JULY 2016

Page 1

#entitworld

#enterpriseitworld

#enterpriseitworld R S 2 0   |   PA G E S 3 2   |   V O LU M E 0 1   |   I S S U E 0 6

WWW.ENTERPRISEITWORLD.COM

J U LY 2 0 1 6

COMMUNICATION

THAT DRIVES

GROWTH THE INDIAN UC MARKET

Businesses today are moving more rapidly than ever before. Newer concepts emphasizing on enterprise aspects like mobility, in and out of office collaboration, lightening fast communication are all helping decision makers run businesses more efficiently. ... p16

AN OPINION ON

NEXT-GEN NAC: A GAME CHANGER IN NETWORK SECURITY ...p15

ISSUE SPECIAL

BILLION DOLLAR BEC FRAUD DECIPHEREDT ...p22

EXCLUSIVE INTERVIEW

PARAG ARORA

BYOD AS A CULTURE HAS FOUND ACCEPTANCE ...p26



R


EDITOR’S LETTER

FINDING RIGHT UC&C SOLUTION IS KEY TO THE SUCCESS OF ENTERPRISE COMMUNICATION Voice based UC market in India is about to reach US$1500 million by 2018

with a CAGR of 12%+. This is clearly driven by the grown by the web-based companies and the outsourcing growth to India. Even government sector is one of big buyers of UC in India as the drive is to make the things digital. Similar the video conferencing market is expected to touch US$ 6.4 billion by 2020 globally and India as a market is seen as high growth market along with China and MEA.

NEXT MONTH SPECIAL

Today, the study says that fifty-three percent of enterprise applications are browser-based. Maximum number of people are accessing data through mobile phones. So the role of UC technology is critical. On top of this trend, cloud is influencing the market across the vertical. Therefore, the CIOs’ challenge is to how put it in cloud mode. Where solutions are available from the major companies. Security and privacy, lower TCO and ease of usage are some of the challenges and concerns of the of top concerns of the CIOs along with challenge emanating from vendor lock in. So here lie the challenges of the CIO as to how they would approach the solution. The network will largely be influenced by the software defined and the CIOs have to take proper consulting in finding the right architecture and solution. They will have to see the cost and complexing in the infrastructure building around the UC&C. Desktop video, video conferencing, telepresence availability and service quality are vital for modern enterprise IT success. Desktop video, video conferencing, telepresence availability and service quality are vital for modern enterprise IT success, therefore the CIOs need to take care of choosing right platform. As far as solutions are concerned, there are solutions which are available on generic hardware. It means the UC&C solutions are available in software mode and CIOs can also evaluation that if there is a budget crunch. Mid-tier market which are always of financial shortfall issues need to look at this option as a priority. But one thing is for sure that the enterprise communication success lies in the right decision of architectural nitration around UC&C.

S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M

COVER STORY

FEATURE

IOT in Enterprises

Drone for India

IOT or M2M solutions are going to influence the enterprise business on the ground level and it is going to assume a large stature in terms of the market size.

Use of Drone in India has started happening. But its potential is yet to be exploited. We will try to understand the challenges and growth in Enterprises.

PLUS

CXO Challenges

With IOT being omnipresent, the challenges for CXOs will become multifold. We will try to understand from the CXOs about their concerns.

Send in your inputs to sanjay@accentinfomedia.com

4

ENTERPRISE IT WORLD

JULY 2016


CONTENTS VOLUME 01

|

ISSUE 06

|

J U LY 2 0 1 6

|

W W W. E N T E R P R I S E I T W O R L D . C O M

Publisher: Sanjib Mohapatra Editor: Sanjay Mohapatra Sub Editor: Chitresh Sehgal Designer: Ajay Arya Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan Satya Sagar Sinha Lead Visualizer: DPR Choudhary Visualizer: Ravish MARKETING Marketing Manager: Raja Rao Apa SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016

COVER STORY

Phone: 91-11-41055458 E-mail: info@accentinfomedia.com

16

COMMUNICATION THAT DRIVES GROWTH THE INDIAN UC MARKET

EDITORIAL OFFICE

Businesses today are moving more rapidly than ever before. Newer concepts emphasizing on enterprise aspects like mobility, in and out of office collaboration, ...

editor@accentinfomedia.com

PRODUCTS /30 FUJITSU

Fujitsu PRIMEFLEX vShape Integrated System

MORE INSIDE Editorial ~~~~~~~~~~~~~~~~~~~~~~~~~ 04 News ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06 Products ~~~~~~~~~~~~~~~~~~~~~~~~~ 30

Delhi: 6/103, (GF) Kaushalya Park, New Delhi-110016, Phone: 91-11-41657670 / 46151993

Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/101-102, Kaushalya Park, Hauz Khas New Delhi-110016

Phone: 91-11-46151993 / 41055458

Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.

21

22

24

26

28

INTERVIEW

SECURITY

CXO CORNER

GUEST ARTICLE

INTERVIEW

CITRIX

“BYOD as a Culture hasFound Humongous Acceptance”

PALADION

“Security Analytics – Do you need it?”

RAH

“Next-Gen NAC: A Game Changer in Network Security”

RADWARE

“SSL Attacks on the Rise”

JULY 2016

PI DACENTRE

“India’s DC Market to Touch $4.5 billion mark by 2018.”

ENTERPRISE IT WORLD

5


INTERVIEW INISDE

India’s DC Market to Touch $4.5 billion mark by 2018. Page 28

ITWORLD

ROUND UP

Brexit Impact to Flatten Global IT Spending for Rest of 2016: Gartner

B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

Worldwide IT spending is forecast to be flat in 2016, totaling $3.41 trillion, according to Gartner. This is up from last quarter’s forecast of negative 0.5 percent growth. The change in the forecast is mainly due to currency fluctuations. John-David Lovelock, research VP at Gartner said, “The current Gartner Worldwide IT Spending Forecast assumes that the U.K. would not exit the European Union. With the U.K.’s exit, there will likely be an erosion in business confidence and price increases which will impact U.K., Western Europe and worldwide IT spending.” While the U.K. has embarked on a process to change, that change is yet to be defined. The “leave” vote will quickly affect IT spending in the U.K. and in Europe while other changes will take longer. Staff may be the largest immediate issue. The long-term uncertainty in work status will make the U.K. less attractive to new foreign work6

ENTERPRISE IT WORLD

JULY 2016

ers. Retaining current non-U.K. staff and having less access to qualified new hires from abroad will impair U.K. IT Departments. “2016 marked the start of an amazing dichotomy. The pace of change in IT will never again be as slow as it is now, but global IT spending growth is best described as lackluster,” said Lovelock. “2016 is the year that business focus turns to digital business, the Internet of Things and even algorithmic business. To fund these new initiatives, many businesses are turning to cost optimization efforts centering around the new digital alternatives instead of cellular and digital personal assistants instead of people) to save money, simplify operations and speed time to value. It is precisely this new breadth of alternatives to traditional IT that will fundamentally reshape what is bought, who buys it and how much will be spent.”

D ATA BRIEFING

5.5

million new “things” are getting connected every day in 2016


11th NOVEMBER 2016 Venue: HOTEL EROS, MANAGED BY HILTON, NEHRU PLACE

MEET THE LEADERS’ UNDER ONE ROOF BOOK YOUR PARTICIPATION NOW! OFFICE: 6/103, Ground Floor, Kaushalya Park, New Delhi-110016, E-mail: info@smechannels.com, Phone: 91-11-41657670 / 46151993

FOLLOW US:

SME Channels - Magazine

SMEChannels.com

SMEChannels India

smechannels.com


ITWORLD // NEWS BRIEF

Accenture and Automation Anywhere Forge Partnership Tata Technologies MD and CEO Warren Harris

Tata Tech Boosts Engineering R&D with New Facility Global engineering services provider Tata Technologies has announced the expansion of its Engineering Research and Development Centre, Axia - VAVE Centre of Excellence, at the company’s Hinjewadi campus. The 8,700-square-foot facility will provide Tata Technologies’ clients with end-to-end product development capabilities including product innovation, value engineering, cost engineering, and teardown and benchmarking services. As per the release, the facility will support multiple full-vehicle and machine development programs currently underway at Tata Technologies. Such initiatives call for a larger physical space wherein equipment can be dismantled, studied, and compared with the competition to pinpoint areas for design improvement and cost optimization.

Tata Technologies MD and CEO Warren Harris said, “Axia – Vave Centre of Excellence is a response to the growing global demand for frugal engineering services. This enhances our ability to provide clients with innovative, clean-sheet solutions for minimizing non-essential product costs and maximizing intrinsic product value.” The Engineering Research and Development Centre is enabling engineers to move from the virtual design space to real, physical vehicles and vehicle aggregates. The company’s technical staff will be able to study complex vehicle or machine systems in detail and get acquainted with new technologies. This R&D commitment by Tata Technologies looks ahead at the upcoming trend in innovation spend by automotive players, which is expected to grow significantly in the next few years.

GLOBEL

EVENTS

1–10 AUGUST

22–24 AUGUST

22–25 AUGUST

23–24 AUGUST

SAN FRANCISCO, UNITED STATES

WIEN, AUSTRIA

MUMBAI, INDIA

JOHOR BAHRU, MALAYSIA

SANS Security 2016 Designed for security awareness officers who want to take their awareness to next level.

8

ENTERPRISE IT WORLD

Accenture and Automation Anywhere, a global provider of robotic process automation are working together to deliver enterprise-grade RPA solutions to organizations that automate business processes, enabling operations to be scaled faster and more cost-effectively, while increasing performance accuracy. As part of the collaboration, Automation Anywhere named Accenture a key implementation provider for its newly released cloud-based RPA solution, BotFarm, which provides unprecedented control over the way thousands of digital bots are created, deployed, and managed to instantly scale up or down to meet business process demand. Accenture will integrate Automation Anywhere’s BotFarm into its business process services within Accenture Operations to provide additional scalability and productivity improvements to enable an As-a-Service business model. Manish Sharma, Senior Managing Director, Global Delivery and Solution Development for Accenture Operations remarked, “Automation underpins the As-a-Service model, providing the agility and efficiency needed to transform business operations. Accenture has a history of using automation to help our clients capture new business value and our relationship with Automation Anywhere compliments our efforts to apply the technology quickly and at scale.”

JULY 2016

FiCloud A forum for bringing together academia, industry, and public sector to present their research work

AUTOMATION 2016 Find out about the very latest product and services on offer and meet face-to-face with suppliers

IWBDA 2016 This workshop aims at gathering innovative academics, industrial experts and engineers interested in capturing


NEWS BRIEF // IT WORLD

S/HE SAID IT

AZIM PREMJI,

CHAIRMAN, WIPRO

“India continued to be a bright spot on the global canvas with the economy growing by 7.6% in FY16. Monsoon is a big positive. Capital flows are expected to be robust with flows in FDI due to opening up of various sectors and favorable growth expectation.”

NEC Extends Support to Open Source with New Technology Center NEC Corporation and NEC Technologies India Private Limited (NTI) have announced the establishment of the “OSS Technology Centre,” an organization specializing in technical support related to the use of open source software (OSS). As per the press release, the new organization begins operations on July 1 with approximately 50 staff based out of NTI, consisting of experienced OSS engineers who are well-versed in OSS solution architecture, as well as essential software development and support capabilities. The OSS Technology Centre aims to strengthen the organizational structure for supporting global enterprises in building systems based on OSS, to reinforce collaboration with international OSS vendors and to provide rapid technical support to users who construct systems operated globally using OSS. Moreover, the new organization will actively carry out development of new network functions related to SDN, NFV and application platform functions, such as container and Platform as a Service (PaaS), all of which is part of the OSS Technology Centre’s OpenStack-based development activities, in addition to its contributions to making source codes openly available by providing them to the OSS community. In recent years, the need for enterprises to capitalize on OSS, particularly OpenStack, in cloud computing, big data computing and SDN/NFV, has become increasingly pronounced. Also, in terms of next-generation ICT technologies, there are heightened expectations towards OSS applications in areas related to Systems of Engagement (SoE) and the IoT. Nobuhiko Kishinoue, General Manager of Cloud Platform Division, NEC Corporation said, “NEC and NTI will leverage the newly established OSS Technology Centre to provide rapid support to users carrying out construction of OSS-based systems on a global scale.”

QUICK BYTE ON

FINANCIAL

“We believe that the ability to be innovative must be cultivated at a young age. The Atal Tinkering Laboratories will provide school students the opportunity to work with tools and equipment, fostering inventiveness. .” A M I TA B H K A N T , C E O , N I T I A AY O G

L&T Infotech Goes Public Launched IPO of 1.75 crore equity shares of face value of Rs. 1 each for cash, at a price band from Rs. 705 to Rs. 710 per equity share. Offer for Sale opened on July 11, 2016 and closed on July 13, 2016. Retail investor discount Rs. 10 on the price fixed. JULY 2016

ENTERPRISE IT WORLD

9


ITWORLD // NEWS BRIEF

Indian Biometrics Market on Route to Cross US$3Bn by 2021

HCP Market in India Dropped 2.2 percent in Q1 ’16 According to the IDC, HCP market in India dropped 2.2 percent sequentially in Q1 2016 and reached 795,451 units in terms of shipments. HCP market in India was primarily driven by Laser Printer, which marked a remarkable sequential growth of 15.9 percent in Q1 2016. According to Maninder Singh, Market Analyst, IDC India, “In the absence of substantial demand from Government and consumers in Q1 2016, the overall HCP market witnessed weak buying as the sentiments were not positive.. However, the enterprise segment witnessed some growth and is expected to pick up pace in the coming quarters.” HP managed to achieve 44.7 percent shipment share in Q1 2016 and remained

EXECUTIVE

as the market leader in India. This was followed by Epson and Canon with 19.1 percent and16.6 percent share respectively. Brother emerged into the fourth position in Q1 2016 and was closely followed by Samsung. Inkjet HCP market witnessed a sequential decline of 13.7 percent in Q1 2016 due to low consumer demand and high inventory. However, Epson and Brother witnessed a sequential growth of 6.2 percent & 12.4 percent in Q1 2016. Both HP and Canon in the Inkjet HCP market recorded sequential decline. All the vendors faced inventory issues during the start of the quarter but the second half witnessed new campaigns and marketing activities that are expected to pave the recovery path in the coming quarters.

According to TechSci Research report, “India Biometrics Market By Type, By End Use Sector, Competition Forecast & Opportunities, 2016-2021”, the country’s biometrics market is projected to grow at a CAGR of around 31% during 2016 - 2021.

As per the report, India’s top 10 State/UT wise Aadhaar enrollments by number of Aadhaar assigned, April 2016 are as under:

State/UT

Numbers of Aadhaar Enrollments

Uttar Pradesh

149,640,062

Maharashtra

106,062,582

West Bengal

74,273,129

Bihar

67,904,075

Madhya Pradesh

64,981,428

Tamil Nadu

62,509,750

Rajasthan

58,048,422

Karnataka

54,916,052

Andhra Pradesh

49,989,892

Gujarat

48,658,019

Source: Unique Identification Authority of India, As on 30 Apr 2016

MOVEMENT Beetel gets new CEO in Deval Parikh. Parikh will lead all Beetel business lines.

Veeam appoints Peter McKay as President and COO. Will be responsible for sales, sales operations, marketing, finance and human resources.

Brocade ropes in Jason Baden as Sr. Director (ANZ). . He will be responsible for driving company’s business in the region

Finesse gets Anand Lakhwani as HeadIT Infra Practice. Will be responsible for advancing Infra businesses, focusing on Cloud Computing,

10 ENTERPRISE IT WORLD

JULY 2016

Data Analytics, Enterprise Mobility and UC

CA Tech Bring in Surya Panditi to Head India Technology Center. Will lead CA product development efforts in company’s facility in Bangalore and Hyderabad


NEWS BRIEF // IT WORLD

DigitalOcean Unveils India Datacenter DigitalOcean has announced the launch of its new datacenter in Bangalore, India. DigitalOcean will continue to offer a single pricing plan across all of its regions worldwide, including Bangalore. This means SSD-enabled cloud servers starting at $5 USD per month, and identical pricing for all additional services like bandwidth, snapshots and beyond. Bangalore will be DigitalOcean’s 8th region globally, following New York, San Francisco, Amsterdam, Singapore, London, Frankfurt, and Toronto. Ben Uretsky, CEO and Co-Founder of Today, India is home DigitalOcean to the fastest growing ecosystem of startups and entrepreneurs, with approximately 4,000 startups launching this past year. Considering the number of software developers throughout India will grow to over 5 million by the year 2018, the region is one of the most important technology markets in the world. DigitalOcean has hired a local team and has also partnered with NASSCOM’s 10,000 Startups initiative to grow and support the startup ecosystem in India. As per the release, the Bangalore datacenter will feature DigitalOcean’s latest servers and network architecture, which will ensure a consistent and seamless experience for users everywhere regardless of which region they select. DigitalOcean’s second datacenter in Asia will enable local service delivery to over a billion people in India alone and improve performance for neighboring users. Ben Uretsky, CEO and Co-Founder of DigitalOcean said, “India is poised to unleash a tremendous amount of innovation in the next decade “We want to empower the next generation of software companies by providing them robust and easy to use cloud infrastructure they need to grow.” Varma Namburi, Lead of IT Operations at VTiger, the popular open source CRM used by more than 100,000 businesses commented, “DigitalOcean enables us to operate at peak efficiency. We focus on product engineering and innovation, and they take care of the rest.”

Snapdeal Forays into the $100Bn Online Services Market Snapdeal has announced the launch of various services including flight and bus ticket bookings, hotel reservations and food ordering – all of which can be conveniently accessed through its platform. With this, Snapdeal becomes the first e-commerce marketplace to introduce services on its platform. Snapdeal has launched these services through a partnership with market leaders in each domain -Zomato, Cleartrip, UrbanClap and redBus. According to the release, this integration between Snapdeal and service providers will help consumers access all their service needs through Snapdeal’s app and use Snapdeal as the one-stop solution for all their consumption needs. With this, Snapdeal is foraying into the USD 100 billion market for online services, as yet untapped by any other e-commerce player. Currently, Cleartrip, redBus, UrbanClap and Zomato are available on Snapdeal’s services section for flight and hotel book-

INTERESTING

ings, bus ticket bookings, personal services and food ordering respectively. Customers will also be able to avail exciting offers on these services on Snapdeal. Users will be able to access the platform of these service providers through Snapdeal’s app. Customer support will be actively provided by the partners and the call-center numbers will be prominently mentioned in all the web view footers, ticket details and order pages, said the release. Speaking at the launch, Rohit Bansal, Co-Founder, Snapdeal said, “Online services is an industry potentially worth $100 Bn by 2020. We are thrilled to partner with Zomato, Cleartrip, UrbanClap and redBus to bring to our users the best of choices for food, travel and personal services. We are confident that the introduction of services on Snapdeal will bring us closer to our goal of 20 million daily transacting users by 2020.”

TWEET

egov.

Two-thirds f corporate honchos satisfied with Modi government’s performance: Survey #TransformingIndia @srirambjp Shows how quickly the country is being connected under the digital initiative Source: http://twitter.com/enterpriseitworld

JULY 2016

ENTERPRISE IT WORLD

11


ITWORLD // NEWS BRIEF

GOI Gives Nod to Startup Village Phase 2

SAP and IIT-B Expand Partnership SAP SE has launched a Startup Accelerator Program in partnership with the Society for Innovation and Entrepreneurship (SINE), a technology and business incubator at the IIT-Bombay campus. In addition, SAP inaugurated an SAP Innovation Centre, housed within IITB campus. These announcements enhance SAP’s existing initiative with IITB to support startups and train teachers, announced earlier this year. The SAP-IITB Startup Accelerator Program is a cohort based, boot camp led accelerator program to mentor and accelerate the business growth of ten social enterprises or startups over the next year. SINE will administer a business incubator that will provide support for technology-based entrepreneurship and help young minds in their first fledging steps to market. The common goal is to nurture investible startups and make them profitable.

The SAP Innovation Centre will host research projects in association with the computer science department of IITB; in addition, it will provide an opportunity for students to participate in SAP Mile, a university crowdsourcing platform which allows students to participate in virtual internships to learn and experiment on SAP product ideas and solutions. The SAP Innovation Centre also will enable students from IITB to work on next generation and cutting-edge technologies. Bernd Leukert, member of the Executive Board, Products & Innovation, SAP SE remarked, “We want to be a significant accelerator of growth for emerging social entrepreneurs and startups in India. SAP is committed to propelling the entrepreneurship ecosystem in India by providing youth and emerging entrepreneurs with access to technologies they need to succeed in the digital economy.”

ICC Hosts ‘Start-O-Vation’ to Promote Startup Culture Founding members of FICCI and the Indian Chamber of Commerce presented “Start-OVation”, a national summit on Friday (July 8, 2016) at Hotel Shangri-La. The conference was attended by many business experts,

12 ENTERPRISE IT WORLD

industrialists, economists and policy makers from different parts of the country. They shared their opinions on innovative business approaches and majority emphasized upon to promote a culture of start-up and

JULY 2016

entrepreneurship. According to the release, the event commenced in the presence of many prominent personalities, VIPs and the media personnel. Key speakers at the summit were Debmalya Banerjee,

India’s first PPP model incubator, which was launched as a trailblazing initiative four years ago in Kerala to build a startup culture among the state’s youth and become a blueprint for the nation, is all set for a national scale up with the Central Government’s Department of Science and Technology approving Startup Village’s Phase 2 in its completely digital avatar. The Startup Village Phase 2, in tune with the Prime Minister’s Startup India program, will focus on creating an entrepreneurial culture amongst the country’s five million engineering students by providing them a completely digital incubation framework, ranging from application for admission to teaching, mentoring and graduation. Pinarayi Vijayan, Hon’ble Chief Minister and Minister for IT; Kris Gopalakrishnan, Infosys Co-Founder Startup Village Phase 2 and Chief Mentor of Startup Village; and Dr H K Mittal, Head of National S&T Entrepreneurship Development Board, GOI, will launch SV.CO, the world’s first digital incubator for student startups on July 13 at Thiruvananthapuram. India needs more than one million new jobs a month for the next 20 years to employ all its youth and these jobs would mostly come from new startups if the right environment is created.

Regional Director, Indian Chamber of Commerce (ICC) and Harry Lagad, Summit Chairman, R Chandrasekhar, President, NASSCOM, Ashish Kumar Chauhan, Managing Director & CEO - Bombay Stock Exchange, Padmashree Dr. Bibek Debroy, Member, Niti Ayog, and Digbijoy Chakraborty, Director,

Public Sector & Government Consulting Practice, South Asia, Middle East, North Africa, Frost & Sullivan to name a few. The conference was called to discuss the importance of entrepreneurship in India, which in turn will help boost country’s economic growth and sustainability.


NEWS BRIEF // IT WORLD

BOOK

SELF

The Innovators: How a Group of Inventors, Hackers, Geniuses

GLOBAL UPDATE

Brexit Impact to Flatten Global IT Spending for Rest of 2016: Gartner

AUTHOR

DORLING KINDERSLEY

PRICE

Worldwide IT Spending Forecast (Billions of U.S. Dollars) 2015 SPENDING

Data Center Systems Software Devices IT Services Communications Services Overall IT

2015 GROWTH 2016 SPENDING

RS. 1320

2016 GROWTH

171,213 313,948 662,295 865,818 1,400,049

2.9% 1.1% -4.6% -3.4% -9.2%

174,578 332,207 627,235 897,634 1,380,782

2.0% 5.8% -5.3% 3.7% -1.4%

3,413,324

-5.5%

3,412,436

0.0%

AMAZON

About The Book

Source: Gartner (July 2016)

Worldwide IT spending is forecast to be flat in 2016, totaling $3.41 trillion, according to Gartner. This is up from last quarter’s forecast of negative 0.5 percent growth. The change in the forecast is mainly due to currency fluctuations. John-David Lovelock, research vice president at Gartner said, “The current Gartner Worldwide IT Spending Forecast assumes that the U.K. would not exit the European Union. With the U.K.’s exit, there will likely be an erosion in business confidence and price increases which will impact U.K., Western Europe and worldwide IT spending.” While the U.K. has embarked on a process to change, that change is yet to be defined. The “leave” vote will quickly affect IT spending in the U.K. and in Europe

AVAILABLE AT

while other changes will take longer. Staff may be the largest immediate issue. The long-term uncertainty in work status will make the U.K. less attractive to new foreign workers. Retaining current non-U.K. staff and having less access to qualified new hires from abroad will impair U.K. IT Departments. “2016 marked the start of an amazing dichotomy. The pace of change in IT will never again be as slow as it is now, but global IT spending growth is best described as lackluster,” said Lovelock. “2016 is the year that business focus turns to digital business, the Internet of Things and even algorithmic business. To fund these new initiatives, many businesses are turning to cost optimization efforts centering around the new digital alternatives.

The Business Book is the perfect primer to key theories of business and management, covering inspirational business ideas, business strategy and alternative business models.

Key Features One hundred key quotations introduce you to the work of great commercial thinkers, leaders, and gurus from Henry Ford to Steve Jobs, and to topics spanning from start-ups to ethics.

Avast to Acquire AVG for $1.3B Avast to buy AVG Technologies for approximately $1.3B. Both companies are industry pioneers founded in the Czech Republic in the late 1980s and early 1990s that expanded internationally in the 2000s, and now will be combining complementary strengths to position Avast for continued growth in the security industry. Avast is pursuing this acquisition to gain scale, technological depth and geographical breadth so that the new organization can be in a position to take advantage of emerging growth opportunities in Internet Security as well as organizational

efficiencies. The technological depth and geographical reach will help Avast serve customers with more advanced security offerings in the core business and new innovations in emerging markets, such as security for IoT devices. Combining Avast’s and AVG’s users, the organization will have a network of more than 400 million endpoints, of which 160 million are mobile, that act as de facto sensors, providing information about malware to help detect and neutralize new threats as soon as they appear.

JULY 2016

ENTERPRISE IT WORLD

13


ITWORLD // NEWS BRIEF

Blockchain Will Redefine How Markets Function: IBM Study

MANAGEMENT

MANTRA

“Never try to teach a pig to sing; it wastes your time and it annoys the pig.” — PAUL DICKSON SES 2016 Explores Opportunities for Collaboration in Defense

IBM has released a new study that describes how blockchain networks will vaporize current frictions in the economy that are inhibiting business growth, propelling the movement of capital and exchange of value to fundamentally change how markets function, according to the release. Today, a number of frictions -- such as participants of a transaction not having access to the same information or the high price of intermediaries -- add costs and complexity that drags on global business and trade. Blockchain technology -- which creates a permanent and transparent record of transactions -- will reduce or eliminate these frictions, recasting our institutions and economy in new form with far greater efficiency and far less risk, finds the IBM Institute for Business Value (IBV) study, “Fast forward: Rethinking Enterprises, Ecosystems and Economies with Blockchains.” Distributed ledgers will become the foundation of a robust system of trust -- a decentralized platform for massive collaboration. The study predicts that by using blockchain technology the enterprise can overcome complexity to scale freely, integrate vertically or laterally across a network or ecosystem, or both, be small and transact with super efficiency, be a coalition of individuals that come together briefly and also operate autonomously and as part of a self-governing, cognitive network.

14 ENTERPRISE IT WORLD

JULY 2016

The 7th Strategic Electronics Summit 2016 got underway today with record participation at Bangalore International Exhibition Centre( BIEC) where Manohar Parrikar, Hon’ble Minister for Defense, GoI was the chief guest along with Dr. G Satheesh Reddy, DS & SA to RM and Dr. Ajay Kumar, IAS, Addl. Secretary, DeitY, JD Patil, Senior VP, Defense & Aerospace, L&T, S. K. Sharma, CMD, BEL, T Suvarna Raju, CMD, HAL as the guests of honor and Dr. Padmanabhan, CEO Rangsons and MV Apparao, CMD, Centum Electronics as the distinguished guests at the event. Recognizing Strategic Electronics as a key area where Defense Production Policy and Offset Policies have created immense scope for growth of domestic manufacturing, Electronic Industries Association of India had launched the Strategic Electronics Summit in 2010 to offer a platform for the Indian industry to explore opportunities to work together with the defense establishment, bring all stakeholders including the government, defense organizations, private and public sector together and share information.

Addressing the large industry gathering, Honorable Raksha Mantri Shri Manohar Parikkar said “In today’s dynamic times, we feel RFPs (request for proposals) cannot be fool proof from day one; they need to be open to changes in requirements. Through the “Make in India” campaign, the government wants to promote the larger Industry and help them develop its design and manufacturing capabilities in India. I urge the industry experts to tell me what needs to be done in a simple format, share your pain points and bottlenecks. The assurance from our end is that the government will support your initiatives to grow and mushroom.” Dr. Ajay Kumar, Additional Secretary, Dept of Electronics & IT, Government of India, who has played a key role in the formulation and implementation of the National Policy on Electronics, was optimistic about the future of the Electronic System Design and Manufacturing (ESDM) Industry and the positive impact of the numerous Schemes launched for overall development of the electronics eco-system in the country.


BEC FRAUD // ENTERPRISE SECURITY

BILLION DOLLAR BEC FRAUD DECIPHERED: WHAT YOU NEED TO KNOW

B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

More than 400 companies are targeted with BEC scams every day, find out more and learn how to stay protected

B

usiness email compromise (BEC), or CEO fraud, continues to be the bane of companies in 2016. BEC scams are low-tech financial fraud in which spoofed emails from CEOs are sent to financial staff to request large money transfers. While they require little expertise and skill, the financial rewards for the fraudsters can be high. An Austrian aerospace manufacturer recently fired its president and CFO after it lost almost US$50 million to BEC fraudsters. In light of recent warnings from the FBI regarding BEC, we took an in-depth look at Symantec’s Email Security Cloud data to get a better understanding of the state of BEC fraud today. So who’s being hit by these scams? And who are the people behind them? Here’s what we know: BEC scammers are pretty indiscriminate in the organizations they target. Almost 40 percent of identified victims are small to medium sized businesses. The next largest category of victim is the financial sector, at 14

percent. Email data from Symantec shows how hundreds of organizations are receiving BEC scam emails every day. Within these organizations, at least two individuals will be targeted with a BEC email. These individuals will most likely be senior financial staff. Data from the FBI illustrates how lucrative BEC is. At least $3 billion have been lost to BEC scams in the past three years, with over 22,000 victims globally. Nigerian 419 scams were one of the first email financial scams. Individuals were sent emails promising them riches in return for a small donation to help a fictional Nigerian prince. These scammers have now moved onto targeting businesses and are using less elaborate ruses to trick them into transferring money. We examined a number of email addresses used by the scammers and found that 46 percent have Nigerian IP addresses. The rest are operating from the United States, the United Kingdom, South Africa, Malaysia, and Russia. One group of scammers is responsible for approximately 12 percent of BEC emails we’ve observed. Over the past two months, this group has obtained access to at least 68 legitimate email accounts, targeted over 2,700 organizations, and used 147 email accounts to correspond with victims. The majority of this group’s activity originates from Nigeria, though some of their emails come from the UK and US too. It should come as no surprise that the majority of BEC emails are sent on weekdays. The scammers know that this is when most businesses would expect emails. And more importantly, most financial transactions can only be cleared during weekdays. BEC scammers are also most active during a typical working day. They will generally begin sending emails from 0700 GMT, take a break from 1100 until 1400 GMT and then resume sending until 1800 GMT. BEC scammers keep things simple with most emails containing a single-word subject line. Subjects always contain one or more of the following words: request, payment, urgent, transfer, and enquiry. Simple, innocuous subject lines are less likely to arouse suspicion and are also harder to filter. According to the findings, user education is the most effective means of protecting companies against BEC scams. Question any emails requesting actions that seem unusual or aren’t following normal procedures. Users shouldn’t reply to any emails that seem suspicious. Obtain the sender’s address from the corporate address book and ask them about the message. If you believe you have been a victim of BEC fraud, notify your financial institution and local law enforcement as soon as possible. JULY 2016

ENTERPRISE IT WORLD

15


COVER STORY // ENTERPRISE SECURITY

COMMUNICATION

THAT DRIVES

GROWTH

THE INDIAN UC

MARKET

16 ENTERPRISE IT WORLD

JULY 2016


ENTERPRISE SECURITY // COVER STORY

Businesses today are moving more rapidly than ever before. Newer concepts emphasizing on enterprise aspects like mobility, in and out of office collaboration, lightening fast communication are all helping decision makers run businesses more efficiently. Seamless unified communication is the buzz word that has been transforming offices into state-of-the-art collaboration complexes. Indian enterprises, big or small, are vying to make businesses run and grow faster with enterprises level communication and collaboration making India a hotbed for UC vendors. BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM

C

ommunication and collaboration is one of the core essentials of any rapidly growing enterprise today. Ever expanding businesses with a number of domestic and global offices have started inculcating the concept of unified communications, realizing the importance of seamless and instant collaboration in today’s rapidly growing highly competitive market. Newer technological innovations like the IP phone, convergence, office chat, huddle rooms and smart video conferencing techniques have enabled enterprise level communication to come across as a key growth driver with savings in time and cost and boost to productivity and efficiency. As ICT is changing the face of the planet, unified communication has emerged as necessity for CIOs/CXOs today.

“As ICT is changing the face of the planet, unified communication has emerged,

as necessity for CIOs/CXOs today.”

How Business Communication became UC The biggest advantage that unified communication enables businesses is the integration of all types of communication technologies, new and old, into a single platform. Traditional enterprise communication mostly consisted of voice communication and small quantities of emails. With digital communication, enterprises can save money in time and cost, communicate more and with more clarity than ever before and even brainstorm or troubleshoot challenges collaborating from thousands of miles apart. Technological adoption and the spur in SMEs have been the driving forces behind the shift towards UC. Takayuki Inaba, JULY 2016

ENTERPRISE IT WORLD

17


COVER STORY // ENTERPRISE SECURITY

RUCHIR TALATI, MARKETING MANAGER, MATRIX COMSEC, TELECOM BUSINESS

“Rising adoption of mobile evices is expected to propel demand.”

DR. DEVASIA KURIAN, FOUNDER & CEO, *astTECS

“The spread of devices & applications has increased the complexity of the IT infrastructure.”

MD, NEC India sums up the term as, “Enterprise/ Unified communications solutions help in integrating different communication tools to a single platform for increasing productivity and efficiency at a workplace. Unified communication can potentially allow users to access a variety of communication applications such as e-mail, SMS, video, fax, voice, and others through a single user mailbox. It also allows scheduling, workflow, instant messaging and voice response systems, and provides the integration through multiple devices, be it a desktop, laptop, cellphone or even a wearable device.” *astTecs Founder and MD Dr. Devasia Kurian believes mobile is the key driver for this transformation, “The spread of devices & applications has increased the complexity of the IT infrastructure, forcing enterprises to adopt newer technologies and enhanced capabilities. Mobile applications are getting integrated in the core areas of enterprise IT environment, as customers continue to migrate from simple voice solution to unified communication solutions; Audio video integration is helping them reduce rising administrative expenses, extend business reach, boost productivity and realize measurable returns on their infrastructure investments.” As a growth driver, technology has been the enabler for UC, as Matrix Comsec’s Ruchir Talati opines, “Technology has brought down the costs 18 ENTERPRISE IT WORLD

JULY 2016

of communication significantly and improved people’s access. The proliferation of online forums, live coverage of news, and other such mediarelated initiatives have resulted in world wide access and participation in news and information for almost everyone. The ease of communication and the spread of interactive communication methods such as instant messengers and video conferencing have increased the volume of communications but reduced their average length. Now, people communicate instantly and tend to break up different topics into different forms of communications” The Domestic UC Market The rise of UC and increase in its adoption is a direct effect of technologies like convergence, videoconferencing and mobility becoming robust and affordable. Arun Shetty, Director of Collaboration Solutions for Avaya explains, “Today, digital interactions account for over 35% of all interactions, and at the current rate will overtake voice in two years’ time. We have observed that businesses are planning to invest in digital technology. Businesses are increasingly adopting digital fabric technology, that not only help them achieve their business goals but also provide them with opportunities to improve customer, employee, partner and supplier relationships.”

The smartphone revolution and its extensive country-wide adoption is a crucial driver too as Matrix Comsec’s Ruchir says, Rising adoption of mobile devices is expected to propel demand. The total mobile subscriptions of India are forecasted to exceed 1.4 billion by 2020, with smartphones leading the growth and overall mobile data traffic.” Information and Data collaboration is also spurring the market globally, as Dr. Kurian puts it, “The growing need of sharing content among organizations is driving the UC market globally and technology vendors are finding new markets, (mainly the SMEs), for UC products. Contact Centers are increasingly deploying unified communications solutions to help improve customer connect initiatives.” Challenges for CIOs The most crucial challenge which comes with implementing UC is of interoperability. Businesses nowadays have multiple offices across cities and doing business inside the office is as important as outside. As Dr. Kurian elaborates, “The key challenge that needs to be addressed is the Interoperability among products & multivendor solutions and also it must ensure that their offerings can work together with applications created by third-party developers. Second, is the quality of service (QoS), since the network handles multiple collaborations and application platforms and the third is the maintenance, support, security and protection against malicious attacks.” Apart from interoperability and quality of service, calculating ROI on UC is difficult and a big issue for CIOs pushing for its adoption. “Some of the factors which are concerns of the unified communications market are the high initial cost,


ENTERPRISE SECURITY // COVER STORY

complexity and the unclear ROI associated with this technology. CIO/CXO finds it difficult to choose components from numerous manufacturers as interoperability becomes a key issue owing to the lack of compatibility between components and software,” explains Talati of Matrix’s Telecom Business. Security has always remained an issue with adoption of any technology, and with UC it is no different. NEC India head Inaba opines, “CIOs and CXOs are today looking at effective ways of bolstering their organization’s/workplace’s capacities to offer seamless communication to the workforce. One of the major challenges faced from UC perspective by CIOs and CXOs is security of data on these integrated platforms. There needs to be a robust risk management plan to prevent potential loss or misuse of critical data as information security is always a paramount concern for any organization.” Technologies in the Space As NEC’s Takayuki Inaba puts it, “Trends such as cloud-based UC, collaboration tools and mobile applications have gained much attention these days. Cloud services are maturing towards enterprise-grade security and stability, and as a result steadily gaining the trust of IT decision

makers.” Dr. Kurian too believes cloud adoption has been the single main catalyst. He says, “Cloud based unified communications offers flexibility and agility among enterprises and organizations can scale their deployments and add new features & functionality as per their need. UC offers tremendous capabilities, since the integration of communication systems increases collaboration and employee productivity, regardless of their location & device used.” Matrtix’s Talati comments, “Cloud computing has been increasingly adopted by service providers owing to the flexibility it offers coupled with cost-effectiveness. Cloud-based UC applications allow organizations to eliminate capital spending and adopt an operational cost model for which they have to pay only on the basis of the required capacity. Steady proliferation of hosted products will be one of the key unified communications market trends. This product eliminates infrastructure cost and offers a centralized management system wherein services are provided over the Cloud.” Apart from technologies themselves, the subscription models are also spurring UC adoption. Avaya’s Ajay Shetty says, “We believe that subscription-based software licensing will enable organizations to implement latest solutions

and capabilities, while not having to incur large upfront capital outlays. The financial agility that comes with the subscription model, allows software expenditure to be classified as an operating expense. It is becoming increasingly important as organizations continue face constrained CAPEX budgets. Further, SaaS (Software as a Service) and CPaaS (Communications Platform as a Service) Models for Communications Services is the way solutions are going to be evolved and consumed.” The Enterprise Reaction As the market for UC broadens, UC as a service is getting prominence. Enterprises have been inclining towards these service models for their communication purposes too. Avaya’s Ajay Shetty says, “Customers are looking at looking at SaaS model for Unified Communications, one such services which we have seen in Indian market by our customers is the interest and adoption of Video-as-a-Service. We continue to work with our partner eco-system to bring in right solutions and services to address customer requirements and market demand. One such service which is launched is video-as-a-service.” Matrix’s Ruchir Talati believes the adoption is high and due to trends like mobility and subscription. He explains, “Enterprises are also

MOST TRUSTED

Software System Integration Partner..!

BEYOND SYSTEM INTEGRATION Big Data | Cloud | Mobility | Social Media BFSI | Education | Energy | Healthcare | Hospitality BI & Analytics | CPM | ECM | GRC info@finessedirect.com | www.facebook.com/finessedirect | www.finessedirect.com JULY 2016

ENTERPRISE IT WORLD

19


COVER STORY // ENTERPRISE SECURITY

ARUN SHETTY, DIRECTOR OF COLLABORATION SOLUTIONS INDIA, AVAYA

“Digital interactions account for over 35% of all interactions, and will overtake voice in two years’ time.”

TAKAYUKI INABA, MANAGING DIRECTOR, NEC INDIA

“One of the major challenges faced rom UC perspective by CIOs and CXOs

is security of data on these integrated platforms.”

looking at unified communications as a means to reduce costs and improve employee efficiency while cutting down on their carbon footprint by reducing the need to travel. In addition to this, unified communications as a service is a highly updated, standardized, pre-integrated and low cost service that accelerates business processes. This helps enterprises in fast decision making. Unified communications service can be used in various sectors such as Hospitality, Retail, Transportation, Banks, Financial Services and Insurance (BFSI) and other business enterprises.” Inaba explains why enterprises are rapidly adopting UC, “In India, UC continues to be a key enabler to bring voice, data, and video together and integrates them with business applications, for swifter response and better business. Unified communications as a service (UCaaS) is emerging as a viable alternative primarily because of its economical appeal, and the promise of ensuring interoperability of various communication systems in your ecosystem. As cloud adoption increases and complimentary applications move to the cloud, the value proposition for UCaaS is further strengthened.” Future of UC in India The market for UC in the country is rapidly expanding with more and more enterprises of all sizes adopting some sort of UC in their 20 ENTERPRISE IT WORLD

JULY 2016

workspaces. Smart UC solutions have come into the forefront. Avaya’s Shetty explains that Avaya sees the biggest potential in SMEs, “Our Smart Solutions will address Government, enterprises and mid-market customers. Avaya unlocks the power of pervasive engagement in organizations with reliable and innovative software, systems and services including Smart Public Safety, Smart Education, Smart Workspace, Smart Healthcare, Smart Hospitality, Mid-market, new age services and start-ups.” Tech adoption is the main game plan for Enterprises as Matrix’s Talati said, “Enterprises accounted for moving more towards UC solution due to inherent benefits of anywhere, anytime and on any device communication. This can be primarily attributed to rising adoption of video conferencing and web based collaboration.” Technologies like convergence and BYOD are key influencers for future. astTecs’ DR. Kurian states, “In the coming days, enterprise communication would become more integrated and graduate towards consolidation of existing systems. Collaboration tools like cloud based infrastructure, offering a viable alternative; smart-phones and social media would shape the CRM & customer support strategy in the coming years and beyond. According to industry reports, mobile applications & integration, video and social media will become must have elements in the enterprise IT

infrastructure. The market of UC in India is growing very fast indeed. NEC’s Takayuk Inaba comments, “According to Frost and Sullivan, the Unified Communications market in India is expected to grow at 11.8% CAGR from 2010 to 2017. The market for unified communications has been growing at an exhilarating rate for the past few years. It is primarily driven by the changing business scenarios/environment where small or big enterprises are looking at deploying solutions which could cater to evolved communication needs in the face of an increasingly industrialised and digitized nation such as India.” Finally Unified Communication is a technology enablement comes with its own challenges. Dr. Kurian suggests, “While looking at buying unified communications systems, first key point is to evaluate the value proposition of each vendor offering these solutions and second, the deployment models that they require, like: on-premise, cloud-based or a hybrid solution.” The adoption of UC in today’s market scenario plays a big part in efficiency enhancement which in turn directly corresponds to keeping up with competition. IT businesses of the day are based on lightening quick collaboration and information sharing. Decision makers and executives are realizing the vitality of flawless communication in increasing business productivity. Challenges like ROI, QoS and security remain as the biggest hurdles, but with subscription models, UC as a Service (UCaaS), enterprises can eliminate these issues and benefit from interoperability and unification. The market is ripe and with large enterprises and SMEs deploying UC services alike, Unified Communications is set to redefine business collaboration and communication as one of the main drivers for long term growth.


CITRIX // INTERVIEW

BYOD AS A CULTURE HASFOUND HUMONGOUS ACCEPTANCE Automation is gradually taking up momentum among enterprises, opening up an almost new IT vertical for business in the country. As offices shift to smart concepts and seamless communication; Parag Arora, Area Vice President & Country Head, India Sub -continent at Citrix Systems talks about the market scenario of the automation industry and how is the technology being leveraged in the country.

“Citrix Desktop Virtualization and Enterprise Mobility solutions will enable the government to deliver its services to the citizens and stakeholders in a centralized and secure manner.”

PARAGARORA, AREA VICE PRESIDENT & COUNTRY HEAD,

BY SANJAY@ACCENTINFOMEDIA.COM

INDIA SUBCONTINENT, CITRIX SYSTEMS

How is the technology changing business? The organizational landscape today is on the verge of complete technology convergence. With the adoption and integration of technology in organizational processes, the idea of workspace is being redefined. Workspace is no longer a physical space; it is the absolute environment we interact with. Automation has brought agility, flexibility and efficiency whose benefits are shared by business owners and employees. How are enterprises embracing automation? Communication, internal and external, which forms the foundation of a well-oiled organization, is facilitated in a workspace that is built on automation. Because of this seamlessness, mobile devices today are better engineered to carry out functions that otherwise were restricted to an

area such as one’s desk. BYOD as a culture has found humongous acceptance because of its obvious perk of employees being available outside the office. Similarly, the rise of solutions such as desktop virtualization, enterprise mobility, file sharing etc. are changing the way businesses work. Is automation being leveraged in the public sector? Not just businesses, but the Indian Government is also making strides in integrating technology in its day to day operations. With the government’s scope of work implying management of massive scale of sensitive data, automation of their workspace is a natural progression. Citrix has aligned with the Directorate General of Supplies & Disposals (DGS&D) to provide mobile workspace and virtualization solutions. Citrix Desktop Virtualization and Enterprise Mobility solutions will enable the government to

deliver its services to the citizens and stakeholders in a centralized and secure manner. What are the threats around automation? The shift towards office automation entails software governed secure email communication, effective presentations, mining databases and integration of technologies like fax machines, printers, workstations etc. Storage of data on cloud has amassed a data bank which is accessible to all. However, storage of data on an internet platform comes with its own potential threats. Security thus needs to be ensured with investments in multi-level encryption. Citrix Workspace-as-a-Service (WaaS) is one such technology empowering employees with secure, on-demand access to the apps and data they need to work effectively and efficiently from anywhere. JULY 2016

ENTERPRISE IT WORLD

21


SECURITY // PALADION NETWORKS

When it comes to discovery analytics, there are a plethora products today which have established the

capabilities to detect attacks. Every AV, Firewall, IDS/ IPS, SIEM, and anti-APT have security analytics for this.

RAJAT MOHANTY, CO-FOUNDER, CHAIRMAN AND CHIEF EXECUTIVE OFFICER AT PALADION NETWORKS

SECURITY ANALYTICS – DO YOU NEED IT?

BY SANJAY@ACCENTINFOMEDIA.COM

It is like left brain/right brain metaphor. The popular notion is that the right brain is involved in identifying patterns, connecting dots and getting the bigger picture while the left half is used for logical, analytical, and deductive thinking.

How does the left and right brain theory apply to cyber security monitoring? I frequently get asked by clients whether they should invest in security analytics projects. Over a period of time, I have built up a conceptual framework to put security analytics in the context of overall security operations. Although there are many areas for applying analytics, including risk and compliance or vulnerability management, I will concentrate on threat management where I feel it has maximum applications. At the broadest level, I try to picture it as a left brain/right brain metaphor. While there may not be strong scientific evidence, the popular notion is that the right brain is involved in identifying 22 ENTERPRISE IT WORLD

JULY 2016

patterns, connecting dots and getting the bigger picture while the left half is used for logical, analytical, and deductive thinking. In security parlance, right brain analytics would be used for discovering new things such as abnormal patterns, outlying behaviors, unknown attacks or trying to complete the jigsaw puzzle of an attack campaign when parts of the attacks may be missing from alerts. Meanwhile, left brain analytics would be used to dig deeper once an alert is found to deduce how and when the attack happened, who attacked, and what damage was done. You can break security analytics in threat management into discovery analytics –right brain and investigative analytics –left brain. These are

the fundamental pillars in an active cyber security framework. When it comes to discovery analytics, there are a plethora of products today which have established the capabilities to detect attacks. Every AV, Firewall, IDS/ IPS, SIEM, and anti-APT have security analytics for this. In addition, there are a variety of threat intelligence products and separate big data analytics, user behavior, and entity behavior analytics. Again, I have tried to create a conceptual framework for this concept. One can break up the threat into 2 parametersattack vector and threat actor (attackers) – and plot the four quadrants as known and unknown for actors and vector. Known actors would mean we know something about the attacker, for example, the typical TTPs in a known attack has obvious meaning. The right half of the graph is all about rulesattacks are known and hence a rule can be created for security devices like IPS, WAF, DLP, SIEM or anti-malware products. Because the attacks are getting more complex and because there are stages to attacks, these rules can be more than just one signature. While purists may not deem such rule writing as analytics, nevertheless, modelling the correct rules is an important part of threat detection. Many of the existing products in this segment are building more and more complex rules when they say security analytics. The segment quadrant is where the attacks are not known a-priori, but we have some knowledge of the attacker. There is an entire industry that has grown around external threat intelligence. In addition, large enterprises are building up threat intel from their own internal SOC data. Such threat intel can be applied to a variety of data sources including logs, flows, packets, URL access,


PALADION NETWORKS // SECURITY

Recon

Weaponize

machine configuration files, etc to generate alerts. Tactical threat intel gets applied directly while strategic threat intel gets modeled into attack trees. The most classical application of analytics however is in the unknown-unknown quadrant. This is where the statistical and probabilistic models are used for finding outliers, patterns, abnormalities, and attack sequencing. Machine learning is getting widely used for this quadrant and the concept of big data is most relevant here since the underlying data is beyond logs, ingesting a wider variety of machines, networks, packets, and unstructured data. However, the last quadrant is also the area where you could end up chasing the tools rather than the output. There are so many models, algorithms, and software packages that do machine learning, statistics, and probability calculation

Deliver

Exploit

that often the discussion is more about the tools and platform capabilities rather than the use cases. Even if you are trying to find unknownunknowns, it’s still important to pin down the use cases for them. The Cyber Kill Chain – Determining when rules are needed That brings us to my third conceptual model – using cyber kill chain to understand why we are building what we are building in security analytics. As the diagram shows, there are some areas of kill chain like exploit and recon and some parts of execute where rules are available in current products. These are represented by red dots. Several other areas like the deliver phase or the install phase are difficult to have rules and hence need analytical models, which are shown as black dots.

Install

C&C

Execute

These detect waterhole attacks, unknown forms of beaconing, unknown malware installation, lateral spread in networks, data exfiltration without the data being labeled, etc, and are the areas that need analytics as well as rules to solve them. For other places where rules can solve, it is overkill to build analytics. (The red and black dots are only for illustrating the idea and not the exact measurement of what rules are available). So, one way to approach use cases would be to determine what threats you want to detect and whether any rules exist in any of the deployed products before taking up a security analytics project. I am trying to build a framework regarding left brain analytics, security investigative analytics, what analytics are needed following an alert or incident, or as Gartner says, “hypothesis driven analytics.” I will address this concept in a future post. JULY 2016

ENTERPRISE IT WORLD 23


CXO // RAH

ASHOK KUMAR, MD & CEO,

RAH INFOTECH PVT. LTD.

“There are three primary reasons why many companies are adopting NAC at a furious pace: a complex network infrastructure, the

unfettered practice, and the need to mitigate advanced threat.

24 ENTERPRISE IT WORLD

JULY 2016


RAH // CXO

NEXT-GEN NAC: A GAME CHANGER IN NETWORK SECURITY NAC’s incarnation, next-gen NAC, offers tremendous value and advantages that can be applied across a variety of security requirements, policies, and controls

N

ot a day passes without the news of a major data breach. Although enterprises are spending billions on network defences, they are constantly being subjected to attacks that seem to confound all.According to the 2015 Cyber Threat Defence Report,more than 71% of respondents’ networks were breached and nearly 60% have reported an increase in mobile threats. Cyber threats are constantly evolving and becoming more sophisticated than ever. The attackers are organized, skilled, and highly motivated. They know that it’s easier to compromise vulnerable endpoints than to directly target servers and databases. On their part, companies too make their vulnerabilities evident when they fall behind in undertaking patching efforts, have inactive host defences, and lack BYOD controls. They find it difficult to secure their weakest links: mobile phones, social media, and laptops and tablets. With most of the users having active social accounts on their mobiles and tablets, Key Capabilities

Policy Engine Third-party interoperability Authentication Network enforcement B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

Guest networking Visualization and reporting Agentless operation Endpoint compliance Guest management Automated remediation Advanced threat mitigation

attackers indulge in tactics such as spear phishing and water holing to trick unsuspecting users into sharing access credentials or downloading malware-infected files. Once the users have fallen to the ruse, it takes only a moment for hackers to breach the security and exploit other less secure systems.

THE SECOND COMING OF A NEW, POWERFUL NAC Network access control (NAC) has always been the talk of IT security professionals for well over a decade since it first made its appearance. NAC is a network security solution designed to grant, limit, or deny access to network resources through policies defining acceptable or unacceptable users, devices, and application properties. It provided them with a means to limit access to healthy devices. But device authentication came at a cost: it was cumbersome, costly to implement, and often disrupting users. As organizations begin to tolerate wireless, mobile devices and institute bring-your-own-device (BYOD) polices, Basic NAC

Next-Gen NAC

Basic

Advanced

a a a a a r r r r r

Advanced

a Advanced

A comparison of legacy and next-gen NAC capabilities

a a a a a a a

the chorus grew for a new, powerful network defense system: the next-gen NAC. The need was very specific: a real-time network visibility, a flexible architecture, limitless policy options, and automated endpoint remediation. Organizations were no longer taking lightly for defense solutions that were limited to managed devices and ‘grant or entry’ network access policies. There are three primary reasons why many companies are adopting NAC at a furious pace: a complex network infrastructure with inherent control and endpoint visibility gaps; the unfettered practice of BYOD polices; and the need to mitigate advanced threat.

MITIGATING THREATS WITH NEXT-GEN NAC As attackers are easily able to spot and compromise vulnerable endpoints, it is necessary to prepare the defenses using next generation network access control (NAC) implementations. NAC is particularly effective at addressing security gaps introduced by transient network devices. When a threat is evident, it performs the following functions: n Alerting you to compliance violations n Keeping noncompliant, vulnerable endpoints off the network n Remediating vulnerabilities and security misconfigurations directly or via third-party systems n Ensuring that host defenses are installed, up-todate, properly configured, and enabled When configured optimally, the next-gen NAC will provide you with more endpoint intelligence than you ever dreamt possible. It will give you a bird’s eye-view of the entire network ecosystem in real-time: devices and their types, operating systems, applications, virtual machines, security risks, network locations and a lot more.

LEVERAGING NEXT-GEN NAC Research studies indicate that companies know approximately 80 percent of what is on their network, and at any given time, as many as 50 percent of those devices have a security or configuration issue. A full-fledged next-gen NAC can see and control—in real time—including visible and nonvisible endpoints, network devices, applications, and users.Well-equipped with passive and active network discovery techniques, today’s next-gen NAC solutions provide unprecedented, real-time network visibility to security professionals. However, a lot of misconceptions about NAC continue to dominate industry professionals, and this is fueled by the restrictions of legacy NAC offerings. At any rate, the next-gen NAC is widely gaining recognition as a core security platform and is poised to help organizations address challenging IT security issues. JULY 2016

ENTERPRISE IT WORLD 25


GUEST COLUMN // RADWARE

SSL ATTACKS ON THE RISE Cyber-attacks, including Distributed Denial of Service (DDoS) attacks and advancedweb application attacks continue to plague businesses25% of all attack activities today areusing SSL-based attack vectors.

It’s been over 20 years since the earliest versions of the Secure Socket Layer (SSL) protocol emerged from a team of engineers at Netscape Communications. As the Internet and more specifically the World Wide Web began NIKHIL TANEJA its precipitous climb in the early 1990’s MANAGING DIRECTOR INDIA & SAARC, RADWARE these engineers recognized that to drive deeper interactions online, a standard for securing communications would BRIEF PROFILE need to be widely adopted. “nikhil taneja has a highly As is always the trend, mass adoption successful and rewarding of certain technologies is followed career of 21 years 6mths in the closely by efforts to exploit its wide use it industry. having worked in through a number of security threats. organizations : wipro, digital SSL is no exception to this rule, and has equipment corporation- compaq, experienced a large number of highly cabletron systems, he is now publicized vulnerabilities that force heading radware. users to move to new, more secure always associated with promoting versions and ultimately a replacement and selling niche & upcoming protocol such as Transport Layer technologies / solutions , Security (TLS). right from the beginning of However, exploits of newly identified career at wipro infotech, he vulnerabilities are not the only way that carries a special experience of SSL adoption is being used as a weapon creating the complete business in the hands of malicious attackers and infrastructure required to adversaries behind cyber threats. SSL promote the technology i.e. is increasingly being used to mask and creating customer mindset , si further complicate attack traffic detecpartner / channel mindset , tion in both networkand application creating the organization / teams level threats. for the same. The Information Technology universe that leverages SSL got a major wake-up call in April 2014 with the disclosure of the Heartbleed vulnerability associated with OpenSSL implementations. Some other major SSL vulnerabilities that have emerged over the years include the long standing (and still impactful) RC4 vulnerability originally discovered in 2002, and the more recent POODLE vulnerability that exploits some software logic to failback to SSL 3.0 (exposing other known vulnerabilities). These SSL vulnerabilities are not directly related to the SSL DDoS and advanced web application attacks described earlier. However, these vulnerabilities can cause a distraction from 26 ENTERPRISE IT WORLD

JULY 2016

addressing broader nonvulnerability based attack weaknesses, and highlight the tendency towards exploitation of broadly adopted technologies. Despite some high profile security issues, SSL (and TLS) remain the standards for ensuring secure communications and commerce on the web, and has seen dramatic growth in recent years. When SSL was conceivedand introduced, a relatively small number ofbusinesses had websites, and even fewer were managing commerce or critical aspects of business operations online. Today, most businesses of reasonable size have an active website to drive consumer engagement and at a minimum, properly secure communications (if not transactions) through its website. According to Netcraft, the use of SSL by the top one million websites has increased by 48% over the past two years. As more and more sites add SSL or TLS capabilities, user adoption in turn also increases.

EMAIL SERVICES AND THE THREAT LOOMING LARGE… For many years, it was recommended to implement SSL to support ecommerce sites or any credit card transactions. Those limitations have gone away with the growth of other purposes for secure communications. One area of dramatic growth is encrypted email services. A recent series of attacks highlighted how providers of encrypted service can become targets for encrypted attacks. ProtonMail is a leading provider of encrypted email services, providing a secure means of communication to over 500,000 users. In November 2015, ProtonMail was targeted with a series of advanced DDoS attacks that included volumetric attacks over 100 Gbps as well as application layer attacks. The attacks also included multiple encrypted attack vectors including SSL SYN flood attacks that required advanced behavioral analysis to identify malicious traffic and maintain legitimate encrypted traffic flows.

To read more features, go to www.enterpriseitworld.com/guest article


SECURITY // GUEST COLUMN

WHY TRAVELLING LIGHT IS THE KEY FOR CLOUD JOURNEYS Organizations today are increasingly acknowledging the benefits of cloud and cloudmanaged services like Office 365 and Amazon Web Services.

ARAVINDAN ANANDAN CONSULTING SYSTEMS ENGINEER – ASIA PACIFIC, BARRACUDA NETWORKS (INDIA). BRIEF PROFILE “Aravindan joined Barracuda in 2007 and is responsible for positioning and solution designing Barracuda Network’s application delivery and security products portfolio in Asia Pacific. Prior to joining Barracuda, he was a Technical Solutions Engineer with NetContinuum India Pte Ltd (a Barracuda Networks Company) and a Sonicwall Level 2 Technical Support Engineer with E4E Business Solutions India Pte Ltd before that. At NetContinuum, Aravindan was responsible for supporting a global customer base for the NetContinuum Application Gateway with application. Notably, Aravindan is a Microsoft Certified System Administrator and holds a Bachelor of Engineering degree in Mechanical Engineering from Visvesvaraya Technological University.

The worldwide use of public cloud services will grow at a 19.4% annual rate over the next five years, from nearly $70 billion in 2015 to more than $141 billion in 2019. That’s six times the growth rate of enterprise IT spending as a whole and will cause cloud spending to double during that time period, according to market researcher IDC. But to be able to reap the benefits that cloud has to offer, an organization must first overcome migration challenges, especially those created by vast volumes of data. The cloud migration checklist should include managing legacy PST files, ensuring optimal traffic for cloud services, and providing a layered approach to information security and management. To eliminateredundantworkloads pre-migration, during migration and post-migration, enterprises should consider security and storage solutions that:

CONDENSEOPERATIONALAND MANAGEMENT OVERHEADS

Theenormoustomes of email information, stored in both Exchange servers and PST files, that organizations typically accumulate create logistical challenges of migrationthat have a significant bearingon upload and storage costs. This holds true for especially PST files – that contain as many as thousands of emails and attachments, in addition to hundreds of contacts, calendar items and task liststhat combine to form gigantic volumes of databackup, recovery, corruption and discovery challenges. Some organizations have resorted to file and message

archiving, eDiscovery, and PST management solutions to eradicatethe use of PST files by locating and migratingdata stored inPST filesto theiropted cloud stations. Though it does make sense to relocate only the data which is actually required. This puts forward a need for organizations to design a data retention and deletion strategy and leverage policy-based migration tools to automatically identify, delete and relocate redundant or duplicate data, and only migrate prioritizeddata. This approach alleviates the risks and dangers associated with storing enormous volumes of unmanaged files and emails. Take for example, reducing email storage helps in simplifying archiving into the cloud and looking for files across appliances and cloud-based data. Acloud-webbed message archiver can extend archives into the cloud for offsite, long-term, and cost-effective storage. Policies determine data toduplicate to the cloud for disaster recovery or as a secondary tier of storage, withdata replicationfor reduced or condensed overheads.

OPTIMUM UTILIZATION OF NETWORK AND BANDWIDTH Another yet common challenge is the internet connection’s lack of bandwidth to upload or relocate significant numbers of files, large capacities of historical email and other such data from an organization’s own data center to the service provider’s data center. One approach to deal with this is to shiftPST file data on a message-by-message basis,instead of a whole file in one go, to the cloud. This uses the network capacity in the most efficient manner. This process ofrelocating data from the on-premise source to the cloud also helps in averting any potential network bottleneck. To gauge cloud distributions,high-performance load balancing and application delivery boost obtainabilityand speed for To read more features, go to www.enterpriseitworld.com/guest article

JULY 2016

ENTERPRISE IT WORLD 27


INTERVIEW // PI DATACENTERS

INDIA’S DC MARKET TO TOUCH $4.5 BILLION MARK BY 2018.

India’s datacentre market is going northward with the demands coming from infrastructure growth. Enterprise IT World spoke to Kalyan Muppaneni, Founder & CEO, Pi DATACENTERS to know about their strategy in the market. excerpts. 28 ENTERPRISE IT WORLD

JULY 2016


PI DATACENTERS // INTERVIEW

KALYAN MUPPANENI, FOUNDER & CEO, PI DATACENTERS.

“The growing cloud market in India with an estimated CAGR of 32 % over the years 2013-2018 is also shaping up the demand for the DCs.”

BY SANJAY@ACCENTINFOMEDIA.COM

How big is the datacentre market in India? Indian data center infrastructure market currently valuing at $2.2 billion, is expected to touch $4.5 billion mark by 2018. It is predicted that India would move to be the second-largest market for datacenters in Asia Pacific by 2020, with investments reaching $7 billion. The growth owes to the pooling demand from verticals like BFSI, Telecom, IT & ITES. Organization’s dependence on data and their inclination towards optimization of business processes drives this demand while state initiatives like Digital India support them. Current trends are northward for 3rd party DCs with a steep rise over the year from a meagre 15-20% in 2012 to 35-40% in 2015. The same is expected to grow at 25% CAGR YoY pertaining to high opportunity cost they provide. The growing cloud market in India with an estimated CAGR of 32 % over the years 20132018 is also shaping up the demand for the DCs. Gartner’sCloud Adoption Survey in January 2015 revealed 53% of organisations were already using cloud services and another 43% in the same survey indicated planned adoption by end of year. How Pi DATACENTERS is positioned? In our early days into the Indian datacenter market, we have been able to rake quite a bit of buzz around our positioning as an innovator in this space. Starting from being Software Defined Strategic Datacenter (SDDC), on a Software Defined Network(SDN) architecture, to providing end to end self-service enabled services portfolio, for customers to be in control of what they use, we have been able to deliver a matured echo system to this industry to ride on. The essence has been to provide our customers scalability and flexibility, coupled with access

to an amalgamated environment of latest and greatest of technologies. Gartner doing a case study on our SDN architecture itself speaks significantly about our positioning as an innovator in this market. What services are offered by Pi DATACENTERS? Pi, as a software defined strategic datacenter with our flagship cloud framework @PiCloud™, deliver top of the league end to end datacenter services with high level of automation, self-service and a strong layer of managed services, that suits the dynamic nature of the industry and delivers the best fit results to end users. we @Pi™, focus on enterprise class cloud solutions around Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Disaster Recovery as a Service (DRaaS) and Industry specific solutions riding on our stable cloud Platform, where architecture is built grounds up basis varied industry framework. With our state-of-the-art infrastructure and a scalable architecture we also provide off the shelf data center services like get Co-Location, white space, hosting, and managed hosting at a TIER of customer’s choice. With IoT and Big Data taking the center stage today, our services around IoT and Analytics as a Service would help enterprises in real time decision making and analytics of their data banks in the right way, at the right time. Our practical and scalable architecture is poised to be just the right choice for DR for enterprises of all ticket sizes, in keeping disasters of all kinds and scale at bay. Our automated DR solutions, leveraging the stable @PiCloud™ platform, address the traditional issue faced by most Indian enterprises of not many global class options being available to them in India for an on the fly, on demand DR.

How many customers are there and who are the major customers of the company? Across industry verticals of Government, Manufacturing, IT/ITES & Startups we support 20-25 customers and its growing. We are well poised to be datacenter partner of choice of 200+ customer by the end of this fiscal year. What are the advantages of the company over Tatas or Bharati or any competitor? Pi has entered the Indian Market differentiating itself from the existing Datacenter providers in terms of the class of Core Data Center infrastructure to the level of Managed Services. We emphasize on quality and professionalism in our services backed by stringent Service Level Agreements. The grounds up modular architecture enables our customers to scale at will without worrying about space crunch. Our strategically chosen location of Vijayawada(Mangalagiri)adds to cost optimization both in terms of infra and power. This enables us to pass on the cost benifit to our customers, coupled with world class services, lowering their TCO. With our fully automated and customisable workflows, our customers can provision their enterprise cloud on our self-provisioning platform. The intelligently built infrastructure is scalable between the TIER levels. Our customers can leverage our Uptime certified TIER IV environment for their mission critical applications and infra, while their non mission critical applications and infra can leverage our TIER III environment, resulting to cost optimisation and operational excellence. What all certification the company has so far apart from HIPAA? Pi is an ISO 27001 |22301 | 20000 | 9001 | 14001 certified organization for its - Business Continuity Management System, Information Security Management System, Information Technology Service Management, Environmental Management System and Quality Management System. These certifications reflect the commitment of Pi towards its values of quality, integrity, respect to stakeholders, and environment friendliness. Ensuring the uptime of mission-critical applications has never been more important than today. Cognizing the same, our first of many data centers located at Amaravati is built to be an UPTIME certified TIER IV datacenter. JULY 2016

ENTERPRISE IT WORLD 29


THE STUFF  //  PRODUCTS & SERVICES

FUJITSU

NETRACK

Fujitsu PRIMEFLEX vShape Integrated System

NetRack Server Racks for Seismic Environments

Fujitsu’ latest version of PRIMEFLEX vShape integrated system now benefits from 20 percent increased performance compared to its previous generation with the incorporation of Fujitsu’s latest powerful PRIMERGY M2 servers. Powered by the new Intel Xeon E5-2600 v4 product family processors and DDR4 memory technology

with up to 2,400 MHz frequency, the latest generation dual-socket FUJITSU Server PRIMERGY systems are designed to process workloads quickly while maintaining low energy consumption. This efficiency is enhanced by the reduced costs associated with cooling thanks to Fujitsu’s Cool-safe Advanced Thermal Design. The PRIMEFLEX

vShape represents an out of the box integrated system for the data center, made up of industrystandard networking, storage and server components, that are optimized to handle virtual workloads. It is vShape’s flexibility that enables enterprises to rapidly deploy solutions that exactly meet their immediate requirements, regardless of how far

they are on the road to virtualization, and easily scale in future to handle demand. The integrated system is available in validated bundles of multiple different sizes, starting with just 25 virtual machines to address the needs of SMBs, up to configurations for 2,400 virtual machines, designed for large enterprises.

CAPABILITIES… •  Providing converged implementations based on highly scalable and modular reference architectures. •  Supports the consolidation of IT  •  Provides convincing solutions for various workloads – starting at 25 VMs up to 200 VMs. •  Can easily be implemented into any IT environment – without lock-in. •  RIMEFLEX vShape reference architectures remove the headaches of self-configuration,

NETRACK NRSs Series- Ultra Rigid Racks, specially designed for seismic zones, is an ideal solution for secure, high density server and networking applications in IT environments that are earthquake prone ZONE or subject to regular vibration. These racks comply with the highest quality standards under stringent ISO 9001-2008 Manufacturing & Quality Management System. CAPABILITIES… •  Conforms to DIN 41494 (General  industrial standard for equipment) or  Equivalent EIA /ISO / EN Standard •  Comply to Seismic Zone 3/4  Requirements •  Adjustable mounting depth •  4 No Adjustable, 19″ verticals  with Punched 9mm Square Hole  and Universal 12.7mm-15.875mm15.875mm alternating hole pattern  offers greater mounting flexibility,  maximizes usable mounting space. •  Universal 25MM Pitch Holes For ETSI  Standard Racks

ORACLE

B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

ORACLE CLOUD-BASED OPERATIONS ON SPARC Oracle new additions to the SPARC platform that for the first time bring the advanced security, efficiency and simplicity of SPARC to the cloud. Built on the new SPARC S7 microprocessor, the latest additions to the SPARC platform include new cloud services, engineered systems and servers. While the business benefits of the public cloud are increasingly clear, many organiza-

30 ENTERPRISE IT WORLD

JULY 2016

tions have yet to move enterprise workloads to the cloud due to performance, security and management concerns. To help eliminate those concerns and enable organizations to confidently move enterprise workload to the cloud, the new SPARC platform is designed from the ground up to economically improve on cloud computing delivery of the most critical business applications and scale-out

application environments. CAPABILITIES… •  It provides organizations with a simple, secure  and efficient compute platform in the Cloud. •  The new service extends the complete suite  of cloud services that Oracle provides to help  organizations build and deploy rich applications


india’s first IT magazine for sme business

PRESENTS

CONNECTING CUSTOMERS MODERNIZING INFRASTRUCTURE TO ENABLE BUSINESS

OPPORTUNITY AS BIG AS

1000 CUSTOMERS

10 CITY

200

CR TICKET SIZE

JULY-SEPTEMBER 2016

GURGAON - 14 JUL l NOIDA - 15 JUL l CHANDIGARH - 3 AUG l LUDHIANA - 10 AUG l ALIGARH - 17 AUG l KANPUR - 24 AUG l BHOPAL - 7 SEP l INDORE - 14 SEP l RANCHI - 21 SEP l JAIPUR - 28 SEP

THANK YOU PARTNERS AND PARTICIPANTS FOR MAKING THE TWIN CITY (GURGAON & NOIDA) EVENTS SUCCESSFUL. For more info about rest of the 8 cities contact: sanjib@accentinfomedia.com CONTENT PARTNER

ENTERPRISE APPLICATION PARTNER

NETWORKING PARTNER

INFRA PARTNER

APPLICATION INTEGRATION PARTNER

SECURITY PARTNER

COMMUNICATION PARTNER

OFFICE AUTOMATION PARTNER

6/103, (Ground Floor) Kaushalya Park, Hauz Khas New Delhi-110016 Tel: +91-11-41657670 / 46151993, Email: info@smechannels.com



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.