1. Trang chủ
  2. » Giáo Dục - Đào Tạo

SME channels TruePDF february 2019

44 49 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 44
Dung lượng 8,2 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Unistal: Our products are designed to prevent data leakage and provide protection against various Check Point: Check point’s infinity architecture provides gen v security securing asset

Trang 1

Unistal: Our products are

designed to prevent data

leakage and provide protection

against various

Check Point: Check point’s

infinity architecture provides gen v security securing assets of organizations

Trang 2

FORTINET SECURITY FABRIC

A Security Architecture that’s Broad, Integrated and Automated

ONE SUPPLIER, TWO SUPPLIERS, THREE SUPPLIERS FOUR…

can sometimes feel like a never ending children’s game One for small business,

another for mid-sized and yet a third for my large enterprise customers.

Fortinet is the only company that offers the full range of solutions that are needed

in today’s environment, solutions that seamlessly scale from small business to large

enterprise The Fortinet Security Fabric architecture ensures that organizations of all

sizes can equally be protected without compromise.

Fortinet is there for you with no need for any games.

For details contact:

North: Sanjeev Tyagi, E-mail: styagi@fortinet.com, M: +91 98105 00157

South: Binu Ninan, E-mail: bninan@fortinet.com, M: +91 98400 36767

West, East, Central: Navin Mehra, E-mail: nmehra@fortinet.com, M: +91 98925 60700

FINDING THE RIGHT SECURITY PARTNER

Trang 3

India Most Digitally Mature Country in the World: Dell /06PLUS

india’s leading IT magazine for channel businesswww.smechannels.com

We just started our 2019 journey of events from Bangladesh The event is Enterprise It World and

Infosec Foundation Global Security Symposium & Cyber Sentinel Awards 2019 A great experience to

do it because after doing some events in overseas market – specially in Dubai, we were under

impres-sion that it is the only exciting market in the APAC region but amazing Bangladesh growing at nearly

8% more than any other country – courtesy garment exports of the country, manufacturing of generic

medicines and growth of banking sector among others But along with growth the country is seeing

huge cyber attacks from the hackers Therefore, opportunity of doing business in Bangladesh is also

great

Bangladesh is the second largest exporter of garments to the global market after China, it has huge

manufacturing units of generic medicines, it is also becoming stronger in contact center and call

center services Bangladesh has also embarked upon strong digital journey It means ICT market in

Bangladesh is on rise I was speaking to Mr M A Mannan, Honorable Minister, Ministry of

Plan-ning, Republic of Bangladesh about the country’s stride on it path He expressed his happiness that a

journalist is taking interest in Bangladesh economy He quipped, “You invest in our country, we will

give you all support whatsoever to make your business successful… take all profit and give a very little

profit to us But I assure you that if you invest $1 dollar, we will offer you opportunity of $2 dollar We

have a huge skilled population to help you Do not be worried.”

My sense is our neighbour wants to compete with India which is really healthy can be another land

where our partners and principals can explore It is only 45 minutes flight from Kolkata and food habit

is like India You won’t feel like out of the country except the airport is little crowded

Bitdefender Endpoint Security Solution

MY EXPERIENCE

SPECIFICATION: IT PROTECTS DESKTOPS,

LAPTOPS, SERVERS (PHYSICAL AND VIRTUAL) AND MAILBOXES SERVERS SHOULD ACCOUNT FOR LESS THAN 35%

OF ALL UNITS

BITDEFENDER ‘GRAVITYZONE ULTRA SUITE’ is a complete End-point Security solution that uncovers and stops elusive threats with Detection and Response (EDR) that works GravityZone Ultra integrates layered next-gen endpoint protection and easy-to-use EDR platform to accurately protect enterprises against even the most elusive cyber threats It offers preven-tion, automated detection, investigation and response tools so enterprise customers can protect their digital assets and respond to these threats GravityZone Ultra excels where most products are too complex and resources intensive GravityZone Ultra sharply limits the number of incidents requiring manual analysis, reducing the operational effort required to run an EDR solution

OVERALL RATING

FINAL WORDING:

Overall, the Software uses adaptive-layered architecture that includes endpoint controls, prevention, detection, remediation and visibility

SECURITY/39

4 WAYS TO PROTECT YOURSELF FROM CYBER CRIMINALS WHEN SHOPPING ONLINE

SME CHANNELS 3

Trang 4

Editor: Sanjay Mohapatra Associate Editor: Deepak Singh Sub Editor: Aritra Ghosh Designer: Ajay Arya Assistant Designer: Rahul Arya,

Deepak Kumar

Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan

Satya Sagar Sinha

Lead Visualizer: DPR Choudhary

Bangalore

#28/1, 3rd Floor, Sri Lakshmi Krupa, Near Shamanna Park, Model House Street, Basavanagudi, Bangalore - 560004

Ph No +91 88618 21044

Mumbai Tahmeed Ansari

2, Ground Floor, Park Paradise, Kay-Bees CHS Ltd.,Opp Green Park, Oshiwara, Andheri (west), Mumbai - 400 053.

Ph +91 22 26338546, Fax +91 22 26395581 Mobile: +91 9967 232424

Bangalore Bindiya Jadhav

#28/1, 3rd Floor, Sri Lakshmi Krupa, Near Shamanna Park, Model House Street, Basavanagudi, Bangalore - 560004

Ph No +91 88618 21044 E-Mail bindiya@ accentinfomedia.com Skype ID: b1diyajadhav

Printed, Published and Owned by Sanjib Mohapatra

Place of Publication: 6/101-102, Kaushalya Park, Hauz Khas

New Delhi-110016 Phone : 91-11-46151993 / 41055458

Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India

All rights reserved No part of this tion can be reproduced without the prior written permission from the publisher

Editorial ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 03 Snippets ~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06 Products ~~~~~~~~~~~~~~~~~~~~~~~~~~~~41

CASE STUDY

MATRIX/ 31

”A MANUFACTURING GIANT IN

MAHARASHTRA TRUSTS MATRIX VIDEO SURVEILLANCE FOR 24X7 SECURITY”

DESIGNED BY

THE CHANGING IT SECURITY

Data security continues to become complex with the each passing day, but many

compa-nies have the propensity of softpedal the risks

COVER

STOR Y

Trang 6

Fortinet Rolls out Next-Generation Firewalls to Deliver Intent-based

Segmentation

India Most Digitally Mature

Country in the World: Dell

According to the latest Dell

Tech-nologies Digital Transformation

Index, India is the most digitally

mature country in the world

However, businesses in India still

have a lot of work to do Leaders in India are more aware of the need

to prioritize digital transformation throughout their organization: 91%

of the business leaders believe that

digital transformation should be more widespread, compared to78%

globally Almost half (48%) (51%

globally), believe they’ll struggle to meet changing customer demands

within five years

Dell Technologies, in tion with Intel and Vanson Bourne, surveyed 4,600 business leaders (director to C-suite) from mid- to large-sized companies across the globe to score their organizations’ transformation efforts

collabora-The study revealed that emerging markets are the most digitally mature, with India, Brazil and Thai-land topping the global ranking

In contrast, developed markets are slipping behind: Japan, Denmark and France received the lowest digital maturity scores

“In the near future, every organization will need to be a digital organization, but our research indicates that the majority still have

a long way to go Organizations need to modernize their technology

to participate in the unprecedented opportunity of digital transforma-tion The time to act is now” says Michael Dell, chairman and CEO of Dell Technologies

Fortinet has announced its new

high-performance FortiGate

Next-Generation Firewalls

(NGFWs), comprised of

Forti-Gate 3600E, FortiForti-Gate 3400E,

FortiGate 600E and FortiGate

400E Series, enabling

organiza-tions to implement Intent-based

Segmentation into their security

architecture

Intent-based Segmentation allows organizations to achieve granular access control, continu-ous trust assessment, end-to-end visibility and automated threat protection In addition to deliver-ing Intent-based Segmentation, FortiGate 3600E offers 30Gbps threat protection and 34Gbps SSL inspection performance

FortiGate 3400E offers 23Gbps threat protection and 30Gbps SSL inspection performance

FortiGate has a longstanding trajectory of earning NSS Labs Recommended ratings in the Next-Generation Firewalls group tests given its high SSL inspec-tion performance with minimal performance degradation as one

of the reasons

“The new FortiGate 3400E and 3600E Series provide industry-leading threat protection and SSL inspection performance allowing customers to implement

a holistic end-to-end architecture” says Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet

smechannels.com

PRODUCT | CHANNEL | CONSULTING | SERVICES

Trang 8

Array Contributes to Smart Cities Mission

Array generates $5 million revenue from smart cities projects, targets $9Mn by 2019 Array Net-works is supporting ‘100 Smart Cities Mission’ initiated by the Union Government of India The company has been involved in various stages

of implementation for multiple cities namely Nagpur, Ahmedabad, Davengere to name few Smart cities projects have contributed to Array growth rate in 2018 of 40% By the end of 2019, Array aims to be part of 20 more smart cities and targets on keeping the growth momentum.Smart infrastructures and smart Data Centers (DCs) are at the core of smart cities and they manage, coordinate, and rationalize the resources demanded Array has assisted

in devising futuristic data centers for smart cities by introducing unique concepts such as Hyperconvergence in networking into the DCs Their advanced security solutions are designed with network security protocols like ECC It enhances application security, and provides complete visibility into various threats and performance inhibitors, allowing organizations

to make informed and proactive security sions Array’s hyper converged solution stack include ADC, Web application firewall , DDoS , Web vulnerability scanner , SSLi & Array MARS Visibility & analytics tool

deci-NetApp Powers Ducati’s

Team for the 2019

Sestek Becomes Avaya DevConnect

Technology Partner

“NEVER HAVE WE SEEN CUSTOMER EXPECTATIONS OR TECHNOLOGY CHANGING AS RAPIDLY AS IT IS TODAY, WE ARE THRILLED TO BE ADDING THESE PROVEN ENTERPRISE LEADERS

TO ZENDESK SO WE CAN HELP MORE COMPANIES AROUND THE WORLD TRANSFORM THEIR CUSTOMER EXPERIENCES.”

MIKKEL SVANE, ZENDESK FOUNDER AND

CEO.

Check Point has published the second instalment of its 2019 Security Report It highlights how the tools and services used to commit cyber-crime have become democratized, with advanced attack methods now available to anyone willing to pay for them, as part of the growing ‘malware-as-a-service’ industry

The Security Report reveals the key cyber-attack trends observed by Check Point researchers during 2018, and shows the significant growth in stealthy, complex attacks designed to stay below the radar of enterprise security teams It also shows the types of cyberattacks which enterprise IT and security teams’ rate as the biggest threats

to their organizations

Cryptominers infected 10x more organizations than ransomware in 2018, but only one in five IT security profes-sionals were aware their company’s networks had been infected by mining malware

Sestek, a provider of speech-enabled

smart technologies, has become

an Avaya DevConnect

Technol-ogy Partner Through direct R&D

engagement, deep product

integra-tion, and strong support relationships,

the Avaya DevConnect ecosystem

delivers a wider range of technology

options for Avaya users to drive their

business forward and provide value

to their customers, from ready-made

solutions validated for

interoperabil-ity to custom-tailored applications

By joining the Avaya DevConnect

Program, the two companies will

explore uses of Sestek’s advanced

technologies with Avaya’s leading

communications platforms Sestek

will develop enhanced applications for Avaya platforms to provide customers with end-to-end solutions that address the evolving busi-ness challenges posed by digital transformation

Avaya’s DevConnect Program is intended to drive expansion of the open and agile Avaya application ecosystem so that more fully formed solutions can be delivered through its platforms The program is designed

to deliver more customer-centric outcomes for technology buyers, who can be confident that they are gaining access to the most advanced and innovative technologies they need to deliver solutions across the business

NetApp confirms second year as official sponsor

for the 2019 MotoGP World Championship

NetApp will renew its official sponsorship of

the Ducati Team in the 2019 MotoGP World

Championship, enabling the digital

transforma-tion of motorcycle racing

The new Ducati MotoGP team was presented

officially on Friday, January 18, in Neuchâtel

(Switzerland) Data-driven technological

developments on the racing bikes will boost the

performance of factory riders Andrea Dovizioso

and Danilo Petrucci, supported by test rider

Michele Pirro

As a data-driven company, Ducati began its

partnership with NetApp last year to take

advan-tage of the full potential of data in racing within

the Ducati Corse division It recently expanded

the partnership to analyze vast amounts of

data throughout its business, including in

logistics, marketing and customer relationship

management

Through the partnership, NetApp’s engineers

are working closely with Ducati’s IT team to

opti-mize their data fabric and meet the motorcycle

manufacturer’s unique, rapidly expanding data

storage and data management needs

Cryptominers Hit 10x More

Organizations than

Ransom-ware in 2018: Check Point

Trang 10

EXECUTIVE MOVEMENT

DigitalOcean has appointed Barry Cooks as chief technology officer

mjunction has appointed Vinaya Varma as Managing Director and CEO of mjunction services limited,

Sophos has appointed Gavin Struthers as its regional vice president for Asia Pacific and Japan

Agrahyah Technologies has roped in Naveen Kallur

as Business Head

GLOBAL IT SPENDING TO REACH

$3.8 TRILLION IN 2019

All Segments Forecast to Exhibit Growth in 2019 Despite Recession, Brexit Threat

Bosch Opens Center

for Data Science and

Artificial Intelligence

The Robert Bosch Center for Data Science and

Artificial Intelligence was inaugurated at the Indian

Institute of Technology Madras

Bosch will invest 20 crores over five years in the

center The mission of the new center is to create

soci-etal impact through multidisciplinary interactions

with government, academic, research and industrial

collaborators on core challenges in Data Science (DS)

and Artificial Intelligence (AI)

The RBC-DSAI will undertake foundational

research in many areas of AI and Data Science,

including deep learning, reinforcement learning,

network analytics, interpretable machine learning,

and domain aware AI The areas of activity include

research projects, knowledge management and

dissemination, outreach projects, and setting up

collaborative facilities and laboratories

Aspire Systems acquires UAE-based

iApps and the Oracle Business Unit of

Valforma

Aspire Systems, announced the 100% acquisition of iApps, an Oracle Fusion Cloud specialist, based in UAE In addition, Aspire is also acquiring the Oracle Business Unit from Valforma Technology Services Private Limited

iApps is an Oracle Platinum Cloud Standard Partner with deep expertise in Oracle Fusion ERP, HCM CX, Oracle PaaS and Omni-channel Contact Center The acquisi-tion of iApps and Valforma will help Aspire service mid-size and large enterprises

in their move to the cloud from on-premise applications These acquisitions also enable Aspire’s focussed effort to address the postmodern ERP strategy that involves surrounding core ERP solutions with best-in-class cloud solutions to enable faster processing, better collaboration and easier-to-use analytics

Aspire’s global customers will now be able to leverage the Oracle Fusion Cloud expertise of iApps and Valforma combined with the highly specialized Cloud & Digital Services capability that Aspire offers In addition, the capabilities of iApps and Valforma will also help Aspire develop cloud-based IPs including iEstate, iAu-todealer, iPublish, iQuote, and iEnergy which are industry-specific Oracle Fusion Cloud implementation accelerators

Table 1 Worldwide IT Spending Forecast (Billions

of U.S Dollars)

SOURCE: GARTNER (JANUARY 2019)

2018 SPENDING

2018 GROW (%) 2019 SPENDING 2019 GROWTH

(%)

2020 SPENDING

2020 GROWTH (%)

DATA CENTER SYSTEMS 202 11.3 210 4.2 202 -3.9

Trang 11

WE’RE NOT JUST FIREWALLS.

SonicWall automated, real-time breach detection and prevention

layers proven cybersecurity across your entire organization.

You know SonicWall because of our rich history designing high-performance firewalls But like

your organization, SonicWall has evolved

Today, the modern SonicWall Capture Cloud Platform delivers automated, real-time breach

detection and prevention to safeguard your business or organization

With this layered approach, you can stop the most malicious cyberattacks, including ransomware

and encrypted threats, from compromising your network and damaging your brand

Physical & Virtual

Firewalls

Cloud Application

Security

Multi-Engine Cloud Sandbox

SD-WAN

Public & Private Cloud Security

Web Application Firewall

Endpoint Protection

Secure Remote

& Wireless Access

Secure Email

Unified Management

& Reporting

© 2019 SonicWall Inc ALL RIGHTS RESERVED SonicWall is a trademark or registered trademark of SonicWall Inc and/or its affiliates in the U.S.A and/or other

countries All other trademarks and registered trademarks are property of their respective owners.

For more information about SonicWall solutions, contact

india@sonicwall.com or visit www.sonicwall.com

Trang 12

Palo Alto Networks to Boost Channel

Growth

Palo Alto Networks announced several enhancements to its NextWave Partner Program, which

will boost program flexibility, fuel long-term growth and enable the expansion of partner-led

services Palo Alto Networks introduced new options for partners to grow their businesses with

streamlined program levels, tiered discount structures, and new partner incentives aimed at

boosting margins and profitability

Palo Alto Networks rolled out a new dedicated Managed Services Program, providing

partners a clear path for capitalizing on the rapidly growing managed services opportunity

Palo Alto Networks has automated systems and processes to make doing business easier

These advancements simplify the quoting and approval process to accelerate the sales cycle and

improve the overall partner experience

Unistal Launches High

Level Security Solution

in complying with GDPR norms by keeping track

of the employees’ activities and monitoring all the connected devices in the network

“Nowadays, data has become one of the most important aspects for any company and it is a chal-lenge for them to keep it safe and secure With our product, enterprises can actively monitor all the con-nected devices in a network Activity Reporter also gives the administrator the choice to see the screen

of the user’s system with just a single click Its unique features will act as a foil for anyone who wishes to do any fraudulent activity in the organization” said Alok Gupta, Co-founder and Managing Director at Unistal Systems Pvt Ltd

Activity Reporter is an effective employee performance monitoring software, which captures the data on employees’ active and idle time during the office hours This software will make it easier for the HR department to ensure that the corporate costs spent on employees are not wasted The software will also help management to better understand each employee’s strengths & weaknesses and eradicate the unproductive behavior

HARMAN Professional Solutions Extends

their Indian Enterprise Portfolio

Distribu-tion Rights

HARMAN Professional Solutions announced their distribution partnership with Brightstar

India to include HARMAN installed solutions for their enterprise portfolio in India

Brightstar India has an existing relationship with Harman Lifestyle division and this

partner-ship will enable Brightstar to deal in the complete range of professional Installed audio and

video products for the enterprise business

“HARMAN is a global leader in end-to-end AV solutions and we are excited about this

partnership, inclusion of complete range of JBL, AMX, SVSi, BSS, Dbx, AKG, Crown, and

Soundcraft will now help our partners to supply a complete audio-video automation solution

from Harman which end-customers have been asking for a long time We will also be the

one-stop-shop for all HARMAN preferred partners in enterprise business” said Sanjeev Chhabra,

Managing Director, Brightstar India

Largest Public Hospital

Delivery

SVPIMSR has selected HPE SimpliVity 380 for its

central-ized datacenter infrastructure to host their mission critical

applications

The recently inaugurated Sardar Vallabhbhai Patel Institute

of Medical Sciences and Research Hospital (SVPIMSR),

Ahmedabad, Gujarat has selected HPE SimpliVity 380 for

its centralized datacenter infrastructure to host their mission

critical applications including the integrated Hospital

Information System (iHIS), Virtual Desktop Infrastructure

(VDI) and more

Managed by the Ahmedabad Municipal Corporation

(AMC), SVPIMSR features 32 Operating Theatres, 139

Inten-sive Care Units, and over 1600 beds spread across 18 floors

In addition to offering high quality healthcare services to the

people of the region, the state-of-the-art facility is designed to

meet the future demands of patients with a continued focus

on their care, safety and satisfaction

RP tech India Enters into Cloud Business with Acquisition of ZNet Technologies

RP tech India (a division of Rashi Peripherals Pvt Ltd) has acquired Cloud Services Provider ZNet Technologies With this partnership, RP tech India will now offer ZNet’s cutting-edge Cloud services and solutions to potential SMB and Enterprise customers in India

According to the terms of the acquisition, RP tech India will take a majority stake in ZNet and will invest in enhancing R&D capabilities and upskilling technical manpower to support latest technologies like Cloud, IoT, AI etc ZNet will continue to operate as an independent legal entity and various existing brands of ZNet will continue to operate as normal.Founded in 2009, ZNet Technologies is the leading provider of IT and Cloud solutions The company offers a wide range of services from domains to high-end Cloud infrastructure managed services under the ZNetLive brand It offers infrastructure services from leading cloud ven-dors like Microsoft, AWS, Alibaba, Google and its own Data Centre based offering to its customer base ZNetLive powers well over 90K+ websites and applications globally and is one of the very first Microsoft CSP in India

Trang 14

Two-Thirds of Retail Store Associates

Can Provide Better Customer Service

with Tablets: Zebra

Zebra Technologies Corporation has revealed the results of its 11th annual Global

Shopper Study, analyzing the attitudes, opinions, and expectations of shoppers, retail

associates and retail decision makers The results show that two-thirds (66 percent) of

surveyed associates believe that if they are equipped with tablets, they could provide

better customer service and improve the shopping experience

Fifty-five percent of surveyed retail store associates agree that their company is

understaffed, and nearly one-half (49 percent) feel overworked Store associates cite

frustration with their inability to assist customers as 42 percent find they have little

time to help shoppers because of pressure to get other tasks completed Another 28

percent claim that it’s difficult to get information to help shoppers Most surveyed retail

decision makers (83 percent) and store associates (74 percent) concur that shoppers

can have a better experience with technology-equipped sales associates

HID Global Retransfer

Printer for ID Card ization is First of its Kind

Personal-HID Global announced that it’s Personal-HID FARGO HDP6600 High Definition Printer and Encoder is the first and only retransfer printing solution for ID card personalization that has Green-Circle certification

The HDP6600 printer achieves its breakthrough energy efficiency using a design that also delivers the fastest overall throughput speeds and shortest time until the first card is printed Sustainability is further improved through an optional wasteless lamination module that dramatically reduces the waste byproducts that other printers generate The module cuts consumables costs nearly in half for printed and laminated cards

Vertiv has launched ‘Vertiv Xpress – Partner Drive’ to showcase its complete stack of critical infrastructure solutions to its partner network and customers in India Kicked off in Delhi on 21st January 2019, the multi-city initiative will engage partners through unique programmes, and work on collectively growing the partner’s business in a fast and evolving digital landscape

Vertiv aims to further enhance its engagement in the Indian market and build a strong channel network across the country The Vertiv Xpress, a 52-foot trailer will showcase a range of infrastructure solutions and give a view of the company’s vision to stakeholders

Announcing the launch of Vertiv Xpress – Partner Drive, Sunil Khanna, president and managing director, Vertiv India, said, “India is a key region for Vertiv and through this traveling Xpress we’re able to work closely with our partners and customers to help them get ahead in the market Evolving with trends around data centres, we plan to invest more in terms of product innovation as well as research and development in the near future With the Vertiv Xpress initiative we will showcase our energy efficient solutions that will change the way businesses address their efficiency needs.”

Acronis Appoints Sea Infonet as Distributor for India

Acronis has appointed SEA Infonet as a key distributor in India SEA Infonet will be responsible for promoting and distributing the complete range of Acronis’ on-premises, cloud-based, and consumer cyber protec-tion solutions, including Acronis Backup for businesses and enterprises, Acronis Data Cloud for service providers, and Acronis True Image for home users

“We welcome SEA Infonet joining our team and we are excited they will

be supporting our presence in India Both our companies are committed

to helping businesses and consumers take advantage of secure and efficient cyber protection solutions – and with this alliance, they now can,” said Maxim Mitrokhin, Acronis General Manager of Channel Sales in APAC “We are very excited to partner with Acronis We are emerging as a leading VAD in India with a channel partner base of 650+ across the country – and have a great platform to build the channel ecosystem for Acronis Advancing our partnerships with managed service providers and cloud providers in India would be one of the key focus business lines,” said Biswajeet Saha, CEO of SEA Infonet

Xerox Enables Customers to Go

Beyond CMYK with Brilliant New

Colors at PrintPack 2019

Print providers, designers and marketers in India got a closer look at

the business building opportunities presented by the Xerox Iridesse

Production Press at PrintPack 2019 which took place from Feb 1 to

6, 2019 Iridesse is the only digital press that can print metallic gold or

silver dry ink, CMYK and clear or white dry ink in a single pass, giving

print providers an immediate competitive edge in the growing digital

print enhancement market

“The launch of our flagship device, the Iridesse Production Press,

and the overwhelming response received from customers is surely

one of the key highlights from 2018,” said Vineet Gehani, director,

Technology and Channels, Xerox India “We’re focused on developing

the technology and solutions our customers need to boost business

opportunities and drive revenue to new heights – and Iridesse is the

perfect example as it helps our customers lead the way in beyond

CMYK printing.”

Trang 16

eScan Rolls Out New Deals to Bring Channel

Partners More Closer to the Brand

eScan has introduced a special incentive program for the channel partners that include various gifts

like gold coins, silver coins and gift vouchers to be claimed by the partners This program is designed to

reward the channel partners for their contribution towards the growth of eScan products The offer is

valid for all the sales made from 1st January to 31st March 2019

The specially designed program is valid on purchase of eScan’s products for Small Office & Home

segments This segment includes products like eScan Anti-Virus with Cloud Security, eScan Internet

Security Suite, eScan Total Security Suite etc However the offer is not applicable on eScan Anti-Virus

with Total Protection eScan values its relationship with the channel partners and with this scheme

rewards their commitment for their contribution to make the company reach the end users

This special offer has been created to encourage partners to participate in the program and get various

gifts with a minimum purchase of Rs.5,000 onwards up to Rs.50,000 The partners have to register

themselves on the Touch Point Network (TPN) Reward program, created by eScan for more benefits to

the partners

DIGEST

UNISTAL CELEBRATES 25 GLORIOUS YEARS OF SERVING EXCELLENCE

Unistal Systems Pvt Ltd., the developer and provider of Antivirus, data care, data recovery, data security software and Oil & Gas solutions, recently celebrated 25 glorious years of serving excellence The pompous celebrations started

at 7 p.m at the Crowne Plaza Hotel, New Delhi The company shared its success stories and recognised the contribution of mentors, employees, partners, vendors, friends and family for their continuous support The event was graced by the presence of well-known dignitaries from top corporates, partners, OEM heads and media houses.

LARSEN & TOUBRO INFOTECH ACQUIRES RULETRONICS

Ruletronics enables businesses to transform and evolve digitally by providing innovative BPM and CRM solutions leveraging Pega Platform Their current industry strength lies across Insurance, Banking, Healthcare and Retail segments The company offers unique product based offerings for Disability Claims management, KYC Bulk Remediation, and Insurance Sales & Service applications The acquisition will strengthen LTI’s rapidly growing digital business with a suite

of capabilities in Pega implementation space around establishing BPM Roadmap & Strategy, Customer Services, RPA and Decisioning.

ATEN TURNS 40, CELEBRATES ITS PASSION FOR EXCELLENCE

ATEN reached another milestone this year, celebrating 40 years of successful global busi- ness Initially established as HOZN Automation

Co Ltd in 1979 and later renamed in 1988 as ATEN International Co Ltd, ATEN is one of the largest KVM switch manufacturers in the world All ATEN products are ISO 9001 and ISO

14001 certified Imbued with the core values

of Integrity, Caring, Ambition, and Novelty (ICAN), ATEN has been creating new innovative products and solutions to address the changing demands of customers across decades.

BITDEFENDER RELEASES POINT SECURITY SOLUTION

END-Bitdefender has rolled out its newest software

‘GravityZone Ultra Suite’ a complete Endpoint Security solution that uncovers and stops elusive threats with Endpoint Detection and response (EDR) that works GravityZone Ultra integrates layered next-gen endpoint protection and easy-to-use EDR platform to accurately protect enterprises against even the most elusive cyber threats It offers prevention, au- tomated detection, investigation and response tools so enterprise customers can protect their digital assets and respond to these threats GravityZone Ultra excels where most products are too complex and resources intensive GravityZone Ultra sharply limits the number of incidents requiring manual analysis, reducing the operational effort required to run a EDR solution Cloud-delivered and built from the ground up as an unified, single agent/single console solution, it’s also easy to deploy and integrate in the existing security architecture.

Kodak Alaris and Newgen Software Announce

Global Strategic

Cisco’s 65% of Indian organizations better prepared for GDPR, making India the sixth leading nation

in readiness index its 2019 Data Privacy Benchmark Study which placed India amongst the leading

nations globally in their preparedness towards the General Data Protection Regulation (GDPR)

According to the report, organizations worldwide that invested in maturing their data privacy

practices are now realizing tangible business benefits from these investments The study validates the

link between good privacy practice and business benefits as respondents report shorter sales delays as

well as fewer and less costly data breaches

The European Union’s General Data Protection Regulation, which focused on increasing protection

for EU residents’ privacy and personal data, became enforceable in May 2018

TechnoBind conducted 2 city partner’s meet in Mumbai & New Delhi Attended by over 70+ channel

partners, the event was targeted to educate and help partners capitalize on future opportunities in

enterprise security space

Being a distributor for Gemalto’s range of solutions since 3 years, TechnoBind has delivered

exponen-tial growth in the Indian market

With Gemalto SafeNet Identity and Data Protection solutions for enterprise security, organizations

can take a data-centric approach to their security posture, all while controlling access to the

infrastruc-ture and applications they rely upon Not only can they create trust and authenticate their transactions,

but they can ensure that sensitive data is protected and controlled – both on-premises and in public

and private clouds In addition to a heightened level of protection, enterprises are also able to improve

business efficiencies and scale to the identity and data protection needs of tomorrow

Kodak Alaris and Newgen SoftwareTechnologies announced a new global strategic alliance that will

provide their customers and channel partners with access to best-in-class solutions to help

organiza-tions drive digital business Under the agreement, Newgen and Kodak Alaris will expand, connect and

grow their network by jointly recruiting partners with similar profiles to help sell their solutions Kodak

Alaris scanners are now included on the Newgen certified document scanner list

The alliance is expected to generate new business opportunities for channel partners that work

with Alaris and Newgen across geographies, vertical markets, and applications It positions Alaris and

Newgen as partners of choice for customers around the world looking to leverage the power of their

information, reduce cost, save time and optimize business processes

Kodak Alaris enables organizations to automate business processes and take complexity out of

information capture

India Sixth in GDPR Readiness index: Cisco

TechnoBind Empowers Partners

Trang 17

Eurotech Launches BestNet 2-Post

Frame Open Network Racks

Eurotech Technologies has launched BestNet 2-post frame open network racks The

racks are suited for cabling and patching frames, intermediate distribution points

and safely houses all networking equipment’s, ensuring complete convenience &

flexibility Available in 19” and 23” models the racks come with heights ranging from

27U to 42U

The 2-post frame open racks are made of strong and lightweight aluminium

(6063-T6 alloy) extrusion or 2.0 mm steel These racks have universal 5/8”-5/8”-1/2”

vertical mounting hole patterns, which allow mounting of 19”equipment’s Multiple

racks can be bayed with the help of BestNet baying kit The top and side frames are

provided with cable entry cut-outs which allow effective routing of cables Both the

steel and aluminium models can be used to either fit 19” or 23” equipment’s

The units which can either be fitted on the floor or allowed to move are well

suited for networking and data transmission applications Used in open accessibility

lab applications, these products can be modified and customized with the help of

BestNet accessories to specific user requirements

GajShield Only Indian Vendor in the

Gartner’s 2018 Asia/Pacific Context

GajShield Infotech is the only Indian vendor to be named in the Gartner’s 2018 Asia/

Pacific Context: ‘Magic Quadrant for Enterprise Network Firewalls’

GajShield is one of the few companies worldwide and the 1st Indian Firewall

Product Company to have earned ICSA Labs Firewall Certification criteria 4.1

They are a leader in innovating security technologies like Context based Data Leak

Prevention, Cloud Security, Zero-day Anti-Ransomware, OOPs based Management

and more

GajShield’s approach of looking beyond traditional security solutions and focusing

on Data First security strategy is a leap forward in the security solution industry that

is helping enterprises to secure cloud and SaaS applications by implementing a Next

Generation Fire Wall solution

Portronics Launches

“My Buddy Hexa”

Portable Laptop Stand

Portronics, a leading provider of innovative and portable gadgets has added “My Buddy Hexa”

to its existing range of laptop stands The brand has provided most ergonomically styled, strong and lightweight laptop stands and has set an industry standard over the last 5 years Taking

up to its stride, the company has launched - My Buddy Hexa that boasts of unmatched features like 7 adjustable levels which can be set up as per the user’s convenience

Being fan-less, it’s completely noiseless as it uses natural ventilation of your laptop One of the best ventilation is the natural air ventilation that works with the laptop’s in-built fan to cool the laptop Not only has it improved the lives

of your laptop battery but also of the internal components like CPU and motherboard Longer battery life is also caused by less battery charging cycles required

By improving your working posture on the desk and reducing strain on your neck by having right screen viewing angle, you can work longer and without any neck or back pain Also, your fingers and wrists too get optimum 7 adjustable angles when typing on the keyboard which also reduces the fatigue

My Buddy Hexa is available at an affordable price-point of INR 699/- from online and offline stores

Check Point introduced Check Point Maestro, the

industry’s first truly hyperscale network security

solu-tion Check Point Maestro enables businesses of any

size to enjoy the power of flexible cloud-level security

platforms, and to seamlessly expand their existing

security gateways to hyperscale capacity

“Check Point Maestro extends the Gen V security

capabilities of our Infinity architecture into hyperscale

environments It ensures organizations can secure

their dynamic, evolving environments without limits,

now and in the future, The principle behind Maestro

is very simple: it enables organizations to start with

their existing security implementations, no matter

how small, and scale their protection almost infinitely

according to their changing business needs” said Itai

Greenberg, VP of Product Management, Check Point

Consul Neowatt Appoints Savex

Tech-nologies as National Distributor

Consul Neowatt, the Global Indian UPS company has appointed Mumbai based Savex Technologies as National Distributor for its full range of power back up and power conditioning products This alliance will help Consul Neowatt leverage the strength of Savex Technologies to expand its IT channel reach and for Savex to offer attractive power solutions to complement their Enterprise IT distribution business offerings

Savex is a 32-year-old organisation and is the largest Indian distribution house in India today catering to more than 7000 plus Channel partners/SI’s across India They are head quartered out of Mumbai with 39 branch offices, 43 warehouses and 105 sales locations across India

Through this alliance Consul Neowatt would leverage Savex Technologies 7000+ partners across the country The primary intent is to cover a larger region in India with multiple channels while providing access to a larger audience and secondly engage with new partners in larger cities as well as strengthening reach in high growth Tier – 2 and 3 regions

Check Point Launches

Maestro

SME CHANNELS 17SNIPPETS

Trang 18

the highest quality gaming experience to users.

Within the next six months, ACT Fibernet plans to launch its broadband services

in multiple cities across North & West India, thereby expanding its footprint in the country The company will also be launching a 24*7 call center and a unified call center number to address customers’

queries in real time “We have always believed in providing our customers the best solutions through our products and services Today, consumer needs and usage behavior is continuously evolving Newer technologies are constantly being adopted and becoming mass-scale by the day, be

it streaming or gaming or smart homes

It is therefore our responsibility to work

in conjunction with the rapidly evolving

customer’s expectations and find feasible ways to serve them We strongly believe that our new brand identity reflects this value and commitment we have towards our customers” said Bala Malladi, CEO, Atria Convergence Technologies Ltd

“Moving forward, we will be launching new products and services that our consumer’s desire We are confident that with our pioneering fibernet connec-tion, hyper fast speeds, new offerings and industry’s best customer service in place, we will successfully transform our customer’s experience enabling them to do and accomplish more With ACT you can feel the Advantage” he added

Compuage &

Microsoft Organize

Multi-City events

Compuage Infocom and Microsoft

organized joint partner programs for

the launch of Microsoft Cloud Solution

Provider Events were conducted in

Mumbai, Pune, Delhi and Lucknow in

the month of December

These events imparted knowledge

on Microsoft Cloud Solution Provider’s

usage and offerings Speakers from

Compuage & Microsoft demonstrated

how partners can benefit with the cutting

edge technology of cloud empowering the

channel partners

Senior members from Microsoft as well

as Compuage together made the events

engaging and solved one on one queries

of the partners Over 200 unique partners

attended the meets making it successful

Compuage& Microsofttogether plan to

organize similar meets in Hyderabad,

Ahmedabad, Indore and Raipur

Atul H Mehta –Chairman& MD,

Compuage said “These meets are a superb

platform for effective interaction and

optimism for the road ahead Moving

forward, our strong relationships with

our channel partners will pave the way

for continued success in this important

business segment alongside empowering

them with cloud business opportunities.”

DigitalOcean Launches Managed Databases

DigitalOcean announced the launch of Managed Databases, with PostgreSQL as its first offering The service will allow developers to create fully managed database instances in the cloud quickly and efficiently.DigitalOcean takes care of the setup, maintenance, configuration and security of databases, so developers can remain focused on creating great applications

“Our product development is driven by one vital question: How we empower developers to do more valuable work in less time, with Managed Databases, developers and their teams can focus on creating meaningful applications and sharing them with their communities, without the headache of having to manage the database infrastructure that enables the process We do this all with an intuitive interface, full API support, transparent pricing, feature richness and flexible scalability” said DigitalOcean’s Senior Vice President of Product Shiven Ramji

As one of the company’s first fully-managed offerings, Managed Databases represents another key step in the company’s mission of becoming the Developer Cloud of choice for building modern apps

TSC Launches Cutting-Edge “Print Engine PEX-1000 Series” in India

TSC Auto ID Technology has launched of its innovative Print Engine PEX-1000 Series The latest series offers the Left-hand model (PEX-1100 Series) and the Right-hand model (PEX-1200 Series), to meet comprehensive print requirements

PEX-1000 Series print engine incorporates a robust die-casting structure with a stable media path which ensures outstanding print quality and accuracy This model is specifically designed for integration with various label applicators making it highly compatible It features three different levels

of models that cover 203, 300 and 600 dpi resolutions

The PEX-1000 Series has a powerful peel-off capability which makes it an excellent choice for printing small labels This model has a high-performance speed (up to 18 inches per second) and high connectivity which enhances the usability of the model The rear-side drawer design makes for ease of maintenance and quick replacement

Leveraging the user experience and complex applications across industries, the PEX-1000 Series

is ideal for manufacturing and logistics applications where high speed and mission-critical demand label printing is required

ACT Fibernet unveils new brand identity, enriches customer value

RaamayaACT Fibernet, launched its new brand

identity with the unveiling of the logo and tagline

‘Feel the Advantage’

The new brand identity represents ACT Fibernet’s

differentiated approach towards offering

innova-tive customer centric solutions that will enhance

user experience and provide maximum value

In 2019, ACT Fibernet will expand its products,

service offerings and partnerships across various

categories, namely – ACT Advantage

Entertain-ment, ACT Advantage Gaming, ACT Advantage

Speed, ACT Advantage Service, ACT Advantage

Smart Cities, and ACT Advantage community

ACT Fibernet will partner with content provider

like ZEE 5 and Sony Liv amongst others to

strengthen its content offerings Being the

preferred choice of every gaming enthusiast, ACT

Fibernet is working with popular gaming cafes,

gaming OEMs and gaming publishers to provide

Trang 19

What are some of the major

chal-lenges you see for the Indian

market from security point of view?

There are various challenges with which Indian

enterprises are struggling to deal with With

digi-tisation and technology revolution going across

the country, the Indian security market is most

concerned about,

l Fear of state-sponsored and financially

moti-vated attacks

l Need for security across the supply chain

l Fear of corporate espionage, data theft

l The sophistication of cyber-attacks, rise of

cybercrime as a service

l Constant upgradation and keeping abreast

to latest/ next-gen developments & technology,

thereby avoiding technological obsolescence

l Lack of awareness on data protection,

pri-vacy and internal security threats

l Complying with GDPR norms

What will the threat landscape

look like in over the next 12

months?

The threat landscape will definitely going to rise as

the hackers nowadays are much smarter than ever

and this will give a sure shot rise in the number

of cyber-attacks and increase in the cases of cybercrime

What will be the biggest drivers for security spending in 2019?

In past, we have seen many cyber-attacks where companies have paid billions of dollars to hackers

in ransom Many small and medium-size nies must shut their operations after becoming victim to the cyber-attack This will certainly prompt companies to increase their spending in security The other major factors which will con-tribute as a driver for security spending are,

compa-l Internal data thefts

l Proposed Data Protection Bill of India

l Digitisation and streamlining the tion in accordance with the latest technologies

organisa-How do you see India as a market for your solutions?

India has been our biggest contributor in terms

of revenue since our inception Presently, we are

“UNISTAL’S PROTEGENT ANTIVIRUS IS THE WORLD’S ONLY ANTIVIRUS WHICH COMES WITH INBUILT DATA RECOVERY OPTION”

ALOK GUPTAMANAGING DIRECTOR, UNISTAL SYSTEMS PVT

LTD

Indian security market is growing at a rapid pace and it

is going to grow much faster in the years to come SME Channels spoke to Alok Gupta, Managing Director, Unistal

Systems Pvt Ltd to know about his perspective

OUR PRODUCTS ARE DESIGNED TO PREVENT

DATA LEAKAGE AND PROVIDE PROTECTION

AGAINST VARIOUS

more focused on Tier II and Tier III cities as well

as in North East India Our channel partners are lending us great support in expanding our reach

as well as taking our products to masses spread across the length & breadth of the country Our products are designed to prevent data leak-age and provide protection against various types

of cyber threats Also, we are providing solutions for data recovery and activity monitoring, which will have a great prospect for Indian markets in the coming days

What is your focus in the market

- Channel market and CIOs/ CISOs

Unistal believes that the channels are the core of our business, but we are also going ahead with our new products and solutions to target the CIOs and CISOs With data security being a priority for every organization, we want to help the enter-prises in tackling the challenges related to security

& safety of their valuable data

SME CHAT

SME CHANNELS 19

Trang 20

Mobiles phones are also part of the cyber space as all these smart devices interact with internet all the time for running vari- ous utilities and games.

CYBER AWARENESS

ANIL CHIPLUNKAR,

LEAD AUDITOR ISO27001 (IRCA

ACCREDITED), CERTIFIED FRAUD

EXAMINER (CFE), CERTIFIED

INFORMATION SECURITY MANAGER

(CISM), CERTIFIED FORENSIC

ACCOUNTING PROFESSIONAL

(CFAP), CERTIFIED ANTI-MONEY

LAUNDERING EXPERT (CAME),

Systems and has been working

in information security space for

corpo-to perform their activities using internet from anywhere in the cyber world and try to remain hidden Today we all use internet services in some

or the other forms including email, on-line cations, games on computers and mobiles, social media sites like Facebook, Twitter, and Instagram etc and for many such functions This necessitates use of internet in a secured, sensible, and safest possible way to avoid the risks posed by malicious users / applications present out there in the cyber space

appli-Mobiles phones are also part of the cyber space

as all these smart devices interact with internet all the time for running various utilities and games

The applications like google map allows the vice provider to know mobile phones location including the path the person is taking to reach the destination The games on mobile phones

ser-do ask for accessing multiple utilities like SMS, Address Book, Camera, WiFi etc but all of the games may not really require these accesses There

is a possibility of a malware being installed by disguising as a game and can misuse these permis-sions The popularity of mobile phones provided much wider attack surface that can be targeted by the malicious users The users of computers and related tools are comparatively more aware about the cyber risks but the mobile phones being used practically by everyone including little children who do not have even a hint of the kind of cyber threats / risks Theft or misplacing the mobile phones pose various security risks such as the information stored on these devices can be mis-used by the person getting hold of these devices

As stated by KnowBe4, “today, only about 3%

of malware tries to exploit an exclusively technical

flaw The other 97% target instead users through Social Engineering”

RISKSFollowing is an indicative list of various risks which are posed via internet / because of intercon-nection of multiple devices to the cyber space i.e internet

l Phishing / Spamming / Vishing / Executive Targeting – Sending unsolicited emails to a large audience and try to steal information or block the email server access by overloading the server by number of emails Similar to emails, SMS or indis-criminate voice calls can also be used for carrying out the malicious activities Advanced techniques

in phishing are used to target specific als and this technique is called spear phishing or executive targeting

individu-l Impersonation – In the cyber space, it is comparatively easy to assume somebody’s iden-tity and project different identity by hiding the original identity of the user This is termed as impersonation and in the cyber world, it becomes challenging to verify the exact identity of a user unless strict controls are implemented

l Social Media Scamming – As the term indicates there can be various types of scams run

by the malicious users using social media The scams can be fake promotional sales, fake lotteries, fake work-from-home schemes, fake recruitment drives etc

l Targeted Malware (Exploits insertion / Bot Harvesters) – These are the applications targeted

to harm specific companies’ / government ments / devices to paralyze the operations of the target

depart-• Credentials theft – Malicious linksshared via email, SMS, WhatsApp can be used to trick the user in giving away the user’s credentials like user ID, password, PIN number etc

l Physical access (such as tailgating) – This

Trang 21

SME CHANNELS 21

BE SAFE – SPREAD THE AWARENESS – PROTECT YOURSELF AND THE COMMUNITY FROM THE CYBER RISKS

includes following a legitimate user who has access

to a restricted area with the aim of gaining

unau-thorized access to secured areas

l Shoulder surfing – When operating in public

places or even cyber cafes, there is a possibility of

someone overlooking the user’s shoulder to get

information about the user’s credentials

l Dumpster diving – Is a technique used to

gain information from the dustbin of the

competi-tor as there are number of organization /

depart-ments just throw away old papers, devices without

taking due care

l Social engineering – It is a technique used

for exploiting the weakness in human psychology

or behavior to gain illegitimate access to devices

/ information There are people who are called as

‘social engineers’ and these personnel can use their

skills in either way like to steal / misuse the data /

information or to test the ‘possibility of

exploita-tion’ and advise users / organizations for suitable

preventive measures This is a very effective nique where the focus is not on technological weaknesses but more on human weaknesses

tech-Prevention – key is “be ALERT”

As discussed above, there are many risks present is the cyber space / world and they can be prevented

by being alert, taking proactive care and using technical tools

l Protect devices with known / reputed malware application

anti-l User strong passwords for application and avoid using same credentials across multiple applications

l Do not store user credential on devices including mobile phones

l Do not share the credentials with anyone without any specific need

l Do not post personal information on social media sites unless necessary or the site is trusted because the information shared over internet is

always available on the internet somewhere

l Take utmost care while accessing internet

in public place as well as while communicating information

l Do not join any open forums or reply to messages asking for information / funds without properly verifying the authenticity of the forum / messages

l To protect the availability of critical tion, take periodic backup of this information

informa-l Do not download any applications / games unless verified to be safe (there are various tools available to check the security) and while installing

do provide the access to device functions carefullyThe cyber security can be as strong as the weakest link and in this case the weakest link is ‘human’ (all of us) so it is of utmost important to be a responsible user and follow all the preventive techniques This will enable a safe cyber working experience

Trang 22

It is just important to remember that Artificial Intelligence and Machine Learning will soon

be the same tools being leveraged against you, and to plan accordingly.

To manage increasingly distributed and

complex networks, organizations are

adopting artificial intelligence (AI)

and machine learning to automate

tedious and time-consuming activities that

nor-mally require a high degree of human supervision

and intervention To address this transformation

of the security ecosystem, the cybercriminal

com-munity has now clearly begun moving in the same

direction

For many criminal organizations, attack

tech-niques are evaluated not only in terms of their

effectiveness, but in the overhead required to

develop, modify, and implement them As a result,

many of their attack strategies can be interrupted

by addressing the economic model employed

by cybercriminals Strategic changes to people,

processes, and technologies can force some

cyber-criminal organizations to rethink the financial

value of targeting certain organizations One way

that organizations are doing this is by adopting

new technologies and strategies such as machine

learning and automation to take on tedious and

time-consuming activities that normally require a

high degree of human supervision and

interven-tion These newer defensive strategies are likely

to impact cybercriminal strategies, causing them

to shift attack methods and accelerate their own

development efforts In an effort to adapt to the

increased use of machine learning and

automa-tion, we predict that the cybercriminal munity is likely to adopt the following strategies, which the cybersecurity industry as a whole, will need to closely follow

com-1 AI Fuzzing:

Because they target unknown threat vectors, exploiting zero-day vulnerabilities is an especially effective cybercrime tactic Fortunately, they are also rare because of the time and expertise needed

by cyber adversaries to discover and exploit them

The process for doing so involves a technique known as fuzzing

Fuzzing is a sophisticated technique generally used in lab environments by professional threat researchers to discover vulnerabilities in hard-ware and software interfaces and applications

They do this by injecting invalid, unexpected, or semirandom data into an interface or program and then monitoring for events such as crashes, undocumented jumps to debug routines, failing code assertions, and potential memory leaks

Though using fuzzing to discover zero-day nerabilities has, so far, been beyond the scope of most cybercriminals, as AI and machine learning models are applied to this process it will become more efficient and effective As a result, the rarity

vul-of zero-day exploits will change, which in turn will have a significant impact on securing network devices and systems

2 Continual Zero-Days:

While a large library of known exploits exists in the wild, our cyber adversaries are actually only exploiting less than 6% of them However, to be effective, security tools need to be watching for all

of them as there is no way to know which 6% they will use Also as the volume of potential threats continues to grow, performance requirements will continue to escalate as the scope of the potential exploit landscape continues to expand To keep

up, security will need tools to be increasingly more intelligent about how and what they look for

While there are some frameworks like trust environments that may have a chance at defending against this reality, it is fair to say that most people are not prepared for the next genera-tion of threats on the horizon — especially those that AI-based fuzzing techniques will soon begin

zero-to uncover Traditional security approaches, such

as patching or monitoring for known attacks, will become nearly obsolete as there will be little way to anticipate which aspect of a device can be potentially exploited In an environment with the possibility of endless and highly commoditized zero-day attacks, even tools such as sandboxing, which were designed to detect unknown threats, would be quickly overwhelmed

Ngày đăng: 09/11/2019, 10:28

TỪ KHÓA LIÊN QUAN