Enterprise IT World July 2018

Page 1

@entitworld

@enterpriseitworld

@enterpriseitworld

R S 2 0   |   PA G E S 3 6   |   V O LU M E 0 3   |   I S S U E 0 5

WWW.ENTERPRISEITWORLD.COM

FOR THE CIOs. BY THE CIOs. J U LY 2 0 1 8

: I B E RPRIS NS

SIO E I C T E D N R E G BETTE LY

G N I S A E R C N D I L N R A O N W I N E V I R D A T A D

MAKIN

today’s n i y c n of rre sent cu andora’s Box o e r p i n om eP st e new g up th ing businesse h n i t n s e i p o er s, Data onomie ot just empow 6 c e l a t i p1 sn dig which i customers,... s t h g i s r i In e arget th better t


Cloud Object Storage

Secure Cloud Services for your online business since 1999. .Reliable .Secure .Speed .Scalable .Manageable .Compliant

It’s hard to believe XcellHost Hot Cloud Storage is 50% cheaper than Amazon S3. What Makes Us Hot ₹ 1 per GB/month only ₹ 999 per TB/month only

Regardless of how you access XcellHost hot cloud storage (Mac, Windows, or S3 API), We offer sizzling hot price and performance, plus unlimited free egress. No addition API calls, so you don’t pay to access your data.

$58,636/yr

$57,085/yr $25,936/yr

$12,968/yr

Object Storage Use Cases IP Camera Backup

Tape Archiving

Content Distribution

Big Data Storage

Video Archiving

IOT Data

Simplified Cloud Storage

For Mac & Windows Users Perfect for users looking for the easiest way to utilize XcellHost's hot cloud storage. Just drag-n-drop cloud storage to your desktop.

S3-compatible Cloud Storage

For IT Professionals Suitable for IT professionals and other users familiar with the AWS S3 API & compatible

Price

Performance

Protection

Security & Trust

Ease of Use

50% less than AWS S3

6x faster than AWS S3

Data center redundancy

Enterprise security

Free simple client

Unlimited free egress

Super-fast uploads

11 x 9s data durability

Full encryption

Drag-n-drop transfers

No charge for API calls

Fastest downloads

Immutable storage

HIPAA & CJIS certified

Full S3 API support

www.xcellhost.cloud

sales@xcellhost.cloud

+91-8657414121


EDITOR’S  LETTER

BI ANALYTICS TO PLAY A KEY ROLE GOING FORWARD

Smartphone proliferation and data generation has been rampant in India in the past few years, opening up a

new trove of great insights and customer data for businesses big and small. And with the power of Analytics and Big Data being gathered, stored and leveraged, the billion strong Indian customer base is being studied and catered to like never before. CIOs are now exploring analytic use cases not only for processes across environments but to empower their fellow CXOs like CEOs, CFOs and CMOs with unprecedented insight into customer ideology, market scenario and the revenue structure of the organization. Analytics is further being used to streamline processes for employees as well as innovating the product line for a rapidly evolving customer. BI doesn’t just play a key role in making sure that the decisions are the least worst ones, they are impacting the corporate understanding of business processes so significantly that analytics-as-a-service has become a much soft after solution for enterprises big and small. Internet usage is expected to grow and with it will consumption and generation of data. This will give rise to better insights and estab-

NEXT MONTH SPECIAL

COVER STORY

Data Explosion and India’s Storage Demands

lish a whole new playing field in the market competition. Enterprise IT World Security Symposium is also underway with mega success in Bengaluru where the event received an overwhelming response from the CISO community. The 4 City Symposium will next travel to Kolkata, New Delhi and Mumbai in the months of April. Apart from the cover story on Business Intelligence in Enterprises today and in future, the issue covers a number of topics in the form of CIO and CXO articles, interviews and industry insights. The topics range from the next step from GDPR, the security gaps in the Indian economy, and the rise of the CISOs as business stakeholders. We will shed a further analytic eye on the topic of Data explosion in India and what it means for the economy moving forward.

S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M

SUPPLEMENT

Data Explosion has been the most significant phenomenon of recent times. Information is at the forefront of all economic progress coming out as the most valuable resource. In an era of rapid data generation which is rapidly surging in the billion strong consumer economy, we take a look at the factors that are fuelling this vo;lume, what this means for the busienss economy and how is India’s storage infrastructure gearing up to cater to the exploding data treasure in the coming decade of digitization.

Enterprise IT World Security Symposium 2018

Exclusive coverage of Enterprise IT World’s 4 City Cybersecurity Summits which started from Bengaluru on the 26th July and will be engaging the Security Comittee in the Cities on Kolkata (3rd), New Delhi (10th) and Mumbai (24th in AUgust

PLUS

Interviews, Case Studies and Surveys

Literature and assessment on recent applications from the Industry stakeholders, IT/ITES Vendors and IT leaders and CIOs from the Enterprise IT World CIO Community.

Send in your inputs to sanjay@accentinfomedia.com JULY 2018    ENTERPRISE IT WORLD

3


CONTENTS V O L U M E 0 3   |   I S S U E 0 5   |   JULY 2 0 1 8   |   W W W . E N T E R P R I S E I T W O R L D . C O M

FOR THE CIOs. BY THE CIOs.

Publisher: Sanjib Mohapatra Chief Editor: Sanjay Mohapatra Senior Editor: Chitresh Sehgal Associate Editor: Deepak Singh Designer: Ajay Arya Assistant Designer: Rahul Arya Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan Lead Visualizer: DPR Choudhary Social Media Manager: Harshali Arora MARKETING Marketing Manager: Kajal Sharma kajal@accentinfomedia.com SALES CONTACTS

COVER STORY

Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016

16

Phone: 91-11-41055458

ENTERPRISE BI: MAKING BETTER DECISIONS IN AN INCREASINGLY DATA DRIVEN WORLD

Data is the new omnipresent currency in today’s digital economies, opening up the Pandora’s Box of Insights which is not just empowering businesses to better target their customers, CIO SURVEY / 34

Synology DiskStation DS218j Optimized backup for all Digital Assets

MORE INSIDE Editorial~ ~~~~~~~~~~~~~~~~~~~~~~~~~ 03 News~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06 INTERVIEW Dell EMC~ ~~~~~~~~~~~~~~ 32

24

22

25

E-mail: info@accentinfomedia.com EDITORIAL OFFICE Delhi: 6/103, (GF) Kaushalya Park, New Delhi-110016, Phone: 91-11-41657670 / 46151993 info@accentinfomedia.com Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/103, (GF) Kaushalya Park, Hauz Khas New Delhi-110016

Phone: 91-11-46151993 / 41055458

Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.

26

INTERVIEW

SECURTIY CORNER

CIO TALK

DIGITAL DIARY

“With gradually increasing influx of technology, INDIA is making itself prone to vulnerabilities”

“CISO - The New Member of Boardroom!”

IoT: A Whole New Security Challenge”

Manufacturing”

F-SECURE

4

IRIS SOFTWARE

ENTERPRISE IT WORLD    JULY 2018

OIA DALMIA “Bringing IndusBHARAT GROUP try Edge 4.0 to

27 INDUSTRY INSIGHT

INOX AIR PRODUCTS

“SAP FIORI - Intuitive Design and Ease of Use with Better Productivity”



ITWORLD

ROUND UP

Smart Devices To Add $600 Bn To Global Manufacturing Revenue By 2020

B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

A new report by Capgemini’s Digital Transformation Institute reveals that the global manufacturing industry could expect to see between $519-$685 billion in value-added revenue by 2020 through the development and sale of smart, connected devices. The report, “Digital Engineering: The new growth engine for discrete manufacturers” highlights that while the potential returns are significant, manufacturers need to invest in digital continuity and digital capabilities to benefit. Manufacturers estimate that close to 50% of their products will be smart and connected by 2020, a 32 percentage point increase from 2014. In fact, 18% say that they plan to stop manufacturing products altogether and move to a pure service-based business model. A move in this direction will make the shift to a service-based model a business imperative and will require enhanced capabilities. 6

ENTERPRISE IT WORLD  JULY 2018

“We want to bring value to the market by shifting our business model toward service-based and cloud-connected architectures. It is a key way to differentiate our value proposition in the market of pure hardware players,” says Antoine Destribats, Vice President – Industrial Operations at Schneider Electric. Manufacturers have responded enthusiastically to new technologies and are already rebalancing their IT investments accordingly. Around 50% of manufacturers aim to spend more than 100 million euros in Product Lifecycle Management (PLM) platforms and digital solutions in the next two years, while the proportion of IT budget earmarked for maintaining legacy systems has dropped significantly, from 76% in 2014 to 55% in 2017. While digital investment has increased substantially since 2014, few manufacturers have been able to scale their efforts.

D ATA BRIEFING

119mn Rs Average cost of a cyber breach in India, a 7.9% increase from the 2017 Source: IBM Security



ITWORLD  //  NEWS BRIEF

Dassault Systèmes acquires No Magic

Dassault Systèmes completed the acquisition of No Magic, a global solutions company focused on model-based systems engineering, architecture modeling for software, system of systems and enterprise business processes modeling. The signing was announced on October 25, 2017 and the closing of the transaction follows completion of customary conditions, including receipt of foreign investment approvals in the United States and in Lithuania. No Magic is headquartered in Allen, Texas and has offices in Lithuania and Thailand. The acquisition of No Magic strengthens Dassault Systèmes’ industry solution experiences based on the 3DEXPERIENCE platform by generalizing systems engineering for developing the “Internet of Experiences” – the smart and autonomous experiences that are digitally connecting products, nature and life in the physical world.

CIO

Enterprise customers, small companies and professionals in the aerospace and defense (NASA/JPL, Boeing, Lockheed Martin), transportation and mobility (Ford, Renault, Honda, BMW, Nissan), and other industries (Sony, Panasonic, John Deere, GE Healthcare, Pfizer, J.P. Morgan, PayPal) rely on No Magic’s solutions including its core product, MagicDraw, part of the Cameo Suite, for business process, architecture, software and system modeling with teamwork support. They gain dynamic visual insight, mitigate enterprise risk, lower costs and eliminate operational pain points caused by complex business and IT systems having multiple technologies and standards. While providing continuity for No Magic’s customers, Dassault Systèmes will empower No Magic’s solutions with its 3DEXPERIENCE platform, complementing and reinforcing CATIA applications.

Bengaluru, India Security Symposium gathers over 100 of the leading CISOs from the City to engage in Tech Talks, Panel Discussions and Presentations. SECURITY SYMPOSIUM BENGALURU

ENTERPRISE IT WORLD  JULY 2018

Aujas Cyber Defense Center, an ISO 27001 certified Global Delivery SOC (Security Operations Center) has gone live in Bangalore. It is designed to extend the capabilities of SIEM (Security Incident and Event Management) solutions and proactively provide threat detection, actionable threat intelligence and endpoint response. This aims to help security professionals hunt and mitigate the increasingly complex and persistent threats of the present and future. Srinivas Rao, Co-founder and CEO of Aujas, explains the increasing need for proactive cybersecurity. “Today, more than 70% of security incidents are reported by third parties, often as late as 6-9 months after the event. The data signifies that enterprises today have weak monitoring capabilities driven by detecting and alerting familiar attacks. This leaves a window of vulnerability which malicious agents can easily and repeatedly exploit. “ He further added, “If a bank or an insurance provider’s network is breached, then the customer’s assets, as well as personal data and reputation, are on the line.

EVENTS

26TH JULY 2018

8

Aujas’ Security Operations Centre goes live in Bengaluru

27TH JULY 2018

Bengaluru, India Marketing Innovation Conclave engages Enterprise CMOs and Digital Marketing Leaders to discourse on the evolving Marketing Strategies and Innovation. 100 BEST MARKETING MINDS OF INDIA 2018 CONCLAVE

03RD AUG 2018

10 TH AUG 2018

SECURITY SYMPOSIUM KOLKATA

SECURITY SYMPOSIUM DELHI

Kolkata, India Security Symposium travels to Kolkata after Bengaluru to engage CISOs and Security Heads from critical sectors like BFSI and Manufacturing.

New Delhi, India The Enterprise IT World Security Symposium 2018 comes to the country’s capital where attendees get insights and gain knowledge from Industry experts.


Postal Reg. No.: DL-SW-01 / 4200 / 17-19

Date of Posting: 1 & 2 of Every Month

www.ctrls.in Asia's Largest Tier 4 Datacenter

Our customers have every reason to smile as they achieve IT and business alignment, gain agility, comply with regulations and secure their data through our comprehensive service portfolio

Our Comprehensive Service Portfolio Colocation Services Cloud (Public, Private, Hybrid) Community Cloud - Banking Community Cloud - Insurance Community Cloud - Manufacturing Community Cloud Managed Services Disaster Recovery as a Service (DRaaS) Cloud Managed Services Managed Security Services

Powering 13 of the Fortune 100 Global Multinationals and 25 of ET 100 Indian Companies Write to us at marketing@ctrls.in for more details

CtrlS Datacenters Ltd

USA | India | Singapore | Middle East | APAC


ITWORLD  //  NEWS BRIEF

Fortinet signs Threat Information Sharing Pact with Interpol

Fortinet has formalized its threat sharing with INTERPOL. The goal of the agreement is to proactively combat cybercrime and threats to privacy globally through the sharing of threat information generated by Fortinet FortiGuard Labs global threat research team. Fortinet will be involved in operational briefings at INTERPOL and vice versa. A threat intelligence expert from Fortinet will be assigned to collaborate with experts at the INTERPOL Global Complex for Innovation (IGCI), helping provide a clearer understanding of the current threat landscape, which in turn will help the INTERPOL team and law enforcement use the information to prevent risks to security and privacy. While the agreement formalizes the cooperation between Fortinet and Interpol, both organizations have been operationally collaborating for over two years. Fortinet has been an active member of an expert working group within INTERPOL for more than two years, providing cyberthreat intelligence which has helped discover and identify multiple cybercrime operations. Last year, Fortinet was one of several private sector companies that provided support to an INTERPOL-led operation targeting cybercrime across the ASEAN region, resulting in the identification of nearly 9,000 command-andcontrol (C2) servers as well as hundreds of com-

QUICK BYTE ON

promised websites, including government portals. Previously, Fortinet also helped uncover through close threat information cooperation between INTERPOL, Fortinet, and other private sector partners, a group of online fraudsters behind thousands of online scams totaling more than $60 million and involving hundreds of victims worldwide. Silvino Schlickmann Jr., acting executive director, INTERPOL Global Complex for Innovation said, “Tackling cybercrime cannot be resolved unilaterally by law enforcement alone, but is a joint responsibility which requires trusted relationships with the private sector. This new agreement with Fortinet will ensure that law enforcement have access to the most comprehensive threat intelligence necessary to take effective action against cybercrime.” Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet said, “Organizations continue to struggle against evolving threats, an expanding attack surface, and a growing security skills shortage. Law enforcement, in particular, can also be hampered by the fact that cybercrime often crosses political and jurisdictional boundaries. Actionable threat intelligence with global visibility is the best way to move from being reactive to proactive in a world where cybercrime has no borders. No single organization has a complete view into the security landscape, which is why threat information sharing and collaboration between public and private organizations is critical

S/HE SAID IT

JASON HART, VICE

PRESI \DENT AND CTO DATA PROTECTION, GEMALTO.

“If businesses can’t analyze all of the data they collect, they can’t understand the value of it – and that means they won’t know how to apply the appropriate security controls to that data.”

“Given EU GDPR, and

impending India’s Data Protection Law, stepping up focus on Data protection practices and capability building, is a key imperative to satisfy expectations of customers and consumers.” R A M A V E D A S H R E E , C E O , D ATA S E C U R I T Y C O U N C I L OF INDIA

SECURITY

Critical sectors across Southeast Asia target of widespread cyber espionage Symantec Corp. announced that Symantec’s artificial intelligence-based Targeted Attack Analytics (TAA) technology helped researchers expose a new attack campaign from a group called Thrip, which has infiltrated satellite communications, telecoms, geospatial imaging, and defense organizations in the U S and Southeast Asia. 10 ENTERPRISE IT WORLD  JULY 2018



ITWORLD  //  NEWS BRIEF

Commvault, Alibaba Cloud combine forces to drive Global Transformations Commvault and Alibaba Cloud, the cloud computing arm of Alibaba Group will leverage each other’s technology and market advantages to deliver advanced, innovative and scalable hybrid cloud data management solutions to help customers and partners across the globe accelerate digital transformations. Alibaba Cloud is among the world’s top 3 IaaS providers according to Gartner, China’s largest provider of public cloud services and the number four player globally in the IaaS market by revenue in 2017 according to IDC. Commvault’s partnership with Alibaba Cloud allows businesses to make their move to the cloud with greater ease and security. With IDG highlighting big data/analytics, mobile and cloud as the leading business revenue drivers, and 49 percent of global enterprises citing data availability and visibility as responsible for significantly improved

EXECUTIVE

business performance, data is a critical asset to information-driven businesses. However, complex regulations and the fast pace of changing business needs threaten the success of enterprises embarking on their digital transformation journey. Dajiang Han, Head of Global Alliance, Alibaba Cloud Global said, “We are excited to enter this strategic partnership with Commvault and concertedly empower our customers through advanced cloud computing and data management capabilities. Digital transformation is the new benchmark for companies amidst an increasingly competitive landscape, and data is at the core of this journey. As cloud continues to serve as the backbone of today’s digital economy, Alibaba Cloud and Commvault are committed to deliver innovative technologies to address the ever-growing challenges in data storage, processing, management and protection.” “The combination of Commvault’s leadership in backup & recovery and moving data to, from and between clouds and Alibaba Cloud’s strengths will provide scalable and secure cloud solutions, while supporting the acceleration of digital transformations across the globe,” said Owen Taraniuk, VP of Worldwide Partnerships and Market Development, Commvault.

Cisco, FICCI and IDC link up to create Sustainability Scorecard for Smart Cities The International Data Corporation (IDC) in association with Cisco and the Federation of Indian Chambers of Commerce & Industry (FICCI) launched a report titled ‘Smartest Cities of the Future’. The report outlines a framework that focuses on sustainable and inclusive (social, economic, and digital) development, and a smart city scorecard to measure the impact of intelligent solutions. The report recognizes that for sustainable urbanization, cities need to adopt a framework that is socially equitable, economically viable and environmentally sustainable. The report emphasizes the challenges of urbanization and recommends five major thrust areas Recognizing that mere investments in enhancing infrastructure are not the solution, the report notes that while urbanization has resulted in economic growth it has also posed socio-economic and environmental challenges. For cities to become more competitive, need to become smarter and more efficient, The report underlines that investments in coordination with technology, value capture funding and strategic private-public partnerships will be the essential engines of growth for cities to achieve sustainable living.

MOVEMENT Cognizant names CEO Francisco D’Souza as new VC Board of Directors

Publicis.Sapient gets Nigel Vaz on board as CEO EMEA and APAC

Ness Digital names Anshul Verma as Chief Sales Officer

NETGEAR adds Brad Maiorino to its Board of Directors

Smart Communications names James Brown as CEO

Cybage ropes in Walter Mastelinck to its Board of Directors

12 ENTERPRISE IT WORLD  JULY 2018

Axis Communications ropes in Sujith Sebastian to fuel retail and hospitality portfolio

Chitra Ramkrishna, D K Sharma join Maveric Systems’ board as independent directors Conduent Names Lokesh Prasad CEO, Asia Pacific Region


SINGLE-PAIR UTP TO IP PHONES PoE to 1,200ft (365m).

COAX & UTP TO IP TV PoE+ to 2,000ft (610m).

MULTI-PAIR UTP TO IP WIFI PoE++ to 2,000ft (610m).

MULTI-PAIR UTP TO IP ACCESS PoE++ to 2,000ft (610m).

COAX & UTP TO IP CAMERAS PoE+ to 2,000ft (610m).

SINGLE-PAIR UTP TO IP SPEAKERS PoE to 1,200ft (365m).

HOSPITAL

ER

OF GR E

ME

MBER

O THE T T PO

W

E ERTIFI - C ED

Io

N

2008

HOSPITAL

For more information E-mail Us at indiasales@NVTPhybridge.com | Call Us at +91 9751032192 | Website: www.nvtphybridge.com


ITWORLD  //  NEWS BRIEF

BOOK

SHELF

Data-Driven Healthcare: How Analytics and BI are transforming the Industry

GLOBAL UPDATE

Megatrends that will reshape markets, societies and global order

AUTHOR

LAURA B. MADSEN

PRICE

RS. 599.00 (PAPERBACK) AVAILABLE AT

AMAZON.IN

EY revealed several new megatrends in its most recent report, The upside of disruption: megatrends shaping 2018 and beyond. The report predicts that we are entering “the era of human augmentation,” which will transform many aspects of everyday and business life, from work to human behavior to the consumer experience, and will require fundamentally different approaches to regulation. The report also analyzes the reinvention of food production, manufacturing, urbanization and health care. Authored by the EY global think tank EYQ, the megatrends report explores “what’s after what’s next?” by identifying emerging trends that should be on leaders’ radars and the longer-term realignment of markets, society and the

global order. It provides a framework for understanding where disruption comes from and where it’s headed, giving leaders a way to anticipate, prepare and strategically respond. Uschi Schreiber, EY Global Vice Chair – Markets and Chair of Global Accounts Committee, says, “Today’s corporate leaders almost universally see disruption as both an opportunity and an existential threat. But to seize the opportunity and find the upside of disruption, leaders need to understand where disruption is coming from, where it’s headed and what it means for them.” “Super consumers” will be empowered by technologies that enhance human decision-making and create more informed and richer consumer experiences.

About The Book The book explains the value of BI and analytics and breakdowns trends such as Big Data, Cloud Computing and the power of ‘Infographics’ as a communication tool for data.

Key Feature This book addresses the naysayers of the power of data by examining previous scenarios when data drastically changed an industry.

Tata Tele drives protection for enterprise Cloud services with Secure Connect Tata Tele Business Services (TTBS) has introduced ‘Secure Connect’, a new feature to make Cloud computing more secured for the enterprises. The company announced this at its Do Big Forum an interactive knowledge platform focused on enabling SMEs to understand the technological aspect and benefits of cloud computing and also apprise them about Secure Connect. 14 ENTERPRISE IT WORLD  JULY 2018

Secure Connect offer a seamless end user experience while you transition between the private network and the Cloud. Vishal Bhat, Vice President for Business operations – North (SME), Tata Tele said, “One of the major deterrents for SMEs in adoption of Cloud services is issue of data security. In the ever-increasing era of data leaks, a good cloud computing security solution should have

an inbuilt security protocol that protects sensitive information and transactions. The business environment today is highly distributed, with companies operating out of multiple geographic locations. In order to have a cohesive operations and support collaborative working among employees across various offices, it is vital that each facility is able to connect to central facilities.


NEWS BRIEF   //  IT WORLD

MANAGEMENT

MANTRA

“You cannot deliver value unless you anchor the company’s values. Values make an unsinkable ship.” – INDRA NOOYI, CHAIRMAN AND CEO, PEPSICO

Synology safeguards scattered data across physical and virtual workloads

GCR releases Cloud-based enterprise IoT solutions

Cloud-based IoT solutions are transforming the ways companies are doing business today. IoT solutions are helping businesses understand their customers/markets by providing intelligent inputs and feedback and in turn enabling them to monitor and manage their resources for optimum returns. Multi-function IoT solutions require integration of multiple solutions on to a single technology platform. Global Channel Resources India (GCR India) offers vertical focused, comprehensive IoT solutions by validating and integrating such solutions available through multiple vendors. The role of the MSPs (IT Managed Service Providers) is paramount in implementing such solutions. The challenge for the MSPs is that their focus is more on solution implementation

rather than doing design and development to integrate the IoT solutions. Thus, they find it difficult to service the market demand. This is where GCR India comes into the forefront to play a pivotal role by offering cloud-based technology platform and an online marketplace to help MSPs to deploy SaaS connected, preintegrated IoT solutions, worldwide. GCR India’s online marketplace connects global IoT vendors (ISVs) with the end customers, through the skilled MSPs. It collaborates with worldwide cloud-based/ networking solution providers and enables channel partners providing IoT solutions and cloud services. GCR also offers a combination of smart connected IoT hardware and software solutions to serve end-customers via its MSP partners. GCR India’s unique platform fortifies its Solution Partners to provide a wide range of solutions, services and applications to help accelerate business growth and keep pace with the development of the Internet of Things and Cloud Computing era. Tony Tsao, Founder & CEO, GCR said, “It will enable progressive changes in IoT service business models. Solution providers deliver applications from single to integrated solutions.”

Tech Mahindra to set up Center for Blockchain up-skilling in Hyderabad

Tech Mahindra has launched the Tech Mahindra BlockGeeks Program in its Hyderabad campus to facilitate competency in the field of Blockchain Technology. In its first phase, the company will up-skill a batch of 20 eligible candidates to make them Blockchain-ready and will gradually roll out the program globally. Tech Mahindra will also set up a Blockchain Centre within its research & development arm Makers Lab in order to facilitate co-innovation in the space, developing

enterprise grade solutions for customers across industries globally. Under the TechM BlockGeeks eligible candidates will undergo comprehensive training in the lab post which candidates will be required to setup code, create smart contract and build solutions, thereby gaining technical proficiency in Blockchain Technology. Rajesh Dhuddu, Global Practice Leader, Blockchain, Tech Mahindra said, “As part of our reskilling initiative, Tech Mahindra is focused on providing a comprehensive training to candidates to enable them to leverage next gen technologies and facilitate end-to-end blockchain led transformation for our customers. We are targeting around 3000 blockgeeks to be trained by FY’19. “

Synology announced the official release of two major backup applications in Active Backup suite of packages, the official version of Active Backup for Office 365 that supports SaaS cloud backup, and the beta version of Active Backup for Business that provides data availability for workloads in physical and virtual environments. “More and more companies and organizations are operating across physical, virtual, and cloud platforms. This phenomenon presents a tremendous challenge to IT departments for ensuring the safety of the growing data in this cross-platform environment.” said Jia-Yu Liu, Director of Application Group at Synology “To tackle this problem, Synology provides a new, all-in-one solution that closely integrates software and hardware for businesses of varying scale.” Active Backup for Office 365 employs single instancing technology to not only help businesses with the management and availability of Office 365 data, but also significantly lower the space occupied by backups. The content search function is particularly geared toward combing through content in mail and attachments, enabling users to find the mail in need of recovery in the shortest time. Key features of Active Backup for Business include: l PC and server protection: With the Active Backup agent utility, users can perform imagebased backups to protect their Windows PC or Windows server workloads. Depends on the scenario, users could choose to restore a single file from the recovery portal, bare-metal restore the whole system, or directly run a backup image on Virtual Machine Manager to retrieve the application data and provide application availability. l Virtual machine protection: Users can protect their virtual machine workloads without an agent just with VMware vSphere info.

JULY 2018   ENTERPRISE IT WORLD

15


COVER STORY

: I B E S I R P R E ENT G BETTER N I K A M ISIONS IN ANDATA C Y L DE G N I S A E R C D L IN R O W N E V I DR

16 ENTERPRISE IT WORLD    JULY 2018


COVER STORY

Data is the new omnipresent currency in today’s digital economies, opening up the Pandora’s Box of Insights which is not just empowering businesses to better target their customers, but make more informed decisions across all facets of the business. BI technologies are not just enabling businesses and CXOs to be more efficient with their decision making, it is creating a competitive edge so critical, that an organization unable to leverage the power of insights will find it increasingly tough to survive in the increasingly data-driven world moving forward.

D

BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM

ata has changed the entire game for businesses the world over. Analytics-drive BI is today at the heart of technology-led transformation initiatives. Data driven technologies are opening up troves of invaluable customer data through new smart products, customer experiences, and proliferation of behavioral data. This has signaled a significant shift towards rethinking the way businesses understand their customers and employees; make decisions and better their offerings to the market.

THE EVOLUTION OF BUSINESS DECISION MAKING Till recently, the humble spreadsheet was the only BI tool that most businesses used. That’s fast changing. CIOs and CSOs today are bent on enhancing the value they can get out of data-driven decision making, supporting other CXOs. We are at an inflection point where BI is being redefined with Narrative Sciences and AI is transforming business decision making in a much more augmented and intuitive manner. It is impacting the organization culture for managing not only their day-to-day operations, but also driving innovation through technology to favorably impact both the bottom-line and the top-line. Being a data-driven enterprise is the norm today and Business Intelligence tools are influencing the space big time. Business Intelligence helps data to transform into contextual understanding from mere numbers or statistics helping companies understand detailed sales trends and predict consumers’ behavior based on consumers’ preferences, purchasing habits, reaction to a promotion or advertisement. The analysis of such data can help businesses better plan their strategies and decide their next move to attract more customers. These comprehensive insights acquired through business intelligence tools can guide choices about company’s growth by evaluating a long-term view of the market and competition. Putting data to good use has major business benefits like reduction in costs, access to reliable and improved information, data access in real-time, universal platform-compatibility, coordination

of data-models, and enhanced insight for better results. Key areas of transformation include Company 360 Degree Platform, Customer 360, Customer Persona and Segmentation, Sales & Marketing.

THE TECHNOLOGIES EMPOWERING BI Data today is more proliferated than oxygen in the world of business. It is everywhere, easier and cheaper to gather and analyze. Business insights derived from data are becoming an essential part of corporate survival and success in the digital world. Retail businesses are leveraging social media and web logs from their e-commerce web sites to gather information that are not part of their enterprise data to gain insights on the customers who didn’t buy their products and analyze the reasons or feedback of the customers. Further fuelling the SMAC technology revolution are technologies like IoT and Cognitive analytics. Third platform technologies are providing a plethora of services under one umbrella. The cloud component helps you store information and data blurring all geographical boundaries while the Analytics helps you understand the data and form a coherent explanation. You can then leverage this information to drive the right messaging via social and mobile components. SMAC based technologies add immense value to current day business. Social - With the explosion of data transactions in social media, businesses can benefit a lot by transitioning from e-business to digital business. SMAC eco system allows the businesses to be directly in touch with end users via Social networking platforms. This helps the businesses to get feedback on their products directly from the Horses’ Mouth. The ability to extract customer feedback via sentiment analysis has empowered Businesses to get a Customer 720 Degree View which helps them understand customer behavior, customer personal preferences. This has in turn led to more new customer acquisition, deeper lead pipeline and an opportunity to constantly fine tune customer experience and satisfaction. A business focusing of deep customer and product analytics always has the edge to be a market pioneer or leader. Targeted marketing strategies are becoming a child’s play with the data available on SMAC eco systems.

JULY 2018    ENTERPRISE IT WORLD

17


COVER STORY

NITIN GUPTA, FOUNDER, CEO AND CTO AT NEUROTAGS

Moving forward predictive analytics will also assist businesses foreseeing the effect of various decisions and market reaction to

SRIRAM NARASIMHAN,

potential new product lines.”

VICE PRESIDENT, COGNIZANT DIGITAL BUSINESS

“We are at an inflection point where BI is being redefined with Narrative Sciences and AI is transforming

SHRIKANT VAZE, HEAD- INDIA GDC, VICE PRESIDENT GLOBAL DELIVERY GROUP, FUJITSU CONSULTING INDIA

“In a customer driven market like India, it is extremely significant for brands to understand what their customers’ expectations are

business decision making in a much more augmented and intuitive manner.”

and profile their behavior by understanding their buying trend.”

WHERE BUSINESSES ARE USING BI TODAY Today BI technologies are making inroads into all aspects of business. Organizations are developing powerful 360 Degree Platforms to provide multifaceted insights from customer data. This is being leveraged in enhancing customer experience, segmentation, Sales & Marketing, increased Lead Pipeline, timing of Sales pitch, relevancy of Sales and predictability of Conversions from Lead to prospect to clients and executive Reporting and Management. Another important area is Analytics-as-aService, to make data widely available to decision makers throughout the organization. CXOs want to focus on the ‘what of BI’ rather than not on the ‘how of BI’ when they need it. The SMAC technologies are accelerating the art of the possible in providing Analytics-as-a-Service. Areas like sales, revenue, customer engagement and 18 ENTERPRISE IT WORLD    JULY 2018

employee performance management are being heavily influenced by BI technologies. Many companies globally, are using BI in segments like customer engagement, increasing revenue and sales and employee performance management. BI is helping track real time operations, monitor how well the employees are doing and if there are any areas where they can grow and can also be used to keep employees happy and appreciated for their good work. The last step in bridging the gap between insights and action and creating a pervasive data-driven decision-making culture is analytical storytelling. This means bringing data to life to tell a well-constructed narrative – one that ultimately connects with the hopes, fears and motivations of each stakeholder to encourage and guide a change in behavior. Such storytelling is enabling companies to shift from being instinct-driven to being insight-driven in their decisions.

The Criticality of better decisions making in today’s competitive landscape Organizations have started accepting the fact that data drives business. Using BI, companies can increase overall employee satisfaction, which improves productivity and performance. Any organization investing on good technology platforms to first collect correct, complete and consistent data has already won the first leg of the battle. With higher quality of data and superior technology platforms, organizations can then unleash the power of BI and analytics which have become the lifeline of organizations (read top-line, bottom-line, stakeholders, investors etc.). Insights collected via the BI and Analytics tools can help organizations to come out with product recommendations and process recommendations. BI has improved visibility across core business components, improves ROI and ability to achieve goals, understanding of consumer behavior,


COVER STORY

VIVEK TYAGI, DIRECTOR OF BUSINESS DEVELOPMENT, EMBEDDED & ENTERPRISE, WESTERN DIGITAL

“Generating insights for better business decisions is a critical task done by analyzing humongous volumes of data generated from multiple touch points like mobile user data or surveillance data.”

JAYAKANTHAN CHIDAMBARAM, SENIOR MANAGER – BI & ANALYTICS AT ASPIRE SYSTEMS

“A powerful BI platform is built over a robust Data Warehouse paving way for gathering a 360 view of the company there by providing

DEEPAK PARGAONKAR, SENIOR DIRECTOR, SOLUTION ENGINEERING, SALESFORCE INDIA

“Today, most businesses operate data on cloud, therefore BI provides real time information of a cloud business and allows corrections

multifaceted insights around performance, financial wellness etc.”

necessary to keep businesses on track.” marketing and sales intelligence, and productivity. Gradually, BI has now become more embedded in business process. CFOs and CMOs are not using BI to react to business event but predict and transform a business event as it happens. Clients also have started thinking about data monetization using BI. Data created by customers through their online behavior and interactions allow companies to decode customer needs, preferences, sentiments and grievances—and to create more personalized experiences and services with data-driven business decisions. Accurate information gives organizations the ability to take the right decisions at the right time and for the first time has enabled measurement of the overall performance of business and identification of areas of improvement. In a customer driven market like India, it is extremely significant for brands to understand what their customers’ expectations are and profile their behavior by

understanding their buying trend. Besides this, BI also allows one to predict future trends which can be a huge advantage in today’s competitive market. Organizations not using BI and analytics would put them at a major disadvantage. Organizations have a huge data goldmine, and this has to be tapped to get actionable insights.

THE WAY FORWARD Despite the profusion of data, a number of researches suggest that CXOs do not leverage it when making key decisions. Moreover, in an increasingly complex corporate landscape there is often a communication gap between data professionals and business stakeholders. Businesses will need new business models built from analyzing your customers and business operations at every angle to really understand them – all made possible on the ground with BI and Analytics. The trick for businesses is to sift through that

data, gather useful insights and then put that data to good use. Gone are the days of running a department or company based on instinct alone. The right kind of data will improve contacts with prospective sales, prevent customer service disasters, ensure the right amount of inventory is in stock, anticipate trends, pin point profitability and bridge design gaps, all actions that will directly improve bottom line. No matter what BI application is used, the reality is that organizations are continuously searching for ways to get more value out of their data. BI provides one of the best ways to transform data sources into interactive information that can lead to better decision making and planning. Adopting AI/BI and Analytics is the only way forward to beat the competitors. Without proper application of AI and BI, sustaining existing business and competing with peers will be the biggest challenge in future. JULY 2018    ENTERPRISE IT WORLD

19


COVER STORY

AJAY YADAV, HEAD IT (NORTH), ARIL

ARAVIND NATARAJAN, SENIOR MARKETING MANAGER, ZOHO CORP

“Organizations not using BI and analytics would put them at a major disadvantage. Organizations have a huge data goldmine, and this

“Organizations are continuously searching for ways to get more value out of their data and BI provides one of the best ways to transform data sources into interactive information.”

has to be tapped to get actionable insights.”

DEEPAK KALAMBKAR, IT HEAD AND CISO, MARVEL DATA SERVICES

“Business Intelligence today is vital for any enterprise and it is going to be the future of planning any budget, exploring new opportunities and initiating new projects.”

SRINIVASRAO MUPPANENI, CIO, THE AP AND TELANGANA STATE CO-OP BANKS

“Without proper application of AI and BI, sustaining existing business and competing with peers will be the biggest

challenge in future.”

20 ENTERPRISE IT WORLD    JULY 2018

The entire business world is undergoing digital transformation, powered by an information backbone which fuels the data driven decision making culture. BI has been developing new revenue streams by monetizing information assets that are shared both within and outside the enterprise. Moving into future, BI will help deploy a system of intelligence to automate and improve core business processes. In today’s digital economies, information is akin to power. A good BI strategy will be able to seamlessly cater to all the levels of the organization powering the vision of the executive team and meaningfully translating them into action items to various departments. The companies that are able to put data and insights into the hands of their people to make informed and relevant decisions that place the customer at the centre will be the ones that succeed in this new digital and data driven world.


STARTUP TALK

S.P. ARYA,

PARTNER & DIRECTOR-TECHNOLOGY, BIZTEK ADVISORS

“The whole startup top line will have to work hard together to overcome hurdles, and collectively create a startup culture

that’s inclusive, efficient, and valuable for every stakeholder.”

WHY STARTUP SAGA SINGS FAILURE RAGA

Though the popularity of entrepreneurship is fast advancing northside, but startup venture brings its own unique set of practical/cultural challenges and problems that its leaders must think and commit to address these.

E

ntrepreneurial adventurism is on rampage across the world as more and more millennials opting for this route rather going for jobs and limiting their life to 9 to 6 sort of routine. Youngsters are collaborating in their colleges itself to form a startup or joins hands after college to solve a business problem and earn high while aiming high. They have fantastic ideas though, but with no experience to make right moves, many a time they land up in situation

where either they get a taste of failure or business start running at snail’s pace leading to internal chaos leading to impending failure. It’s a facts that there are more funding opportunities available than ever before. To fuel it further professional courses and content on how to start your own business are easily accessible over the internet, and institution/community-driven incubators and innovation hubs are mushrooming all over the country. So, it’s a good idea and time to be engaged in the startup venture. Let me bet here, this is an

industry which is not going anywhere or slowing down anytime soon. But the whole startup top line will have to work hard together to overcome these hurdles, where they will collectively create a startup with culture that’s inclusive, efficient, and valuable for every stakeholder. But before we embark the startup journey, an important questionmust be in our mind- Why do startups fail in the first place and failure rate is so high? One of the key trigger behind failure is the few high level risks being associated with startups. These mainly are business strategy adoption and then execution failures. The first and most critical step is to choose your partners with extreme care and due diligence. Know your partner for at least a reasonable time. Build a robust business strategy with deep involvement from the partners/stakeholders. Rather controlling, give them free hand but bind them with processes/ policies. Choose partner who possesses the skills you dont have. Find out how your potential partners thinks. Respect their views. Ensure you share every business issue/problem with partner before he knows from other sources later. Learn when to break the partnership before it breaks the business. No business can run without use of a technology. Periodic reviews are of immense importance to bring continuous improvements and address issues before they become critical. Keep work freedom and financial freedom separate. And last but not the least is manage success and growth. Though there is a long list of sound advices for startup owners and partners but aforesaid key points will keep the people and business both in synchronization where you get maximum output in terms of business and bottomline both. Have a great startup journey. JULY 2018    ENTERPRISE IT WORLD

21


INTERVIEW  // F-SECURE

K E I T H

M A R T I N

HEAD CORPORATE BUSINESS, APAC AND JAPAN, F-SECURE

“Businesses are displaying more interest in understanding network vulnerabilities and how individual network elements, including surveillance devices, change the network arrangement and contribute to the overall threat.”

22 ENTERPRISE IT WORLD    JULY 2018


F-SECURE //  INTERVIEW

WITH GRADUALLY INCREASING INFLUX OF TECHNOLOGY, INDIA IS MAKING ITSELF PRONE TO VULNERABILITIES Businesses have taken heed to the warning signs after recent global ransomware attacks and have increased their focus on cybersecurity and understanding of their network vulnerabilities, exploring advanced AI and big data-driven solutions to ensure reinforced security moving forward.

How big is cybersecurity market in India? India is a fast-digitizing country where the digital infrastructure is booming and its adoption is rapid. But, as more people go online, their limited awareness about the dangers that they’re vulnerable to puts them at considerable risk. Fresh entrants to the digital domain are not aware of even the most basic cyberattacks, including phishing and credential theft which increases the onus on cybersecurity players to protect them. This makes the Indian cybersecurity market which is yet to reach its true potential, a growth-intensive industry. At present, it is pegged to be worth $1.5 billion and is expected to grow with a CAGR of 19 percent till 2023. However, the true figure could fall well-short of the current estimates as new dynamics get introduced to the cybersecurity domain and contribute to the market growth. How is it different from other developing markets in the world? India is actively applying digital technologies across all walks of life. We are on a mission to build smart cities where state-of-the-art technologies will play a pivotal role in making us, as a nation, more efficient. We are simultaneously increasing the reach of digital technologies by not only using and promoting smart devices and solutions, but also by integrating them into our daily lives. The Aadhaar-based digital payment system is one such example. However, with the gradually increasing influx

of technology, the entire nation is making itself prone to vulnerabilities in technology. For instance, if you’d ask any cybersecurity professional, he or she would inform you that there is no IT system that is impenetrable. With the right approach and resources, any system can be breached. The only way to keep our systems intact is by constantly looking for and fixing weaknesses. We also have to protect individual layers of IT systems in our smart cities with cutting-edge cybersecurity solutions. We have to analyze the risks that they’re prone to individually, and vis-à-vis, their role as part of a broader network arrangement. Adopting this approach will provide significant benefits to us in the long run. What are the major trends in cyber attack landscape today? Businesses are quite apprehensive after last year’s global ransomware attacks and have increased their focus on cybersecurity as a result. They’re displaying more interest in understanding their network vulnerabilities and how individual network elements, including surveillance devices, change the network arrangement and contribute to the overall threat. We are observing a strong demand for advanced AI and big data-driven solutions and believe they will observe wider deployments in the near future. Similarly, average users are also gradually becoming cognizant of the digital threats and are readily accepting antivirus and antimalware solutions and cybersecurity

products. What is the relevance of endpoint protection? Today, a majority of companies have a BYOD (Bring Your Own Device) mandate for their working professionals. You can protect your critical IT infrastructure with state-of-the-art cybersecurity solutions, but endpoints can still be compromised and used to penetrate crucial parts of a network. The network endpoints are prone to a range of susceptibilities, including CVEs (Common Vulnerabilities and Exposures), human errors, and malicious insiders. Critical IT infrastructure, however important it is, isn’t the first line that needs to be protected, as they are seldom targeted directly by attackers. So securing that first line of defense – the vulnerable endpoints – needs to be as big a priority as critical IT infrastructure. Businesses are also introducing IoT technology for across-the-board applications. According to Hypponen’s Law, if something is smart, it is vulnerable. Last year, we discovered Web Server Directory Traversal vulnerability within a smart dishwasher that can be used to get network passwords. Considering the number of smart devices that we’re using at offices and households, such CVEs pose a considerable risk. All of these endpoint devices need to be analyzed and protected to make them as secure as possible. What is the opportunity for F-Secure in India? The cost of cyberattacks in India, at present, is estimated to be greater than Rs. 25,000 Crore ($4 billion). And you need to keep in mind that this is with many cyberattacks going undetected or are unreported. The figure is expected to become four to five times larger, or about Rs. 1.25 trillion ($20 billion), within a decade. These estimates are based on current cyberattacks. But, in the future, we’re going to start dealing with big data and AI-based attacks that will render current cybersecurity infrastructure less effective. At F-Secure, we’ve adopted a prudent approach to tackle these imminent challenges by preemptively using a range of cutting-edge technologies. Considering this, and since the company provides security for both commercial and residential purposes, it has a huge market to cater to in India. We have global leadership and a proven track-record of catering to the most dynamic cybersecurity needs at macroscopic and microscopic levels. Our diverse experience across most industries, as well as both developed and developing markets, adds to the overall edge that F-Secure has as a cybersecurity leader. JULY 2018    ENTERPRISE IT WORLD 23


SECURTIY CORNER

RAVINDER ARORA,

HEAD – INFORMATION SECURITY, IRIS SOFTWARE

“CISOs should explain to the board that information security is everyone’s job and that anyone can bring

potential security issues to the information security team.”

CISO - THE NEW MEMBER OF BOARDROOM! Boards of Directors are ultimately liable and responsible for the survival of their organizations, and in today’s interconnected world, cyber resilience is big part of that responsibility, despite the fact that most boards are unprepared for this role.

C

yber threats are increasing day by day and getting more complex and constantly evolving. There’s no way to be 100% protected. That’s why cybersecurity is no longer just the responsibility of Information security departments. Boards of Directors are ultimately liable and responsible for the survival of their organizations, and in today’s interconnected world, cyber resilience is big part of that responsibility. That means that Boards must take an active role in cybersecurity. According to the survey, about two-thirds of directors are not confident about their company’s cybersecurity. There is a growing sense of exasperation, as if we are living in an age of a great plague, with bodies piling up in the streets. If you are a company director, you need to know that your company is under attack. It’s not your fault but it is a problem you must deal with. Cyber 24 ENTERPRISE IT WORLD    JULY 2018

security is not a technical problem that should be left to IT to deal with, it’s a business issue and you must be able to demonstrate due care. Many of the hacks against organizations are possible only because of sloppy maintenance practices of people and organizations that have been tolerated as there are always more -urgent – but not necessarily more-important – things to do. Corporate boards of directors are expected to ensure cybersecurity, despite the fact that most boards are unprepared for this role.The ability of companies to manage this risk has far-reaching implications for stock prices, company reputations, and the professional reputations of directors themselves The view that directors are not sufficiently prepared to deal with cybersecurity risk has raised alarm bells in boardrooms nationwide and globally. Even as companies increase their investments in security, we are seeing more — and more serious

— cyberattacks. If corporate boards are not sufficiently prepared to deal with cybersecurity, how will they be able to determine the effectiveness of current and proposed cybersecurity strategies? How can they know what operationally effective cybersecurity should look like and how it should evolve? A CISO is involved with the day-to-day dealings of risk, threat and breach prevention — to put it simply, it is their job to keep the bad guys away from precious company data. Moreover, it is a CISO’s core responsibility to keep on top of the latest policies and regulations, as well as keeping a hawkish eye over trends in user behavior. The complexity of the issues CISOs deal with on an ongoing basis can often leave them isolated, and removed from vital aspects of corporate governance. The divide between boards and CISOs that has been raised by the Club CISO report, has been around since the inception of the role. In order to strive forward and reduce organizational risk, companies will need to identify why this divide exists, and more importantly how to rectify the issue. Protecting an organization includes the obvious initiatives as well as the less obvious ones. This mindset shows that a CISO has a more expansive view of the risks facing an organization and is thinking holistically about risk. Conclusion: Without question, boards should ensure that cybersecurity is appropriately addressed and sufficiently resourced. However, as important as the cyber imperative is, directors should not allow it to stifle innovation. Over the past decade, IT departments have been reducing operations and maintenance costs consistently, funneling most savings to fund other priorities like security. Board should ensure that Information security gets required budget and resources.


CIO TALK

NAVDEEP SINGH AHLUWALIA,

HEAD NETWORK AND INFORMATION SECURITY, DALMIA BHARAT GROUP

“Wide range of IoT devices and hardware profiles limits the ability to have standard encryption processes and protocols resulting in a reduced overall security.”

IOT: A WHOLE NEW SECURITY CHALLENGE Securing IoT is more challenging than traditional network security due to involvement of a wide range of communication protocols, standards, and device capabilities which works in the favor of hackers and demands a high amount of investment in development of IoT security.

T

he Internet of Things, where Things refers to a wide variety of objects (e.g. smart bulbs, smart locks, IP cameras, thermostats, electronic appliances, alarm clocks, vending machines etc.). It also includes healthcare, automobiles, entertainments, industrial appliances, sports, homes, etc. All IoT have resemblance - ability to connect to the Internet and exchange data. This feature helps in controlling objects remotely across the network infrastructure, resulting in more integration with the real world and less human intervention. There is a very rapid growth of Internetconnected devices - ranging from very simple sensors to highly complex cloud servers. The IoT has transformed these objects from being classical to smart by exploiting its underlying technologies such as pervasive computing, communication

capabilities, Internet protocols, and applications. During the recent years the IOT has become the headlines across the Globe. It has facilitated the business like health care, managing city resources, self-driven cars. IoT installed base is increasing at the rate of 15 to 20 percent annually and security continuously remains a major opportunity and a challenge. IoT industry verticals differ in many respects, their security challenges also vary. Cloud-based IoT framework consists of physical objects and protocols - smart devices such as sensors, actuators; servers acting as a cloudbackend for routing, storing, and accessing various pieces of data; and end-users representing the applications being used to access data and interact with IoT devices. Protocols running on different layers provide end-to-end communication. There is increase in IoT communication arising from computing devices and embedded

sensor systems used in industrial machine-tomachine (M2M) communication, smart energy grids, home and building automation, vehicle to vehicle communication and wearable computing devices. Recent headlines are dominated with security breaches of IOT – like internet-connected screens/TVs can be used to secretly record conversations. The internet connected things may unintentionally cooperate with hackers – a high amount of investment is required in development of IoT security. Securing IoT is more challenging than traditional network security – reason being involvement of a wide range of communication protocols, standards, and device capabilities. Wide range of IoT devices and hardware profiles limits the ability to have standard encryption processes and protocols resulting in a reduced overall security. Hardware specs of IoT devices limit or prevent their ability to utilize PKI. Machine learning, artificial intelligence and big data analytics techniques are emerging and being used for more predictive modeling and anomaly detection. API security for IoT is essential for ensuring the security and integrity of the data transiting between edge devices and backend systems. IoT is affecting our day to day life starting from a small wearable device to large industrial systems. Eight frameworks comprising of rules, protocols and standards have been proposed to simplify the implementation of IoT. The Internet of Things (IoT) plays an important role in our lives and there is no single, magic security bullet that can easily fix all IoT security issues. JULY 2018    ENTERPRISE IT WORLD 25


DIGITAL DIARY

SOURABH TIWARI,

CIO, OVERSEAS INFRASTRUCTURE ALLIANCE

“Digital infrastructure is bringing a whole new approach to manufacturing with new capabilities from sensors, edge data centres and micro-facilities.”

BRINGING INDUSTRY EDGE 4.0 TO MANUFACTURING With edge data center, factories can run own private cloud solution for the necessary processes and protections initiating an effective data journey mixing the real time electronics of the machines on the factory floor with edge facilities and big data insights bringing in massive computing power via cloud.

I

ndustry 4.0 is the fourth industrial revolution in the history of mankind, turning traditional mechanized factories into smart and connected factories, enabled by sensors that collect data which is then leveraged through Analytics and AI to intelligently optimize operations driving more and more automations and lowering costs consistently. Factories are becoming smarter, automated, flexible and more efficient using new technologies. Data center technologies and digital tools are laying a vital role. Instead of just using simple mechanical machines, the aim here is to create a complete cyber physical system which can be defined as a network of collected machines that collect massive amounts of data through sensors, 26 ENTERPRISE IT WORLD    JULY 2018

which is then put into action with a new level of insight and perception. Factory floors are managed with mission critical IT housed in a specialized data center, inside the factory or outside Cloud facilities. Factory IT has to be rugged and immune to the number of dangers in a manufacturing environment including dust, pollution, vibration and electromagnetic pulses. Networking is the real key here. This requires an Industrial internet; Information technology (IT) merges with Operational technology (OT) – the branch of the organisation handling mechanical devices and physical infrastructure. This helps in mitigating security risks from networked mechanical equipments which are emerging as a serious concern in recent times. At the same, OT team’s experience benefits IT

benefits too. To look back at history, the industry revolution is closely related to technologies that offered a whole new level of automation to be achieved. It started in the 18th/19th centuries when factories emerged with steam and water power, creating the first wave of automation. At the end of 19th century, electricity arrived as a more flexible power source fuelling the second wave. Then came revolution 3.0 with Computers in the last 20th century, numericallycontrolled machines such as lathes, CAD/CAM etc. and robot arms began working with data from computer aided design files. Beginning this century, with end to end Digitalization enabled all process to be automated, connected, and factories are instrumented with sensors; more flexible and efficient. The data lifecycle begins on the factory floor with industrial Internet of things (IIOT) sensors capturing readings from machines involved with the production process. Real time data could be captured from Distributed control systems, manufacturing execution systems (MES), Asset management systems (AMS) etc. With edge data center, factories can run own private cloud solution for the necessary processes and protections. Effective data journey is about mixing the real time electronics of the machines on the factory floor with response of edge facilities and big data insights that require massive computing power that can be accessed via cloud run. It’s clear that digital infrastructure is bringing a whole new approach to manufacturing while, at the same time, the industrial vertical is demanding new capabilities from sensors, edge data centres and micro-facilities.


INDUSTRY INSIGHT

ANIL M SINGH,

CIO AND SGM –IT, INOX AIR PRODUCTS

“Fiori can help modernize workflow to get most benefit from your SAP HANA Migration and UI adaptation by introducing

automation in processes like Quality & Production approvals at shop floor, material delivery confirmation by transporter and simple, summarised analytical dashboards for Directors and CXOs.”

SAP FIORI - INTUITIVE DESIGN AND EASE OF USE WITH BETTER PRODUCTIVITY SAP FIORI is the answer to the increasing demand from business users to access the information in easy to use UI with powerful visual representation and minimum input moving on from traditional less adaptive SAP GUI which didn’t provide a lot of flexibility for users.

T

he traditional SAP GUI was less adaptive and restricting users primarily to the desktop or laptop which didn’t provide a lot of flexibility for users. There was ever increasing demand from business users to access the information in easy to use UI with powerful visual representation and minimum input. SAP FIORI is the answer for exactly such requirements.

HERE ARE A FEW OF THE MAIN ADVANTAGES OF UPGRADING TO SAP FIORI. 1. Intuitive Design and Ease of Use - The most commonly cited advantage SAP Fiori brings

to the table is its modern UI design. SAP Fiori features an intuitive design that makes most common tasks easy to find and execute. Fiori apps also share consistent design cues, so users can quickly get a feel for the system as a whole. This cuts down on the learning curve considerably, and makes it easier for workers to adapt to new tasks and assignments. 2. Increased Productivity - The same design qualities that make Fiori easier to use also increase productivity. For example, a common delivery task which involves multiple transaction codes and steps, can be completed in fewer clicks and two or three inputs, which is significantly low compared to SAP GUI. Desired Controls can also be introduced in the FIORI apps.

3. Better Mobile User Experience - SAP GUI predates the mobile workforce, and is designed with a mouse and keyboard in mind. It will behave differently depending on the version and platform, and may not duplicate full all functionality when users switch. Switching to SAP Fiori UX benefits and enables mobility and BYOD. The simple interface enables workers to work from touch screens, and the consistent behaviour and design allows users to expect a similar experience regardless of what device they are using with simplicity. 4. Empowered key stake holders and Better Fit With Your SAP HANA Workflow -Because SAP Fiori apps are individually optimized for certain tasks, they may not fit the complete business logic of a particular organization. Fiori can help you modernize your workflow to get the most benefit from your SAP HANA Migration and UI adaptation. You can introduce automation in processes like Quality & Production approvals at shop floor, material delivery confirmation by transporter and simple / summarised analytical dashboards for Directors and CXOs. With skilled solution providers, you can even convert your day to day operational GUI processes to a simple to use, automated role based apps. Along with these benefits, comes some challenges in adaption like SAP version with fast version upgrade, availability of apps and function modules in the background, skill set to develop and maintain with right partner but the benefits are ever encouraging to overcome these challenges. Continuous improvement and innovation from SAP coupled with power of HANA is going to improve it further. JULY 2018    ENTERPRISE IT WORLD 27


INTERVIEW   // ORACLE

GEARING UP FOR THE INEVITABLE OVERLAPPING OF ERP AND IOT

Data from IoT will further enhance ERP systems’ efficiency culminating in business leaders taking better decisions based on data driven insights but the ERP platform must be able to handle and protect the wealth of information created by IoT sensors, in addition to the data it already processes.

“To support information-driven decisions as well as protection, businesses will need to ensure end-to-end safeguarding, especially as data assets travel from one system to another.”

AJAY KUMAR,

NATIONAL SALES CONSULTING DIRECTOR – ERP, ORACLE INDIA

What does the technological landscape of the Indian manufacturing industry look like in future? Manufacturing is a hugely varied sector, ranging from large pharmaceutical companies with their huge R&D budgets to small furniture-makers struggling to survive. Still, it’s fair to say that the CFOs of most manufacturing companies, like any other sector, are facing a challenging environment. According to survey results gathered for the 2017 AICPA study Agile Finance Revealed, the US manufacturing industry is on pace to increase investment in key technologies such as cognitive computing and artificial intelligence. This next wave of manufacturing is usually called “Industry 4.0,” but it’s more descriptive to call it the “Internet of Goods”. Manufacturing CFOs must now think of manufacturing as one service running on top of a packet-switched network of goods, where delivery and distribution of small batches and single items is an integral part of the business model. What are the challenges CIOs face today when deploying IoT and ERP technology solutions in the manufacturing industry? One of the key challenges in finalizing and rolling out an IoT strategy is identification of 28 ENTERPRISE IT WORLD    JULY 2018

technology for deployment. There are many IoT solutions available in the market, however most of the solutions provide a raw framework that an organization can use to design data capture, reports and dashboards. In this situation, visualization of the data model and nature of dashboards is left to the combined imagination of a customer and implementer. There is no possibility of bringing in best practices or industry experience. Huge compute capability required to process large volumes of shop floor data, and presenting the same in a meaningful way also puts a dampener on IoT plans as this renders most of the projects commercially unviable. Pre-built, Cloud based IoT applications for some common use cases can solve these issues. What is your advice to Manufacturing CIOs in India on the right approach when deploying IOT technologies? According to Allied Market Research, the global ERP software market will surpass a value of $41 billion by 2020. At the same time, IDC is predicting that in the similar time frame, global IoT spend will total nearly US$1.4 trillion as organizations continue to invest in the hardware, software, services and connectivity required to enable IoT. As both these processes

are showing a huge propensity to grow, they are also overlapping. By 2022, IoT enabled ERP is poised to become a huge opportunity for the organizations as this market is expected to reach close to $50 billion by 2022. This overlapping of ERP and IoT seems inevitable. Data from IoT will further enhance ERP systems’ efficiency. Insights from AI and machine learning will further strengthen the ERP systems. This culmination will enable business leaders to take better decisions based on data driven insights. For example, sensors can communicate details about lack of or excess of inventory, allowing supervisors to better manage ordering and replenishment while minimizing the possibility of human error. This parlance can be extended to all the functions of organizations and the advantages that can be reaped are not difficult to imagine. However, there are a few considerations that organizations need to make while opting for ERP and IoT integration. The ERP platform must be able to handle the wealth of information created by IoT sensors, in addition to the data it already processes. The data security capabilities are needed in place across both platforms. To support information-driven decisions as well as protection, businesses will need to ensure end-to-end safeguarding, especially as data assets travel from one system to another.


GUEST ARTICLE

SANJAI GANGADHARAN,

REGIONAL DIRECTOR – SAARC, A10 NETWORKS

“With often poor understanding of corporate security policies, reckless employee behavior increases the risks that come with a growing reliance on disparate and app-dependent workforces.”

HOW EMPLOYEE BEHAVIOR CAN WEAKEN CYBER SECURITY A10 Networks Application Intelligence Report revealed that employees often unknowingly weaken cybersecurity with the use of unsanctioned apps with one out of three employees aware of how they could unknowingly become victimized.

T

he role IT plays in defending against cyberattacks has become more critical than ever. The lack of willingness by employees to take precautionary steps against attacks makes even more challenging for the IT departments to fight security threats. A10 Networks Application Intelligence Report (AIR) examined the challenges IT decision makers face with the rise and complexity of cyberattacks, and the sometimes careless attitudes of employees who unwittingly introduce new threats into their businesses. This data is even more disturbing when almost half (48 percent) of IT leaders say they agree that their employees do not care about following security practices, according to the survey findings. It’s hard to protect someone who isn’t familiar with

the warning signs associated with attacks – or willing to learn about them. With often poor understanding of corporate security policies, this behavior increases the risks that come with a growing reliance on disparate and app-dependent workforces, especially when one third (30 percent) of employees surveyed knowingly use apps their companies forbid. Of those who use non-sanctioned apps, more than half (51 percent) claim “everybody does it,” while one third (36 percent) say they believe their IT department doesn’t have the right to tell them what apps they can’t use. Why use unsanctioned apps in the first place? One third (33 percent) of all respondents claim IT doesn’t give them the apps needed to get the job done. But Who’s Responsible for App Security? For employees who want to check sports scores

or listen to streaming music at work, poorly designed apps with weak security could provide the backdoor for attackers to gain entry into the employee’s corporate network. While the WireX botnet recently hijacked thousands of devices through seemingly harmless apps, it’s a frightening reminder that it only takes one app with weak security to infect a mobile device. More than half (55 percent) of employees surveyed say they expect the use of business apps to increase, meaning the odds also increase of these devices becoming part of a larger DDoS attack, which can bring entire businesses to a screeching halt. But who is ultimately responsible to protect employees who used non-sanctioned apps at work? App developers, IT departments and end users are at odds over who is responsible for application security and best practices regarding the many apps on the phones of employees. With employees, responsibility is low: only two out of five (41 percent) claim ownership for the security and protection of non-business apps they use, AIR found. But if you ask IT decision-makers who is internally responsible, one third say the security team is most responsible for protecting employee’s identity and personal information, followed by the CIO or vice president (17 percent) of the company, and 15 percent state “the whole IT department.” But overall, what does IT need to do better protect their company? The biggest challenge noted by IT professionals is lack of corporate commitment to security policy and enforcement (29 percent). But there is good news: although almost a quarter of IT decision-makers think there will be no improvement in security behavior at their company, 75 percent optimistically think there will be. JULY 2018    ENTERPRISE IT WORLD 29


OPINION ARTICLE

STUART CRAIG,

CHIEF EXECUTIVE OFFICER - ASIA PACIFIC, CRESTRON

“The success of a smart city lies in the hands of the people, in how fast people adopt new technologies, how they live with it, interact

with it and accept it as part of their daily routine.”

BRINGING SMART CITIES TO LIFE WITH PEOPLE-CENTRIC TECHNOLOGY As countries across Asia race towards more technology enabled cities, where people fit into the picture appears to be lost. Governments need to take proactive steps in encouraging both public institutions and rally private companies to come on board and bring smart city innovations to the masses.

A

t the centre of the concept of smart cities lies the promise that technology can make cities better, and improve the lives of its inhabitants. As countries across Asia race towards this goal however, where people fit into the picture appears to be lost. While we see sparks of how cities have worked to transform themselves into more efficient ecosystems – filled with marvels from electronic gantries powered by satellite navigation technologies, to street lamps equipped with facial recognition cameras –it’s often hard to tell exactly how people have benefitted from these cutting-edge innovations. Ironically enough, the success of a smart city lies in the hands of the people, in how fast people adopt new technologies, how they live with it, 30 ENTERPRISE IT WORLD    JULY 2018

interact with it and accept it as part of their daily routine. To accelerate the process, governments need to take proactive steps in encouraging both public institutions and rally private companies to come on board and bring smart city innovations to the masses.

BRINGING THE SMARTS TO THE WORKPLACE With collaboration the current buzz word of the modern workplace, the employees of today expect work tools that offers flexibility, and access to information and connectivity– across a variety of devices and platforms, no less – to be at their fingertips, anywhere and anytime. Adding to that is the trend of talents asking for flexible work arrangements, even working remotely, which

means the use of personal devices is then added into the equation, bringing with it another level of complexity and concerns such as security and compatibility of devices. Where some companies may put it down to the cost of doing business, more progressive companies would see an opportunity to leverage this not just away to improve productivity and collaboration between a geographically diverse workforces, but also as a means of attracting and retaining top talent who relish the challenge of pushing boundaries of what’s possible.

STARTING THEM YOUNG Imagine inquisitive minds with a natural thirst for knowledge and a general openness towards trying out new things and it’s easy to see why the education sector is an ideal place to demonstrate the tangible benefits of smart technologies. Gone are the days where classrooms are filled with students passively listening to lecturers dish out information. Today, students want to learn through interactions and discussions, and through deeper learning activities such as tackling problems in groups and then presenting solutions to the wider class. To this end, it is painfully obvious that whiteboards and markers no longer make the cut. To facilitate the learning process, there is a need to introduce tools that allow one to tap on an intuitive touch screen to stream a video, display a document, or even broadcast a lecture to an online audience, allowing students to focus on learning rather than troubleshooting technology, as they should be. As we continue our push towards becoming smart cities, it is critical that we keep people at the heart of it all. After all, what is the purpose of technology if not to make life better?


GUEST ARTICLE

ANJALI ARORA,

SVP AND CHIEF PRODUCT OFFICER, ROCKET SOFTWARE

“CIOs no longer have to spend most of their time keeping enterprise systems functional, which has

allowed them to build teams around strategic operations rather than constantly bailing out the canoe.”

CIOs supposed to support people who aren’t even using the company’s standard machines?

WHAT’S NEXT FOR THE CIO? While many of the problems that caused CIOs to lose sleep are no longer issues, it is essential for CIOs to turn their expertise both to answering business questions and maintaining an infrastructure that can withstand the technical challenges that every organization is now likely to face.

W

hen I first started in the technology industry, the role of the CIO was largely operational. Their job was to manage lots of different machines and trying to find ways to keep them running smoothly, meeting the needs of our user bases while at the same time keeping an eye on the latest industry developments. Making computers communicate with one another was not for the faint-hearted and involved large amounts of technical know-how and time, with regular performance issues leaving little time for reflection. Today’s CIO, according to a recent survey released by Harvey Nash and KPMG could not be more different. According to the research, nearly two-thirds of CIOs now report directly to the CEO and can boast of an evolving and expanding remit. Almost half say they have experienced significant budget increases, and spend an average of 15% of their time on functions outside traditional IT. Many are in the business of strategic change.

SO, IS THIS CHANGE REAL AND IF SO, HOW HAS IT COME ABOUT? The largest single transformation was the arrival of the internet. While the effects on consumers have been discussed endlessly, the significance for IT departments is often overlooked. The internet changed everything. Before its arrival, installations, upgrades and backups almost all required disks and delays. Back in 1990, the idea of doing a system-wide update was insane; today we don’t even think twice about it. The other major change, which took place in the early 1990s, was the advent of laptops. For the first time, users were accessing information from outside the confines of the firewall. That opened up a lot of security issues that many IT departments weren’t prepared to address. CIOs had to learn the best ways to support employees and contractors while also managing potential security breaches. Next came portable mobile devices, which added to the complexity because BYOD (bring your own device) was a real thing. How are

CLOUD THINKING Today, two major revolutions are changing how CIOs work, and they both relate to the cloud. Firstly, the cloud has changed just about everything in the world of archiving, storage and document retention. Organizations that maintained policies about saving emails and files now have to contend with employees and contractors who may be leaving sensitive information on Dropbox and in Gmail accounts. The other major change the cloud is introducing is the centralization of systems and processes. For example, things like software updates are no longer a manual task; just think back to the days when you had to employ an IT team to go around to each desktop computer and install a new version of a piece of software using a floppy disk. With the cloud, now you can simply wait for the system to update itself via an automated install. This is just one example of how CIOs don’t have to worry about day-to-day systems management any more, and instead can focus on strategic growth and planning for the future.

THE RISE OF THE GEEK While many of the problems that caused CIOs to lose sleep are no longer issues, CIOs should not be resting on their laurels. It’s true that teams spend far less time keeping systems up and running than they did in the past, as a direct result of so many of the tools we use being based in the cloud. They no longer have to spend most of their time keeping enterprise systems functional, which has allowed many CIOs to build teams around strategic operations rather than constantly bailing out the canoe. JULY 2018    ENTERPRISE IT WORLD

31


INTERVIEW  // DELLEMC

R I P U

B A J W A

DIRECTOR AND GENERAL MANAGER - DATA PROTECTION SOLUTIONS, INDIA, DELL EMC

“CIOs and CISOs needs to deploy adequate security solutions along with encryption of sensitive data in order to ensure data protection against any kind of traditional as well as emerging threats.”

32 ENTERPRISE IT WORLD    JULY 2018


DELLEMC //  INTERVIEW

CIOS AND CISOS MUST LOOK FOR MORE HOLISTIC, SECURITY-BYDESIGN SOLUTIONS

The dynamics of data are changing from devices to data centres to cloud and data protection needs of enterprises are constantly evolving. There are certain practices that CIOs and CISOs must adopt to protect their business from data losses. With digital transformations taking place across organization processes, how critical is it to rethink the enterprise data protection framework? Digital has become intrinsic to business growth and data has become the core of everything an enterprise does. In light of this, businesses are now realising the growing importance of security. It has become essential for businesses to re-look at their data protection applications and to build innovative new applications that generate rich insights into business, industry and customers that will enable you to make informed decisions and quickly take decisive action as well as to protect this data against any breach. The dynamics of data are changing from devices to data centres to cloud operating environment. As data becomes larger and complex in the virtual environment, how fast and efficient is your data protection infrastructure, is the question. Increasingly organisations are realising the need to have standard practices for not only protecting their assets, but also the importance of data recovery. Hence, very soon, businesses will ensure protection of data from edge to core to cloud. This will help organizations to have seamless control over their data and be prepared for any kind of data braches. Businesses can also leverage advanced data protection solutions and separate copies of their data from the network. How is data protection today different from traditional cybersecurity for businesses? The data protection needs of enterprises are con-

stantly evolving. It has now become very crucial for Indian organizations to focus on not only data protection but also data recovery. Recently, in the wake of the Supreme Court ruling privacy to be a fundamental right, there is a pressing demand for India to write laws on data protection and privacy. India witnessed disruptions from cyberattacks through a ransomware, WannaCry. These attacks and breaches threaten to trigger heavy damages, including loss of data and disruptions in business. They could also involve regulatory compensation. Therefore, policy, rules and practices must address cybersecurity and data breaches. Businesses are now realising the multiple ways in which Indian businesses can ensure safety of their data. There is a lot of sensitive information within an organization and the best way to safeguard it is by limiting its access to it. Businesses are now focussing on proper authentication measures to access the data. They are setting up a good security solutions that are essential to prevent cyber-attacks in the cloud environment. In fact, most operating systems and software today have in-built encryption options. This will ensure an extra layer of security that the Indian businesses would need to safeguard their information. Businesses now understand that the only way they can secure data is by implementing the right data protection recovery solutions, against traditional emerging threats. What strategies and practices can CIOs implement to ensure concrete data protection in their organizations? There are certain practices that CIOs and CISOs

must adopt to protect their business from data losses. To stay protected from threats like hacking and accidental data loss, it becomes essential to create protection copies. Sometimes, those protection copies are at risk too as hackers may take them down as well. CIOs and CISOs must look for more holistic, security-by-design solutions. They must also have a disaster recovery plan in place to ensure that the business can survive cyber-attacks and data loss. Deploying adequate security solutions along with encryption of sensitive data is among the other best practices that an Indian CIO/CISO needs to implement in order to ensure data protection. Will GDPR and similar regulations around the world significantly impact how businesses implement data protection? Yes. With the implementation of GDPR and other legislative regulations, businesses are now more aware and actively involved in implementation of data protection software. With new threats emerging each day, regulation and legislation are becoming harsher, to ensure organizations handle data responsibly. In fact, as more and for enterprises, but for individuals too.become Going more organizations across the region forward,driven, individuals will invariably have morebecome control aover digitally this will their priority personalfor data and thatacross in turnmarkets. will increase high businesses IT trust on the digital economy.is facing persistent infrastructure of businesses However,toone major step essential ensure challenges protect and secure theirto data center protection and liability citizen data,To other than against cyberattacks andfor ransomware. ensure regulations is awareness. As long asitindividuals data recoverability and availability, is essential are them awareto ofkeep how abreast their data canshifts be protected and for of the in legislative how it can misused they are safe. compliance requirements. With the implementation of GDPR, we are working closely with organizations and businesses, specially C-level executives to help them understand how breach of any legislative regulation will not just result in monetary repercussions but the potential loss in Data, which in turn becomes another just monetary repercussion. With data privacy and protection a big issue today for governments around the globe, what steps can be taken to ensure protection and liability for citizen data in a highly digital economy? Data is the new oil. With personal data being collected, analysed and moved across the globe, it has acquired enormous economic significance. Whilst it is important to seize the opportunities offered by the global digital economy, it is equally important to respond to consumers’ growing demands for stronger data security and privacy protection. Governments, across the globe, are now working towards stronger legislations that not only ensure appropriate data protection measures JULY 2018    ENTERPRISE IT WORLD 33


THE STUFF  //  PRODUCTS & SERVICES

CIO TOYS HP

SYNOLOGY

One of the most powerful mini workstations currently available, Z2 comes in a remarkably small package and boasts two times more graphics power than the previous generation HP Z2 Mini. Customers can experience industry-leading visual compute performance from the NVIDIA Quadro P600 or NVIDIA Quadro P1000 GPU and also an option for AMD Radeon Pro WX4150 graphics. The versatile, spacesaving design allows users the flexibility to mount under a desk, behind a display or in a rack -- up to 56 HP Z2 Mini workstations will fit in a standard 42U rack with the custom rackmount bracket accessory. With its flexible I/O, users can configure the system for connectivity of legacy serial ports, as well as support for up to six displays for peripheral and display connectivity needs. The innovative design and flexibility also let users create their ideal setup—from the trading desk to the shop floor to the data center. HP Z2 G4 Mini also boasts six core Intel Xeon Processors to allow deployment in mission critical environments with confidence.

An entry-level 2-bay NAS powered by a dual-core 1.3 Ghz CPU with 512 GB of DDR3 RAM, DS218j helps Backup all digital assets with rapid data transmission and low power consumption. Designed specifically for home users, it also provides Cloud Station Backup for PC protection. The product comes with features like real-time incremental backup technology, where data is stored on a PC and can be backed up to a Synology NAS instantly using minimal system resources while bringing in a truly comprehensive and secure private cloud experience. Cloud Station provides an optimized PC backup solution with incremental backup technology. Cloud Station backs up only the modified files and divides them into even smaller parts, demanding significantly fewer system resources than traditional backup methods. Cloud Station Suite also offers easy Synchronization of files across any devices, provides real-time data synchronization across all your devices and other Synology NAS. Synology DS218j also offers features like ‘Intelliversioning’ which keeps the most important file versions to better utilize storage space.

HP Z2 MINI G4 WORKSTATION POWER PACKED IN A SMALL PACKAGE

SYNOLOGY DISKSTATION DS218J OPTIMIZED BACKUP FOR ALL DIGITAL ASSETS

SENNHEISER

B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M

SENNHEISER TEAMCONNECT WIRELESS – ANYTIME ANYWHERE BOARDROOM TeamConnect Wireless is designed to allow for wireless remote conferencing anywhere, as it is configurable in literally seconds and provides communications for up to 24 people in essentially any environment operating in the license-free 1.9 GHz band with RF output power of maximum 100mW. TeamConnect Wireless requires no power source in operation; and is comprised of four satellite conference units, each powered by a Lithium Ion

34 ENTERPRISE IT WORLD    JULY 2018

rechargeable battery, packaged within a hardshell charging/transport case with an external power supply unit. The system allows three ways to connect: wirelessly via Bluetooth, wired via mini USB, or analog input via 2.5 mm audio jack. Charging time of the rechargeable battery is 10 hours. The system is perfectly engineered for all-day use and subsequent all-night charging. The system has an undoubt- within each satellite, one captures the ambient conference audio edly impressive audio quality. With while the other is used for diffuse noise reduction. TeamConnect a dual-microphone configuration Wireless offers truly flexible conferencing configurations.


Everything you need to know to stop ransomware.

67% of Indian organizations were hit by ransomware in the last year.*

91% were running up-to-

date endpoint security at the time of the attack.*

Protect against Ransomware with CryptoGuard The proven CryptoGuard capabilities in Sophos Intercept X block ransomware as soon as it starts trying to encrypt your files, returning data to its original state.

“Intercept X stopped all ransomware attacks we tested against it in seconds.” - ®ESG Labs “Since deploying Intercept X we’ve had zero ransomware infections.” - ®Flexible Business Systems For more details visit www.sophos.com/intercept-x Tel: +91 79 66216838 Email: indiamarketing@sophos.com *The State of Endpoint Security Today survey was conducted by Vanson Bourne, an independent specialist in market research. This survey interviewed 2,700 IT decision makers in 10 countries out of which, 300 respondents were from India, based in Delhi, Mumbai, Hyderabad, Bangalore, Kolkata and Chennai.


RNI NO: DEL ENG/ 2017/ 69906 Postal Reg. No.: DL-SW-01 / 4200 / 17-19

Date of Publication: 28 of Every Month Date of Posting: 1 & 2 of Every Month


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.