makers who manufacture them. Rather may lack the specific approach that a
fraudulent transactions often slip in than focusing on the devices themselves, niche player has developed. Given these
under the radar. Therefore, to speed up we will see an increase in businesses mutual needs, we are likely to see more
the verification of payments with no looking to secure the entire network of these innovative companies acquired
impairment of service, companies will instead of each individual endpoint, by larger organizations who embrace the
have to use solutions based on neural which can help minimize both the risk innovation and are able to incorporate
networks and machine learning. and cost involved with maintaining these solutions into a broader security
If the door is locked, try the window: security across IoT devices. ecosystem. Consolidation will be king
Financial institutions are making strides Doubling Down on Bug Bounties: Bug in 2018.
toward better transaction protection: bounties – programs set in place by “Emergence of crypto-currency as
Support for smart cards at points of enterprises to pay white hat hackers who
purchase, biometric authentication, and discover and disclose vulnerabilities
the volatile commodity”
tokenization of payments have made in their products – took on a renewed
life harder for cybercriminals. To keep prominence in 2017 as more and more
their fingers in other people’s pies, organizations introduced or expanded
intruders will turn more and more to their offers. With heightened focus on
hijacking legitimate accounts. And that not only organizations’ products, but
means financial institutions will have also their practices, we are likely to
to find more reliable ways to verify the see more enterprises use bug bounties
identities of their clients. to both ensure their offerings are safe eScan security research team has
Fraud as a service: Lots of businesses and demonstrate their commitment to identified some of the key trends that
engage the services of third-party ethical conduct. In 2018, we can expect will emerge stronger as well as the most
organizations for apps, databases, cloud to see increased rewards and more targeted segments for security breaches.
computing, and much more. Seeing incentive-based programs as companies Some of them are as below:
the benefits of software as a service, look to use bug bounties as a way to Crypto currency: 2017, saw the
cybercriminals have rolled out similar appear transparent and dedicated to emergence of crypto-currency as the
models: Ransomware Trojans can be safety for both themselves and the volatile commodity, moreover, the
franchised or leased, for example, and broader public. volatility hasn’t subdued the interests of
DDoS attacks are available for order. Security Spend to Soar Across the Network: the investors. The latter half of 2017 saw
Anyone with the cash and the desire can The rise in high-profile cyberattacks Ransomware attacks with Wannacry in
hire an army of bots, set up phishing in 2017 has led many organizations to the forefront and their dependence on
websites, and lots more. Almost reconsider how they are allocating their Bitcoin. Cyber criminals will continue
everything underpinning the financial security budget in 2018. While much of to demand ransoms in crypto currency
cybercrime industry can be bought. the IT department is feeling the need because of the unregulated anonymous
The Fraud-as-a-Service model will open to do more with less, the percentage currency market.
the door to the world of cybercrime of budget that is allotted to security is 2018 would be the year of crypto
to newbies who lack once-mandatory continuing to grow. A recent study from currencies, with numerous players vying
skills and experience — which means PwC and Juniper Networks shows that for the stability of their currency and the
that companies and organizations need security is the most important priority latter half of 2018 may lead to market
to prepare themselves for a hike in the for both CIOs and VPs of IT when it consolidation, with the emergence of top
number of attacks. comes to their network solutions. Rather crypto currencies. Due to the spiraling
than dedicating funds to standalone price of the Bitcoin, in 2018, criminals
“Innovation within the security security products, though, we’re likely would shift their focus to other crypto-
industry is at an all-time high” to see security spend across more currencies and this would be the game
parts of the infrastructure. As security changer in the popularity of the crypto-
is embedded into each component of currencies.
the network, we can expect that more
The hard forks of the Bitcoin
security dollars will be invested across
resulted in the creation of Bitcoin Gold
the network infrastructure, not just in
Network on the Hook to Secure and Bitcoin Cash furthermore there are
standalone security solutions.
Enterprise IoT: IoT devices have been plans to introduce Bitcoin Silver, Bitcoin
Acquisition of Point Products on the Platinum which would fuel the growth
a cause for concern for consumers for
Rise: Innovation within the security of Bitcoin. With so many forks, the
the past several years now; however,
industry is at an all-time high, with investors would have to exercise caution
we are just starting to see the impact
countless startups and smaller security as the very likelihood of fake crypto-
that insecure IoT could have on larger
organizations developing products currencies, scams and Ponzi schemes
targets, including enterprises. For
that can greatly benefit organizations’ may surface in 2018.
an already burdened security team,
security. However, the majority of these
the increase in insecure IoT network Ransomware: Ransomware will
products are point solutions that provide
connections adds another set of continue to be a major threat in the
security for a small piece of the overall
concerns to their growing ‘to do’ list. year 2018. It is one of the easiest ways
infrastructure. Conversely, larger
The cost of adding security to each IoT for a cyber-criminal to extract money
organizations often have a wide-ranging
device or network-connected application from the victim. In 2017, we witnessed

22 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Special Story 30 January 2018 NSS

Wannacry and its usage of publicly government for flouting the norms laid no matter where it is located, is crucial.
available exploits viz. Eternal Blue for down for protection of their citizens’ Critical data continues to move to the
lateral movement within the network, data. With the enforcement of GDPR cloud, malware is constantly evolving,
2018 would highlight the importance of just a few months away, the latter half and despite growing investments in
patch-updates as a sure-way to mitigate of 2018 would witness a slew of privacy defensive technologies traditional
lateral movement by Ransomware. breaches by mobile app developers. security controls prove ineffective.
Furthermore, Ransomware creator may Furthermore, in 2017 users were “At the heart of our predictions
shift their loyalties from Bitcoin to other bombarded with fake apps and is a requirement to understand the
crypto-currencies, since the payment vulnerabilities discovered in Android intersection of people with critical
of the ransom has to be viable for the and iOS have forced companies like data and intellectual property,” said
victims and the surging price of the Google and Apple to innovate with Dr. Richard Ford, Chief Scientist at
bitcoin would be the contributing factor. their individual app stores and increase Forcepoint. “By placing cyber-behavior
2018, would also witness the custom vigilance of the apps. 2018 would be no and intent at the center of security,
pricing of the ransom based on the better and we may observe an increase the industry has a fighting chance of
country and the capability of the in incidents involving compromised keeping up with the massive rate of
targeted organization to pay up the devices. Although, a few of these change in the threat environment.”
ransom. Traditionally, spear-phishing incidents might be attributed to Jail-
was limited to Information Warfare; Breaks / Rooting using automation,
“Data technology will have an
however, we may find organizations but the primary focus of the malware immense impact on how companies
being actively targeted with specifically authors would be on fake apps. will be doing business in 2018”
tailored Ransomware so as to increase Cyber espionage between countries: Mr. Ashutosh Mehrotra, Business Head, APAC
the ROI for these criminals. Global Intelligence systems within Region at Toovio,
Improved Security of IoT Devices: Since many countries today have advanced Data analytics
the demand for smart devices and to an extent that they can effortlessly and business
other Internet of Things (IoT) devices extract data from across the world to intelligence will
are increasing every day, the need for frame strategies. The nation states have play crucial role
advanced security for these devices seen a new realm of spying in the form in the overall
has also increased. According to recent of cyber espionage. This new form business strategy
statistics, there will be almost 30 billion will affect the economic and political to make better
connected things in major industries relationships between nation states as and faster
and IoT will touch every role across the well as change modern warfare scenario. business decisions.
corporate. Simultaneously, the attacks Lastly, we can conclude that our users, Companies will continue to leverage
against these devices will also rise. readers and administrators should be the power of data analytics and look for
Besides, in 2017 IoT devices have on their toes to escape the deadly fangs “top line” to be specialized in the field
been targeted by various botnets of the cyber crooks. Implementation of data science. Undoubtedly, Machine
including the infamous Mirai botnet, of multi-factor authentication after Learning (ML) has come a long way in
which leveraged the vulnerabilities to understanding the exact requirement the past few years and has changed the
further attack the critical infrastructure. thoroughly will help the organization in way companies look the way they need
2018 would be a mixed bag and witness minimizing the chances of any kind of to do business. From voice-powered
the emergence of implementation of cyber-attacks. Use eScan and stay safe! personal assistants like Siri and Alexa,
security guidelines for the development to more underlying and fundamental
of IoT devices amongst the vendors.
“Predicts the Start of “The Privacy
technologies like behavioral algorithms,
Furthermore, 2018 would also be the Wars” suggestive searches, network
year of IoT Botnet attacks. optimization, pattern analysis, fraud
Increase in mobile hacking: 2017 was detection, customer identification,
the year which saw the emergence churn prediction, recommendation
of DDoS malware affecting Android engines, etc., these are a few examples
Devices, also witnessed the takedown of Adding to the constantly and applications of ML in use today.
WireX Botnet which had created havoc. shifting environment which security Finally
Information-stealing Mobile Malware professionals face is a perfect storm
Social engineering remains the
cannot be attributed to cyber criminals of drivers influencing debate around
greatest threat, and shows that security
alone, device manufactures have come privacy. This mega-trend will cause
is an ongoing process and not a problem
under fire for violating the privacy of tectonic shifts in the privacy landscape
to be solved. Companies, large and
its users and as a precautionary measure and influence the ways in which
small, need to understand that cyber
Indian Govt. had issued a diktat against organizations collect and manage data.
breaches can occur more than once and
a majority of device manufacturers, Forcepoint believes that the security are constantly threatening a business.
furthermore black-listed more industry has been focusing on the wrong Security has to be a combination of
than 40 apps developed by Chinese things. Traditional security perimeters perimeter defence, threat detection
organizations. are eroding or becoming obsolete, and training. Investing heavily in
Device manufacturers and App and so, rather than focus on building the necessary security measures will
developers would find 2018 to be very bigger walls, the industry needs better prevent businesses from falling victim
lucrative but would also come under visibility. Understanding how, when and to damaging cyber-crimes that will cost
the radar of privacy activists and why people interact with critical data, them dearly.

23
Trend 30 January2018 NSS

2018 – Year of the Hybrid


Cloud
means that there will be infrastructure will be treated as codes.
an increasing segment This means that ‘Infrastructure as code
of people who will look paradigm’ (IAC) will now kick in. IT
for solutions that will itself, IT management and planning
help them adopt hybrid of overall operations, will become
cloud solution because automated and agile.Developers will be
enterprises will needto able to write software infrastructure as
evaluate which application a code, making siloed hardware boxes
needs to be put on which function faster. We will see a lot of
kind of cloud. The idea of automation, self-service, a lot of private
running all applications cloud as a service to the end customer
on cloud will be replaced going forward. The focus on automation
with a more selective inside the Datacenter will drive ICA as
approach and having the a theme for IT teams to evolve their
hybrid cloud will help cloud management and datacenter
them to do just that. management strategies.
This trend has already Artificial intelligence
gained momentum in the Artificial intelligence (AI) is
global market and has developing but is still at a nascent
Mr. Anjan Srinivas, Sr. Director, Nutanix been well recognized by stage.Machine Learning (ML) which
the analyst community. is the foundation for AI will see more
There will be a HCI first meaningful adoption. Evaluation of
approach for any new purchases made
I nfrastructure is going through a
transformation and with every passing
year technologies are evolving rapidly
by enterprises in the coming year, which
will result in an increased adoption
machine learning will lead to machines
being able to identify and help optimize
the overall datacenter operations -
making it more complex. Business are of HCI which fundamentally enables from overall root cause analysis to
spread across multiple geographies and customers to do hybrid cloud. how ticketing systems will be created
data needs to be collected from every Application mobility the key factor to evaluate for teams to interact. We are already
consumer touch points. Nevertheless, technology seeing the merger of teams happening
customers have to keep their business The second aspect of hybrid cloud is in datacenters, today we do not need
running and constantly evolve to keep that applications need to be mobile. They a specialist for fiber channel versus a
up. Managing complexity is the biggest, need to be portable across the cloud, specialist for hypervisor. We will also
most significant pain point that IT CIOs which means that one of the key aspects see that as teams come together, a lot
are grappling with today. The ecosystem of people evaluating technologies will of intelligence will be transferred to
is banking on the ‘cloud’ to bring in be application mobility itself. In the past, the machines, where machines can
simplicity while being able to work and the applications used a virtual machine manage other machines efficiently. This
deliver results faster with a lower TCO. construct to make them portable and will mean that the machine learning
The last decade has witnessed asea available on different systems. Going paradigm and the heuristicsthat are
change with numerous innovations forward, we will see further acceleration used inside data center operations will
making multiple technologies available of technologies such as containersthat become stronger, eventually leading to a
to CIOs that call for many different ways will help people port their applications robust AI kind of delivery over the next
of doing IT. The question in front of is a much more simpler way. Containers few years. The first step to delivering
them is - which one really helps evolve will help make applications extensible artificial intelligence will be in this
to a design template that will give me make them scale out and make them machine learning trend that we will see
the longevity and future keeping in more flexible. Containers will get a lot strengthening in 2018.
mind the IT transformation that the more interest in 2018 and technologies These are the four significant trends
organization is planning for? such as Kubernetes will draw more that people need to watch out for as
The demand for Hyper-converged infrastructure attention from people who would like to they are evaluating their data centre
(HCI) to grow understand how to manage their cloud transformation in the year 2018. These
In 2018, public cloud adoption will environment using the construct of trends will not be specific to just a few
drive the need for hybrid cloud. As Kubernetes and such technologies. industry segments and will radically
leaders increase their IT spend, there Infrastructure as a code transform every business right from
will be a growing need to explore consumer personal technology to
The third trend to look out
public cloud as an option but that also enterprise technology across the globe.
for is more and more data-centric

24 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Report 30 January2018 NSS

India Networking Market Posted a Strong


YoY Growth of 15.8 Percent in Q3 2017:
IDC India
The Ethernet Switch, Router and WLAN market are expected to grow in single digit in terms of compound
annual growth rate (CAGR) for 2016-2021. IDC expects increased spending from government segment
in the near future before next elections.

I ndia networking market which


includes Ethernet switch, routers and
WLAN segments witnessed a significant
Quarterly Router Tracker, Q3 2017
the Router market in India witnessed
a YoY growth of 30.6 percent in Q3
and grew by 12.9% YoY in Q3 2017.
Smart city initiatives and wifi hotspots
in central universities are big ticket
year-on-year (YoY) growth of 15.8 2017 and stood at USD 89.4 million (by investments seen in the market. In terms
percent in Q3 2017 due to increased vendor revenue). telecommunications, of technology cloud-based controller
spending from both enterprise and professional services and government technologies is becoming mainstream
service providers segments. continued to be the key contributors in with multiple vendors offering solutions
Q3 2017. Majority of the growth came in this space
India Ethernet Switch Market Q3 from High-end router segment due D-Link regained number one position
2017 to increased spending from service from Cisco in the overall WLAN market
According to IDC’s latest Asia/Pacific providers on 4G and VoLTE roll-outs in they have 24.1% market share in Q3
Quarterly Ethernet Switch Tracker, this space. Other than spending from the 2017. Cisco, HPE and Ruckus (renamed
Q3 2017, the Ethernet Switch market telecommunications sector, government as Brocade) dominate the enterprise
in India witnessed a significant YoY initiatives around BharatNet and State WLAN market segment. D-Link, TP-
growth of 18.4 percent in Q3 2017 and datacenter refresh projects would also Link and Netgear are the top three
stood at USD 119.0 million (by vendor contribute to further investments in vendors in the consumer WLAN market
revenue). Majority of the growth was India. segment. Indian market continues to see
driven by telecommunications, banking, Cisco continued to lead the router entry of new players with differentiated
professional services and government market in Q3 2017, due to significant solutions and is expected to challenge
in Q3 2017. ADC (Application Delivery uptake from telecommunication players. entrenched players in the market.
Controller) saw a significant YoY growth Nokia emerged as the second-best Sharyathi Nagesh, Senior Research
due to increased spending from telecom vendor due to couple of multimillion Manager, Enterprise Infrastructure says,
and professional services verticals in Q3 dollars deals in telecommunication “Even though overall WLAN market
2017. vertical in Q3 2017. has degrown, enterprise segment has
Cisco continued its dominance in the shown resilience and grown consistently
Ethernet Switch market due to increased
India WLAN Market Q3 2017 QoQ. Consumer WLAN segment was
spending from telecommunications and Per IDC’s latest Asia/Pacific impacted significantly even though Q3
banking verticals in Q3 2017, followed Quarterly WLAN Tracker, the WLAN was festive season. Enterprise segment
by HPE and D-Link. Vendors such as market in India stood at USD 46.9 is consolidating around few players
Arista and Nokia witnessed a strong million (by vendor revenue) in Q3 2017 and the key drivers here has been the
triple-digit growth in Q3 2017. or a decline of 8.9 percent compared differentiated offerings and end to
to Q3 2016. Consumer and Service end solutions. Consumer segment is
India Router Market Q3 2017 providers segment witnessed significant still driven by traditional channels and
Per IDC’s latest Asia/Pacific drop YoY in Q3 2017 while Enterprise online sales were not very encouraging
segment continued to show resilience in Q3 2017.”

26 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Case Study 30 January 2018 NSS

Hikvision Empowers Kachchh University


with Surveillance and Broadcasting
Solutions
K rantiguru Shyamji Krishna Verma
Kachchh University (KSKVU) is a
state university in Gujarat, India that
University had only 8
surveillance cameras
in the administrative
promotes higher education in regional building premises. From
and rural areas of the country. It is the security perspective,
named after a revolutionary freedom it was not able to
fighter Shyamji Krishna Verma of deliverany positive
Kachchh, Gujarat. Colleges in the Kutch results.
district were regulated under the Gujarat The Kachchh
University till 2003. However, following University management
the development drive post 2001 Gujarat required a centralized
earthquake, the government of Gujarat and local building
decided to provide a separate university monitoring solution.
in the region of Kachchh. The project brief
Project Background included security control room as Result
In pursuit of providing an effective well Vice Chancellor’s (VC) cabin for The Kachchh University
solution to the Krantiguru Shyamji mission critical surveillance solution. Management, Faculty and Students are
Krishna VermaKachchh University’s The Kachchh University campus has 7 very happy with the Hikvision Solutions
(KSKVU) security challenges and different buildings spreadin 5 acres. (Surveillance and Lecture Capture
requirements Hikvision’s partner Solution and Broadcasting Solution). There is a
Yashvi Infotech did the site survey. The process of designing a solution common feeling among students and
Yashvi Infotechis a leading systems package for Kachchh University project university staff that now entire campus
integrator,based in Ahmedabad. was quite comprehensive. The solution has become more secure. With help
To address the security issues raised comprised of Hikvision’s best 2 line and of Hikvision surveillance solution,
by Kachchh University’s management, 4 line series cameras. The requirement Kachchh University Management is
Yashvi Infotech, worked with the key of IP cameras for this project was able to monitor all the critical areas of
representatives and head of security approximately 400.These cameras the campus.
for Kachchh University, to deliver an were deployed in areas including all The Kachchh University has 16
effective plan that would provide a Classrooms with Audio and video, Classrooms equipped with Hikvision
customized solution to the security and Corridors, Outside of Buildings,Library, Broadcasting and sharing solution with
management needs. ComputerRooms, Staff Rooms, Main live data feed on the FTP server. If any
“Implementing IP Surveillance Gate with ANPR Solution, Play Area student is not able to attend the lecture
Project for Krantiguru Shyamji Krishna with PTZ, Parking and Hostel. With 24 then he can downloadthe lecture and
VermaKachchh University (KSKVU) X 7 monitoring in Local Building, VC’s catch up with the missed lesson.
was a great learning experience. We Cabin as well as Security Control Room. The management hasdecided that
have built a strong relationship with For Kachchh University Classrooms, in the future expansion plan, Hikvision
Hikvision over the past 4 years. We Hikvision had a very good product and broadcasting solution will be added to
value their experience and expertise to solution for recording and broadcasting more classes. Hikvision’s solutions has
provision security surveillance systems. requirements. This recording and made the Kachchh University campus
They work very well with vendor broadcasting solution was able to fulfill a more secure centre of knowledge
partners to deliver solutions that suit their 100 % requirement. Hikvision and learning. This is quite remarkable
the requirements. They are efficient partner Yashvi Infotech has executed achievement for Hikvision, which is
and their high quality workmanship the demo of Proof of Concept (POC) itched in the memory of thousands of
and service is appreciated. We find successfully for the Kachchh University Kachchh University students.
their objective advice invaluable, Management. The project was executed “We switched over to IP
while designing security solutions with 16 Classrooms as a smart classroom Surveillancefrom our analog closed
and selecting equipment to install,” with a live lecture with audio and video circuit camera system six months ago.
said, Brijesh Thakkar, director, Yashvi broadcasting, recording and uploading We had setup a complete smart class
Infotech. to their FTP server. Extremely satisfied solution in our university. We are very
Challenges with swift execution of the project, happy with the quality of the products
The Kachchh University had Kachchh University is now planning to and services and it’s very useful to us,”
the requirement ofa fool proof IP have more classrooms equipped with said Dr. C. B. Jadeja, Vice – Chancellor,
BasedSurveillanceSolution forthe Hikvision’s recording and broadcasting Krantiguru Shyamji Krishna
university campus. In the past Kachchh systems in the future. VermaKachchh University (KSKVU).

27
Special Report 30 January2018 NSS

ISODA TechSummit 2018 Concluded


with the Best Interaction Experience

The eighth edition of TechSummit was attended by security vendors, distributors and channel partners. The
summit’s theme was around financing and how partners can manage finance effectively. On the other hand
the Summit also discussed the future-ready networking, storage and security solutions.

T he eighth edition of the annual


event by Infotech Software Dealers
Association (ISODA) TechSummit
value to a sponsor in the form of
maximum member attendance as
well as ensuring quality interaction of
cloud security, security of IoT, security
needs for small and medium business
were discussed.
2018 as their theme this year -Tipping members with sponsors. To counter The discussions of speakers centred
Point: Breaching the finance barrier this,we formulated thee round table around the challenges that members
held at Kuala Lumpur (Malaysia) from networking sessions to ensure each arecollectively facing with respect to
February 1st to 4th, 2018.In the build sponsor got to spend time with each financing and funding in line withthe
up to the exciting event, the ISODA member in a focused setting of groups theme of Tipping Point - Breaching the
community worked tirelessly to create of 8-9 people. Basically allowing Finance barrier.During the summit,
an interesting agenda, maximize sponsor to judge members’ interests novel methods were employed for
participation and create a buzz around and knowledge of the subject as well as interactions between the members and
the event. allowing for members to interact and
In the opening keynote, Atul express theirinterest in the solutions Mr. Atul Modi, Chairman,
Modi, Chairman of the TechSummit, being provided by the sponsors. Each TechSummit , ISODA /
welcomed the attendees and emphasized sponsor was also given a ‘mark-sheet’ (Dir. Modi Infosol)
the importance of finance and how to evaluate various aspects of these
to handle payments with internal and sessions andinputs gathered from these
external stakeholders. would help subsequent TS MCs in
Tushar Parekh, Chairman of ISODA, further fine-tuning them to maximize
in his speech said that the goal of the benefit/clear ROI.”
forum was to ensure best interaction ISODA is a pan-India association
with the top 50 vendors and increase the for software resellers and large system
strength to 500 members in future and integrators had concluded eighth
launch new chapters. He also said that version of their annual flagship event
the association will have committees ‘Tech Summit’ in Kala Lumpur,
addressing the tax, media etc and the Malaysia. The event was attended
association is aiming to go more digital. by security vendors, distributors and
Atul Modi commented, “A lot of channel partners. The summit’s theme
thought, brainstorming and deliberation was around financing and how partners “A lot of thought, brainstorming
went into increasing the engagement can manage finance effectively. On the and deliberation went into increasing
levels sponsors expected and what other hand the Summit also discussed the engagement levels sponsors
actually got delivered to the partners. the future-ready networking, storage expected and what actually got
This resulted in the introduction and security solutions delivered to the partners. This resulted
of round-table networking sessions The sponsors of the event included in the introduction of round-table
that were just as effective as 1-on-1 Cisco, Check Point software, Radware, networking sessions that were just
interactions, in some ways even better LG electronics, Kaspersky, Red Hat, as effective as 1-on-1 interactions, in
since queries and ideas from other Sophos, Ipswich, Stratus, Seclore, some ways even better since queries
members around the table added to the Edimax, Force point and RAH Infotech. and ideas from other members around
take-away for each. Traditionally, it has The key aspects of security discussed the table added to the take-away for
been a challenge to ensuremaximum at the event included Mobile security, each.”

28 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Special Report 30 January 2018 NSS

studying the feedback from the earlier


Mr. Tushar Parekh, Tech Summits on theengagement
Chairman, ISODA levels, we designed altogether new
methods to take engagements to higher
levels. The whole exercise proved far
effective than the earlier traditional
methods. This helped sponsors to
understand themembers interests and
knowledge of thesubject better, while at
the same allowing increasing the level
of interaction.”
The outstanding feature of this Jain (JNR Management) ‘Insolvency and
event was each sponsor-representative bankruptcy code 2016’
could spend optimal time to understand Rajeev Mamidanna, President
the members at individual level ISODA, “Even before the start of the
and discuss solutions, special offers, Summit, we all knew it was going to be
explore new revenue streams that help an exciting event. The effort put in by
“The goal of the forum was to business growth for them, and in turn the whole team in identifying, inviting
ensure best interaction with the thesponsors’. and following up with the potential
top 50 vendors and increase the
sponsors was superb. During the event,
strength to 500 members in future
and launch new chapters. He also Mr. Rajeev Mamidanna, many innovative interaction methods
President ISODA were used to ensure partners get
said that the association will have
maximum face-time with the sponsors
committees addressing the tax,
and vice versa and the best interaction
media etc and the association is
experience. And added to that, the
aiming to go more digital.”
venue of the Summit was also equally
superb. Overall, the event was a huge
the sponsorsensuring quality face time,
success. The follow up after the Summit
Q&A sessions were carried out through
has started with the sponsors and the
interactive cloud and smartphone-based
focus is now to ensure continuity. The
technology to make the sessions highly
TechSummit 8 team laterally rocked!”
engaging and interesting.
The evening came to a close with
According to the organizers, another
business networking, discussing on the
key take away of summit is that the
“Even before the start of the year ahead with endless enthusiasm
experience and interaction levels have
Summit, we all knew it was going and the experts of their respective fields
been raised to new levels using novel
to be an exciting event. The effort continued to share their expertise of the
methods and within a decent budget,
put in by the whole team in industry.
withoutthe help of an external event
management company, giving leverage identifying, inviting and following Finally
up with the potential sponsors was All the attendees, partners and
to both sponsors and the members of
superb. During the event, many sponsors enjoyed the engaging sessions
the ISODA.
innovative interaction methods and left the event better informed
The event used the novel concept
were used to ensure partners get and more confident. The event also
of round-table discussion to increase
maximum face-time with the taught the organizers how to conduct
the quality of time spent. There were 8
sponsors and vice versa and the interactive sessions that offer maximum
round tables, where about 10 members
best interaction experience.” and valuable information in the most
were made to sit in pre-allotted seats
efficient manner using non-traditional
around each table. The event-designers
Others speakers and topics included. methods. Now the organizers are more
ensured that every sponsor has some
Ferdi D’Souza on ‘Why financial issues confident that they deliver better
quality time with every table using a
bother growing orgs’; Pranav Pandya experience to the attendees in the future
‘round-robin’ method. Atul Modi added
(DevIT) ‘Going public’ and Prasanth events.
commenting on the team work, “After

29
Solution of Fortnight 30 January2018 NSS

Fujitsu Maximizes Storage


Performance with Next-Generation
ETERNUS All-Flash and Hybrid
Storage Systems
Designed for the digital age, new
high-performance Fujitsu ETERNUS
AF storage solutions support storage
consolidation, fast data growth and
performance critical applications

F ujitsu announces its next generation


of ETERNUS AF S2 all-flash
storage arrays and ETERNUS DX S4
its low cost/performance ratio of $0.10/
SPC-1 IOPSTM. Both models support
new types of solid state drives (SSD)
Center Category Management at Fujitsu
EMEIA, says: “Today’s businesses need
to be able to support incredibly fast data
midrange hybrid systems. The new to be released later in 2018, further growth and need-for-speed, always-on
storage systems are designed to meet boosting maximum storage capacity. applications, and at the same time balance
the high-performance requirements Allowing businesses to consolidate capacity and budget considerations.
for digital business growth, continuity as much structured and unstructured Our entire storage portfolio is designed
and efficiency, while providing a data as possible on one storage system for maximum performance, capacity,
maximum of interoperability and an that hosts both SSDs and flexibility and interoperability. This
easy migration path between hybrid and hard disks, the allows organizations of all sizes to
all-flash storage. choose a combination of all-flash and
Equipped with larger caches, hybrid storage options that suits their
faster processors, 32 GB fibre exact needs and to manage
channel technology and them seamlessly, while
highly optimized algorithms keeping costs in line with
for utilizing multicore, their business priorities.
multithreaded processors, the With the new ETERNUS
ETERNUS AF250 S2 and AF650 S2 ETERNUS DX500 storage systems, we are making
both maximize all-flash performance S4 and DX600 S4 optimize hybrid storage fit for the digital age.”
for applications that require the highest storage capabilities for balancing All of Fujitsu’s new ETERNUS DX
storage speeds. With 30 percent more speed, capacity and cost. Fujitsu has and AF storage systems support the
performance headroom, they enable re-architected both new models for a flexible use of deduplication and data
businesses to radically consolidate their 30 percent performance increase in compression, giving businesses even
storage systems, support fast data growth their SSD tier, while the high-capacity more options to meet their individual
and deliver reliably short data response hard disks allow organizations to storage and budget requirements. All
times for analytics and business-critical store unstructured data at the lowest existing and new ETERNUS DX and
applications such as SAP HANA. cost. Intelligent automation features AF systems can be controlled with one
The mid-range ETERNUS AF650 S2 remove the administrative burden management software – Fujitsu’s storage
packs a raw data capacity of close to 3 PB of managing diverse storage tiers by management software ETERNUS SF.
per system into the space of only half a assigning bandwidth and storage based Almost all models can mirror and
data center rack, providing class-leading on the required response time per data replicate data between each other or
IOPS performance and minimum volume. On top of this, thanks to the allow a transparent failover. This also
latency, with a cost/performance ratio strong performance of the SSD tier, the works between older and newer system
of $0.27/SPC-1 IOPS in the latest SPC ETERNUS DX S4 family provides a safe generations, delivering maximum
benchmark results, published on path for businesses to gradually migrate investment protection. Organizations
January 19, 2018. The ETERNUS AF250 from disk and flash to all-flash storage - can use a hybrid system as a recovery
S2 is a perfect all-flash solution for small all in one system. system for all-flash arrays, reducing the
and medium-sized businesses, thanks to Olivier Delachapelle, Head of Data costs of business continuity.

30 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Guest Column 30 January2018 NSS

Data Security In The Cloud By: Mr. Rahul Kumar, Country Manager, WinMagic

meeting compliance and regulatory encryption is limited in many businesses


requirements. Remember, the cloud across industries. Although the adoption
is subject to the same threats as a data of encryption has increased over the
center. Whether cloud or on-premise, last decade, only a mere 37 percent of
organizations have to deal with human businesses employ it as a cloud security
error, malicious breaches from internal strategy.
and external sources, as well as system Remember, encryption is the
glitches. The massive amounts of data important first step for businesses that
located on shared cloud servers always wish to take control of the ownership of
entice criminals. Things get a lot more data; better encryption key management
complicated when a multitude of mobile follows next.
devices are used in organizations. While encryption renders data
With increased sophistication of into a format that can only be read by
threats, cloud security is becoming authorized users, it does not make a
even more dynamic as it evolves. powerful strategic tool if not combined
Organizations continue to be responsible with effective key management. Far too
for security, privacy and compliance often, companies follow a laissez-faire
even when under different cloud service approach to key management, which
models. The need for consistent policies, makes its utilization needlessly complex
password rules and specialized data and cumbersome. Problems do get out
encryption methods has never been of hand when there is no clear ownership

I t has not yet reached epic proportions,


but the number of organizations
adopting cloud-based technologies is
greater. Both the organization and the
CSP have roles that vary in scope, but
of keys within the organization, when
no skilled personnel is in charge of
then both also have different levels the keys, or when a siloed approach is
growing dramatically. Organizations of of responsibility that encompass the followed for key management.
all sizes across industries are turning entire gamut of operations—from data Having an effective encryption and
towards cloud-based infrastructure and classification, endpoint protection, key management solution is vital to the
cloud computing for better scalability, identity and access management, success of any security strategy. Data
accessibility and a collaborative work application and network level controls, encryption, when executed properly,
environment. However, after moving to host and physical security. ensures the protection of sensitive
to the cloud, many organizations information.
mistakenly assume that it is the role
Who is responsible for a breach?
There is no question about who is Whether data is stored in public,
of the cloud service provider (CSP) to private, or hybrid cloud environments,
responsible when a breach occurs. For
secure data and ensure compliance. organizations need a robust solution
businesses, the vital consideration in
Even though the CSP may to ensure full control of encryption
securing the infrastructure and data
provide services for protecting data, and its keys. Much of the encryption
relates to where the CSP’s responsibility
organizations must understand the related problems can be alleviated
ends and the organization’s begins
fact that virtual environments are not with the adoption of file encryption
so that a breach does not occur in the
always fully secure and that they— software such as WinMagic SecureDoc
first place. This means that while the
organizations—too have a role in CloudSync, an application that encrypts
provider is responsible for protecting the
protecting the security and privacy of data even before it leaves the network,
hardware, software, physical facilities
their data. Remember, the liability to and SecureDoc CloudVM, an intelligent
and other aspects involved with running
notify those affected and remediate key management system that encrypts
the cloud services provided, businesses
damages is on you should your company virtual machines and removes
maintain control over a number of key
suffer a data breach! encryption keys at the conclusion of
security measures.
Knowing the levels of responsibility each virtual instance.
Making life simple with encryption
does matter There is abundant evidence to show
By using a single platform, such as
When it comes to choosing SecureDoc Enterprise, an organization
the difference that encryption makes
between cloud infrastructure and can ensure the implementation of
in containing the volume of loss and
cloud computing, companies must a unified encryption strategy across
associated costs when a breach occurs.
make the decision backed by a plan to any endpoint, provide a virtualized
In fact, according to a study, extensive
implement the right security solution. or cloud environment with increased
use of encryption is the second most
The solution should effectively address enterprise security, ensure encryption
impactful factor that can limit the costs
issues such as securing data, managing compliance, and reduce complexities of
of a data breach. Despite all pointers
risk related to unauthorized access, and risk management and audits.
that emphasize its advantages, usage of

32 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Curtain Raiser 30 January 2018 NSS

The stage is all set for 14th


edition of Pragyan 2018
T he four-day techfest Pragyan 2018
to scale new heights and achieve
its ambition of being bigger and better.
among many others. In Pragyan 2018,
Casey Handmer, Levitation Engineer at
Hyperloop One, shall be joined by Kevin
Million INR up for grabs. The events
thus cover a wide range of domains and
problem statements, proving to have
Pragyan has always helped bring Grazier, Ramamoorthy Ramesh, Robert something for everyone.
technology closer to the masses. Metcalfe, Meher Pudumjee, Steven Gal Pragyan also provides a platform
Pragyan is the ISO 9001:2015 and and Ajay Bhatt to comprise a stunning for students to showcase their technical
ISO 20121:2012 certified student- lineup of the Guest Lecture series. talent through its two exhibition
run techno-managerial organisation Attended by massive crowds every contests Sangam (an intra-NITT
of National Institute of Technology, year, Pragyan’s Infotainment aims to technical contest) and Ingenium
Tiruchirappalli (NITT), that conducts turn science into a spectacle. Always (an intercollegiate technical contest
an annual techno-managerial festival eagerly awaited, it features magic exclusively for students from colleges
in the month of February or March. shows, illusions, comedy, beat boxing other than NITT).
Boasting a participation of 10,000 last to laser shows. Previous editions have Every year, Pragyan conducts a
year, Pragyan attracts participants from enchanted the audience with illusionist series of Workshops to impart hands-
a number of colleges across the country, Chris Cheong, projection dance troupe on experience and knowledge to its
making Pragyan one of the largest Girasomnis, Light and fire shows by participants. Among others, notable
techno-managerial fests in India. Pyroterra, and stellar performances workshops conducted last year were
The 14th edition of Pragyan, co- from Aravind SA and Sorabh Pant, to Construction Project Management,
sponsored by American Express Pvt. name a few. Pragyan 2018 promises to Cross Platform Development, Process
Ltd will be held from 1-4 March 2018. offer nothing less, for performances Design and Simulation, and many
The theme for this edition is ‘The Next by Silhouette squad - a Shadow Dance more. Notably, workshops have helped
Dimension’, acknowledging our ascent Crew, Shawn Chua - ventriloquist and participants hone their skills and
into a smarter and more connected magician, Shivraj Morzaria - a Cardist, abilities, and boast of associations that
future. True to its motto - ‘Let’s Shao Michael Szalucho - a manipulator include National Instruments, IBM,
Celebrate Technology’, this four-day and Suhani Shah, a hypnotist, are all in CISCO, Texas Instruments, Microsoft,
techfest allows the public a glimpse into store. and much more.
some fascinating technologies through Pragyan’s Exhibitions aim to bring The mouthpiece of Pragyan - the
exhibitions, workshops, events, guest together a broad spectrum of mind- official Pragyan Blog, continued to
lectures, and much more. boggling exhibits in the world centered increase its reach by leaps and bounds in
Bringing down some of the most around science and technology. The the domain of Science and Technology.
famous names from around the world, previous editions of Pragyan have By 14th August, 2017, it had become
Pragyan’s Guest Lecture series strives enthralled visitors with exhibits like the top writer in the categories of Space
to let these bright minds inspire the the Moon Rock sample (2015), INDRO - and Science. The blog also continues
student population through brilliant the Humanoid Robot (2017), and Vanta to release the SciTech Bulletin, its
lectures and debates. Dignitaries who Black (Vertically Aligned Nanotube fortnightly edition of science and
have visited Pragyan in the past are Ada Arrays). technology related news in bite-sized
Yonath – the Israeli Nobel Prize Winner, The events in Pragyan have been digests on Medium.
Richard A. Muller - American physicist divided into 9 clusters this year - Code It, Pragyan ’18 conducted a plethora of
and professor of physics at the University Creatrix, Concreate, Core Engineering, outreach events and social responsibility
of California, Berkeley, and Peter C. Grey Cells, Impact, IoT, Manigma activities throughout the year.
Schultz - co-inventor of the fiber optics, and Robovigyan, with prizes worth 1.2

33
Product Review 30 January2018 NSS

Ethernet Switch
CISCO : SF95D-08-IN
C isco desktop switches are used to maintain a business
network for small companies. It features with
unmanaged switches that do not need any configuration,
making it easy to install. It provides a highly reliable
network connection to connect your computers, printers,
scanners, etc. Its complexity less feature makes it easy
to use; also it has the ability to expand its network that
helps to connect more computers. It weighs up to 458g
that can be portable anywhere. The salient features are
its Power Consumption DC 12V, 500mA; External Power
Supply 8 RJ-45 connectors for 10BASE-T/100BASE-TX ;
Ethernet Ports 8-Port; Capacity 1.6 Gbps and Wireless
Speed 10 / 100 .

TP-LINK : TL-SF1008D
T he TL-SF1008D 8-Port Fast Ethernet Desktop Switch can process
data at a rate of up to 100Mbps, making it an ideal choice
for expanding your high performance wired network. With 10K
Jumbo frame, the performance of large files transfers is improved
significantly. IEEE 802.3x flow control for Full Duplex mode and
backpressure for Half Duplex mode alleviate traffic congestion,
making the TL-SF1008D a reliable choice for data transfers. Have
the choice to go green when expanding your wired network. The
TL-SF1008D switch features the latest innovative energy-efficient
technologies that can greatly expand your network capacity with
much less power. It automatically adjusts power consumption
according to the link status and cable length to limit the carbon
footprint of your network, making it an ideal solution for your
home or office network.

D-LINK : DGS-1008A
T he D-Link DGS-1008A 8-Port Gigabit Switch creates
a blazing fast network for your office, as its Gigabit
Ethernet ports provide high-speed wired connections
for up to eight PCs or other devices. The DGS-1008A
also features QoS, which prioritizes network traffic so
that time-sensitive data is delivered efficiently, even
during bursts of high data traffic. It’s stylish, easy-to-use,
and comes IPv6-ready for a reliable network today and
tomorrow. Conserve Energy The 8-Port Gigabit Switch
helps you conserve energy automatically through several
methods. It automatically powers down ports that have no
link, allowing the switch to save a substantial amount of
power by cutting power usage for unused ports. It also
adjusts the amount of power supplied to a port according
to the length of the connected Ethernet cable.

34 T /OnlineNCN f /ncnonline.net W /ncnonline.net


Date of Publication 30th Jan. 2017, Postal Date : 7 & 8 of the same fortnight days / Dates only. Posted at : NDPSO POSTAL REGD. NO. DL(S)-01/3392/2017-2019 Registration No. R.N.I. 72270/99

You might also like