Unistal: Our products are designed to prevent data leakage and provide protection against various Check Point: Check point’s infinity architecture provides gen v security securing asset
Trang 1Unistal: Our products are
designed to prevent data
leakage and provide protection
against various
Check Point: Check point’s
infinity architecture provides gen v security securing assets of organizations
Trang 2FORTINET SECURITY FABRIC
A Security Architecture that’s Broad, Integrated and Automated
ONE SUPPLIER, TWO SUPPLIERS, THREE SUPPLIERS FOUR…
can sometimes feel like a never ending children’s game One for small business,
another for mid-sized and yet a third for my large enterprise customers.
Fortinet is the only company that offers the full range of solutions that are needed
in today’s environment, solutions that seamlessly scale from small business to large
enterprise The Fortinet Security Fabric architecture ensures that organizations of all
sizes can equally be protected without compromise.
Fortinet is there for you with no need for any games.
For details contact:
North: Sanjeev Tyagi, E-mail: styagi@fortinet.com, M: +91 98105 00157
South: Binu Ninan, E-mail: bninan@fortinet.com, M: +91 98400 36767
West, East, Central: Navin Mehra, E-mail: nmehra@fortinet.com, M: +91 98925 60700
FINDING THE RIGHT SECURITY PARTNER
Trang 3India Most Digitally Mature Country in the World: Dell /06PLUS
india’s leading IT magazine for channel businesswww.smechannels.com
We just started our 2019 journey of events from Bangladesh The event is Enterprise It World and
Infosec Foundation Global Security Symposium & Cyber Sentinel Awards 2019 A great experience to
do it because after doing some events in overseas market – specially in Dubai, we were under
impres-sion that it is the only exciting market in the APAC region but amazing Bangladesh growing at nearly
8% more than any other country – courtesy garment exports of the country, manufacturing of generic
medicines and growth of banking sector among others But along with growth the country is seeing
huge cyber attacks from the hackers Therefore, opportunity of doing business in Bangladesh is also
great
Bangladesh is the second largest exporter of garments to the global market after China, it has huge
manufacturing units of generic medicines, it is also becoming stronger in contact center and call
center services Bangladesh has also embarked upon strong digital journey It means ICT market in
Bangladesh is on rise I was speaking to Mr M A Mannan, Honorable Minister, Ministry of
Plan-ning, Republic of Bangladesh about the country’s stride on it path He expressed his happiness that a
journalist is taking interest in Bangladesh economy He quipped, “You invest in our country, we will
give you all support whatsoever to make your business successful… take all profit and give a very little
profit to us But I assure you that if you invest $1 dollar, we will offer you opportunity of $2 dollar We
have a huge skilled population to help you Do not be worried.”
My sense is our neighbour wants to compete with India which is really healthy can be another land
where our partners and principals can explore It is only 45 minutes flight from Kolkata and food habit
is like India You won’t feel like out of the country except the airport is little crowded
Bitdefender Endpoint Security Solution
MY EXPERIENCE
SPECIFICATION: IT PROTECTS DESKTOPS,
LAPTOPS, SERVERS (PHYSICAL AND VIRTUAL) AND MAILBOXES SERVERS SHOULD ACCOUNT FOR LESS THAN 35%
OF ALL UNITS
BITDEFENDER ‘GRAVITYZONE ULTRA SUITE’ is a complete End-point Security solution that uncovers and stops elusive threats with Detection and Response (EDR) that works GravityZone Ultra integrates layered next-gen endpoint protection and easy-to-use EDR platform to accurately protect enterprises against even the most elusive cyber threats It offers preven-tion, automated detection, investigation and response tools so enterprise customers can protect their digital assets and respond to these threats GravityZone Ultra excels where most products are too complex and resources intensive GravityZone Ultra sharply limits the number of incidents requiring manual analysis, reducing the operational effort required to run an EDR solution
OVERALL RATING
FINAL WORDING:
Overall, the Software uses adaptive-layered architecture that includes endpoint controls, prevention, detection, remediation and visibility
SECURITY/39
4 WAYS TO PROTECT YOURSELF FROM CYBER CRIMINALS WHEN SHOPPING ONLINE
SME CHANNELS 3
Trang 4Editor: Sanjay Mohapatra Associate Editor: Deepak Singh Sub Editor: Aritra Ghosh Designer: Ajay Arya Assistant Designer: Rahul Arya,
Deepak Kumar
Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan
Satya Sagar Sinha
Lead Visualizer: DPR Choudhary
Bangalore
#28/1, 3rd Floor, Sri Lakshmi Krupa, Near Shamanna Park, Model House Street, Basavanagudi, Bangalore - 560004
Ph No +91 88618 21044
Mumbai Tahmeed Ansari
2, Ground Floor, Park Paradise, Kay-Bees CHS Ltd.,Opp Green Park, Oshiwara, Andheri (west), Mumbai - 400 053.
Ph +91 22 26338546, Fax +91 22 26395581 Mobile: +91 9967 232424
Bangalore Bindiya Jadhav
#28/1, 3rd Floor, Sri Lakshmi Krupa, Near Shamanna Park, Model House Street, Basavanagudi, Bangalore - 560004
Ph No +91 88618 21044 E-Mail bindiya@ accentinfomedia.com Skype ID: b1diyajadhav
Printed, Published and Owned by Sanjib Mohapatra
Place of Publication: 6/101-102, Kaushalya Park, Hauz Khas
New Delhi-110016 Phone : 91-11-46151993 / 41055458
Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India
All rights reserved No part of this tion can be reproduced without the prior written permission from the publisher
Editorial ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 03 Snippets ~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06 Products ~~~~~~~~~~~~~~~~~~~~~~~~~~~~41
CASE STUDY
MATRIX/ 31
”A MANUFACTURING GIANT IN
MAHARASHTRA TRUSTS MATRIX VIDEO SURVEILLANCE FOR 24X7 SECURITY”
DESIGNED BY
THE CHANGING IT SECURITY
Data security continues to become complex with the each passing day, but many
compa-nies have the propensity of softpedal the risks
COVER
STOR Y
Trang 6Fortinet Rolls out Next-Generation Firewalls to Deliver Intent-based
Segmentation
India Most Digitally Mature
Country in the World: Dell
According to the latest Dell
Tech-nologies Digital Transformation
Index, India is the most digitally
mature country in the world
However, businesses in India still
have a lot of work to do Leaders in India are more aware of the need
to prioritize digital transformation throughout their organization: 91%
of the business leaders believe that
digital transformation should be more widespread, compared to78%
globally Almost half (48%) (51%
globally), believe they’ll struggle to meet changing customer demands
within five years
Dell Technologies, in tion with Intel and Vanson Bourne, surveyed 4,600 business leaders (director to C-suite) from mid- to large-sized companies across the globe to score their organizations’ transformation efforts
collabora-The study revealed that emerging markets are the most digitally mature, with India, Brazil and Thai-land topping the global ranking
In contrast, developed markets are slipping behind: Japan, Denmark and France received the lowest digital maturity scores
“In the near future, every organization will need to be a digital organization, but our research indicates that the majority still have
a long way to go Organizations need to modernize their technology
to participate in the unprecedented opportunity of digital transforma-tion The time to act is now” says Michael Dell, chairman and CEO of Dell Technologies
Fortinet has announced its new
high-performance FortiGate
Next-Generation Firewalls
(NGFWs), comprised of
Forti-Gate 3600E, FortiForti-Gate 3400E,
FortiGate 600E and FortiGate
400E Series, enabling
organiza-tions to implement Intent-based
Segmentation into their security
architecture
Intent-based Segmentation allows organizations to achieve granular access control, continu-ous trust assessment, end-to-end visibility and automated threat protection In addition to deliver-ing Intent-based Segmentation, FortiGate 3600E offers 30Gbps threat protection and 34Gbps SSL inspection performance
FortiGate 3400E offers 23Gbps threat protection and 30Gbps SSL inspection performance
FortiGate has a longstanding trajectory of earning NSS Labs Recommended ratings in the Next-Generation Firewalls group tests given its high SSL inspec-tion performance with minimal performance degradation as one
of the reasons
“The new FortiGate 3400E and 3600E Series provide industry-leading threat protection and SSL inspection performance allowing customers to implement
a holistic end-to-end architecture” says Rajesh Maurya, Regional Vice President, India & SAARC, Fortinet
smechannels.com
PRODUCT | CHANNEL | CONSULTING | SERVICES
Trang 8Array Contributes to Smart Cities Mission
Array generates $5 million revenue from smart cities projects, targets $9Mn by 2019 Array Net-works is supporting ‘100 Smart Cities Mission’ initiated by the Union Government of India The company has been involved in various stages
of implementation for multiple cities namely Nagpur, Ahmedabad, Davengere to name few Smart cities projects have contributed to Array growth rate in 2018 of 40% By the end of 2019, Array aims to be part of 20 more smart cities and targets on keeping the growth momentum.Smart infrastructures and smart Data Centers (DCs) are at the core of smart cities and they manage, coordinate, and rationalize the resources demanded Array has assisted
in devising futuristic data centers for smart cities by introducing unique concepts such as Hyperconvergence in networking into the DCs Their advanced security solutions are designed with network security protocols like ECC It enhances application security, and provides complete visibility into various threats and performance inhibitors, allowing organizations
to make informed and proactive security sions Array’s hyper converged solution stack include ADC, Web application firewall , DDoS , Web vulnerability scanner , SSLi & Array MARS Visibility & analytics tool
deci-NetApp Powers Ducati’s
Team for the 2019
Sestek Becomes Avaya DevConnect
Technology Partner
“NEVER HAVE WE SEEN CUSTOMER EXPECTATIONS OR TECHNOLOGY CHANGING AS RAPIDLY AS IT IS TODAY, WE ARE THRILLED TO BE ADDING THESE PROVEN ENTERPRISE LEADERS
TO ZENDESK SO WE CAN HELP MORE COMPANIES AROUND THE WORLD TRANSFORM THEIR CUSTOMER EXPERIENCES.”
MIKKEL SVANE, ZENDESK FOUNDER AND
CEO.
Check Point has published the second instalment of its 2019 Security Report It highlights how the tools and services used to commit cyber-crime have become democratized, with advanced attack methods now available to anyone willing to pay for them, as part of the growing ‘malware-as-a-service’ industry
The Security Report reveals the key cyber-attack trends observed by Check Point researchers during 2018, and shows the significant growth in stealthy, complex attacks designed to stay below the radar of enterprise security teams It also shows the types of cyberattacks which enterprise IT and security teams’ rate as the biggest threats
to their organizations
Cryptominers infected 10x more organizations than ransomware in 2018, but only one in five IT security profes-sionals were aware their company’s networks had been infected by mining malware
Sestek, a provider of speech-enabled
smart technologies, has become
an Avaya DevConnect
Technol-ogy Partner Through direct R&D
engagement, deep product
integra-tion, and strong support relationships,
the Avaya DevConnect ecosystem
delivers a wider range of technology
options for Avaya users to drive their
business forward and provide value
to their customers, from ready-made
solutions validated for
interoperabil-ity to custom-tailored applications
By joining the Avaya DevConnect
Program, the two companies will
explore uses of Sestek’s advanced
technologies with Avaya’s leading
communications platforms Sestek
will develop enhanced applications for Avaya platforms to provide customers with end-to-end solutions that address the evolving busi-ness challenges posed by digital transformation
Avaya’s DevConnect Program is intended to drive expansion of the open and agile Avaya application ecosystem so that more fully formed solutions can be delivered through its platforms The program is designed
to deliver more customer-centric outcomes for technology buyers, who can be confident that they are gaining access to the most advanced and innovative technologies they need to deliver solutions across the business
NetApp confirms second year as official sponsor
for the 2019 MotoGP World Championship
NetApp will renew its official sponsorship of
the Ducati Team in the 2019 MotoGP World
Championship, enabling the digital
transforma-tion of motorcycle racing
The new Ducati MotoGP team was presented
officially on Friday, January 18, in Neuchâtel
(Switzerland) Data-driven technological
developments on the racing bikes will boost the
performance of factory riders Andrea Dovizioso
and Danilo Petrucci, supported by test rider
Michele Pirro
As a data-driven company, Ducati began its
partnership with NetApp last year to take
advan-tage of the full potential of data in racing within
the Ducati Corse division It recently expanded
the partnership to analyze vast amounts of
data throughout its business, including in
logistics, marketing and customer relationship
management
Through the partnership, NetApp’s engineers
are working closely with Ducati’s IT team to
opti-mize their data fabric and meet the motorcycle
manufacturer’s unique, rapidly expanding data
storage and data management needs
Cryptominers Hit 10x More
Organizations than
Ransom-ware in 2018: Check Point
Trang 10EXECUTIVE MOVEMENT
DigitalOcean has appointed Barry Cooks as chief technology officer
mjunction has appointed Vinaya Varma as Managing Director and CEO of mjunction services limited,
Sophos has appointed Gavin Struthers as its regional vice president for Asia Pacific and Japan
Agrahyah Technologies has roped in Naveen Kallur
as Business Head
GLOBAL IT SPENDING TO REACH
$3.8 TRILLION IN 2019
All Segments Forecast to Exhibit Growth in 2019 Despite Recession, Brexit Threat
Bosch Opens Center
for Data Science and
Artificial Intelligence
The Robert Bosch Center for Data Science and
Artificial Intelligence was inaugurated at the Indian
Institute of Technology Madras
Bosch will invest 20 crores over five years in the
center The mission of the new center is to create
soci-etal impact through multidisciplinary interactions
with government, academic, research and industrial
collaborators on core challenges in Data Science (DS)
and Artificial Intelligence (AI)
The RBC-DSAI will undertake foundational
research in many areas of AI and Data Science,
including deep learning, reinforcement learning,
network analytics, interpretable machine learning,
and domain aware AI The areas of activity include
research projects, knowledge management and
dissemination, outreach projects, and setting up
collaborative facilities and laboratories
Aspire Systems acquires UAE-based
iApps and the Oracle Business Unit of
Valforma
Aspire Systems, announced the 100% acquisition of iApps, an Oracle Fusion Cloud specialist, based in UAE In addition, Aspire is also acquiring the Oracle Business Unit from Valforma Technology Services Private Limited
iApps is an Oracle Platinum Cloud Standard Partner with deep expertise in Oracle Fusion ERP, HCM CX, Oracle PaaS and Omni-channel Contact Center The acquisi-tion of iApps and Valforma will help Aspire service mid-size and large enterprises
in their move to the cloud from on-premise applications These acquisitions also enable Aspire’s focussed effort to address the postmodern ERP strategy that involves surrounding core ERP solutions with best-in-class cloud solutions to enable faster processing, better collaboration and easier-to-use analytics
Aspire’s global customers will now be able to leverage the Oracle Fusion Cloud expertise of iApps and Valforma combined with the highly specialized Cloud & Digital Services capability that Aspire offers In addition, the capabilities of iApps and Valforma will also help Aspire develop cloud-based IPs including iEstate, iAu-todealer, iPublish, iQuote, and iEnergy which are industry-specific Oracle Fusion Cloud implementation accelerators
Table 1 Worldwide IT Spending Forecast (Billions
of U.S Dollars)
SOURCE: GARTNER (JANUARY 2019)
2018 SPENDING
2018 GROW (%) 2019 SPENDING 2019 GROWTH
(%)
2020 SPENDING
2020 GROWTH (%)
DATA CENTER SYSTEMS 202 11.3 210 4.2 202 -3.9
Trang 11WE’RE NOT JUST FIREWALLS.
SonicWall automated, real-time breach detection and prevention
layers proven cybersecurity across your entire organization.
You know SonicWall because of our rich history designing high-performance firewalls But like
your organization, SonicWall has evolved
Today, the modern SonicWall Capture Cloud Platform delivers automated, real-time breach
detection and prevention to safeguard your business or organization
With this layered approach, you can stop the most malicious cyberattacks, including ransomware
and encrypted threats, from compromising your network and damaging your brand
Physical & Virtual
Firewalls
Cloud Application
Security
Multi-Engine Cloud Sandbox
SD-WAN
Public & Private Cloud Security
Web Application Firewall
Endpoint Protection
Secure Remote
& Wireless Access
Secure Email
Unified Management
& Reporting
© 2019 SonicWall Inc ALL RIGHTS RESERVED SonicWall is a trademark or registered trademark of SonicWall Inc and/or its affiliates in the U.S.A and/or other
countries All other trademarks and registered trademarks are property of their respective owners.
For more information about SonicWall solutions, contact
india@sonicwall.com or visit www.sonicwall.com
Trang 12Palo Alto Networks to Boost Channel
Growth
Palo Alto Networks announced several enhancements to its NextWave Partner Program, which
will boost program flexibility, fuel long-term growth and enable the expansion of partner-led
services Palo Alto Networks introduced new options for partners to grow their businesses with
streamlined program levels, tiered discount structures, and new partner incentives aimed at
boosting margins and profitability
Palo Alto Networks rolled out a new dedicated Managed Services Program, providing
partners a clear path for capitalizing on the rapidly growing managed services opportunity
Palo Alto Networks has automated systems and processes to make doing business easier
These advancements simplify the quoting and approval process to accelerate the sales cycle and
improve the overall partner experience
Unistal Launches High
Level Security Solution
in complying with GDPR norms by keeping track
of the employees’ activities and monitoring all the connected devices in the network
“Nowadays, data has become one of the most important aspects for any company and it is a chal-lenge for them to keep it safe and secure With our product, enterprises can actively monitor all the con-nected devices in a network Activity Reporter also gives the administrator the choice to see the screen
of the user’s system with just a single click Its unique features will act as a foil for anyone who wishes to do any fraudulent activity in the organization” said Alok Gupta, Co-founder and Managing Director at Unistal Systems Pvt Ltd
Activity Reporter is an effective employee performance monitoring software, which captures the data on employees’ active and idle time during the office hours This software will make it easier for the HR department to ensure that the corporate costs spent on employees are not wasted The software will also help management to better understand each employee’s strengths & weaknesses and eradicate the unproductive behavior
HARMAN Professional Solutions Extends
their Indian Enterprise Portfolio
Distribu-tion Rights
HARMAN Professional Solutions announced their distribution partnership with Brightstar
India to include HARMAN installed solutions for their enterprise portfolio in India
Brightstar India has an existing relationship with Harman Lifestyle division and this
partner-ship will enable Brightstar to deal in the complete range of professional Installed audio and
video products for the enterprise business
“HARMAN is a global leader in end-to-end AV solutions and we are excited about this
partnership, inclusion of complete range of JBL, AMX, SVSi, BSS, Dbx, AKG, Crown, and
Soundcraft will now help our partners to supply a complete audio-video automation solution
from Harman which end-customers have been asking for a long time We will also be the
one-stop-shop for all HARMAN preferred partners in enterprise business” said Sanjeev Chhabra,
Managing Director, Brightstar India
Largest Public Hospital
Delivery
SVPIMSR has selected HPE SimpliVity 380 for its
central-ized datacenter infrastructure to host their mission critical
applications
The recently inaugurated Sardar Vallabhbhai Patel Institute
of Medical Sciences and Research Hospital (SVPIMSR),
Ahmedabad, Gujarat has selected HPE SimpliVity 380 for
its centralized datacenter infrastructure to host their mission
critical applications including the integrated Hospital
Information System (iHIS), Virtual Desktop Infrastructure
(VDI) and more
Managed by the Ahmedabad Municipal Corporation
(AMC), SVPIMSR features 32 Operating Theatres, 139
Inten-sive Care Units, and over 1600 beds spread across 18 floors
In addition to offering high quality healthcare services to the
people of the region, the state-of-the-art facility is designed to
meet the future demands of patients with a continued focus
on their care, safety and satisfaction
RP tech India Enters into Cloud Business with Acquisition of ZNet Technologies
RP tech India (a division of Rashi Peripherals Pvt Ltd) has acquired Cloud Services Provider ZNet Technologies With this partnership, RP tech India will now offer ZNet’s cutting-edge Cloud services and solutions to potential SMB and Enterprise customers in India
According to the terms of the acquisition, RP tech India will take a majority stake in ZNet and will invest in enhancing R&D capabilities and upskilling technical manpower to support latest technologies like Cloud, IoT, AI etc ZNet will continue to operate as an independent legal entity and various existing brands of ZNet will continue to operate as normal.Founded in 2009, ZNet Technologies is the leading provider of IT and Cloud solutions The company offers a wide range of services from domains to high-end Cloud infrastructure managed services under the ZNetLive brand It offers infrastructure services from leading cloud ven-dors like Microsoft, AWS, Alibaba, Google and its own Data Centre based offering to its customer base ZNetLive powers well over 90K+ websites and applications globally and is one of the very first Microsoft CSP in India
Trang 14Two-Thirds of Retail Store Associates
Can Provide Better Customer Service
with Tablets: Zebra
Zebra Technologies Corporation has revealed the results of its 11th annual Global
Shopper Study, analyzing the attitudes, opinions, and expectations of shoppers, retail
associates and retail decision makers The results show that two-thirds (66 percent) of
surveyed associates believe that if they are equipped with tablets, they could provide
better customer service and improve the shopping experience
Fifty-five percent of surveyed retail store associates agree that their company is
understaffed, and nearly one-half (49 percent) feel overworked Store associates cite
frustration with their inability to assist customers as 42 percent find they have little
time to help shoppers because of pressure to get other tasks completed Another 28
percent claim that it’s difficult to get information to help shoppers Most surveyed retail
decision makers (83 percent) and store associates (74 percent) concur that shoppers
can have a better experience with technology-equipped sales associates
HID Global Retransfer
Printer for ID Card ization is First of its Kind
Personal-HID Global announced that it’s Personal-HID FARGO HDP6600 High Definition Printer and Encoder is the first and only retransfer printing solution for ID card personalization that has Green-Circle certification
The HDP6600 printer achieves its breakthrough energy efficiency using a design that also delivers the fastest overall throughput speeds and shortest time until the first card is printed Sustainability is further improved through an optional wasteless lamination module that dramatically reduces the waste byproducts that other printers generate The module cuts consumables costs nearly in half for printed and laminated cards
Vertiv has launched ‘Vertiv Xpress – Partner Drive’ to showcase its complete stack of critical infrastructure solutions to its partner network and customers in India Kicked off in Delhi on 21st January 2019, the multi-city initiative will engage partners through unique programmes, and work on collectively growing the partner’s business in a fast and evolving digital landscape
Vertiv aims to further enhance its engagement in the Indian market and build a strong channel network across the country The Vertiv Xpress, a 52-foot trailer will showcase a range of infrastructure solutions and give a view of the company’s vision to stakeholders
Announcing the launch of Vertiv Xpress – Partner Drive, Sunil Khanna, president and managing director, Vertiv India, said, “India is a key region for Vertiv and through this traveling Xpress we’re able to work closely with our partners and customers to help them get ahead in the market Evolving with trends around data centres, we plan to invest more in terms of product innovation as well as research and development in the near future With the Vertiv Xpress initiative we will showcase our energy efficient solutions that will change the way businesses address their efficiency needs.”
Acronis Appoints Sea Infonet as Distributor for India
Acronis has appointed SEA Infonet as a key distributor in India SEA Infonet will be responsible for promoting and distributing the complete range of Acronis’ on-premises, cloud-based, and consumer cyber protec-tion solutions, including Acronis Backup for businesses and enterprises, Acronis Data Cloud for service providers, and Acronis True Image for home users
“We welcome SEA Infonet joining our team and we are excited they will
be supporting our presence in India Both our companies are committed
to helping businesses and consumers take advantage of secure and efficient cyber protection solutions – and with this alliance, they now can,” said Maxim Mitrokhin, Acronis General Manager of Channel Sales in APAC “We are very excited to partner with Acronis We are emerging as a leading VAD in India with a channel partner base of 650+ across the country – and have a great platform to build the channel ecosystem for Acronis Advancing our partnerships with managed service providers and cloud providers in India would be one of the key focus business lines,” said Biswajeet Saha, CEO of SEA Infonet
Xerox Enables Customers to Go
Beyond CMYK with Brilliant New
Colors at PrintPack 2019
Print providers, designers and marketers in India got a closer look at
the business building opportunities presented by the Xerox Iridesse
Production Press at PrintPack 2019 which took place from Feb 1 to
6, 2019 Iridesse is the only digital press that can print metallic gold or
silver dry ink, CMYK and clear or white dry ink in a single pass, giving
print providers an immediate competitive edge in the growing digital
print enhancement market
“The launch of our flagship device, the Iridesse Production Press,
and the overwhelming response received from customers is surely
one of the key highlights from 2018,” said Vineet Gehani, director,
Technology and Channels, Xerox India “We’re focused on developing
the technology and solutions our customers need to boost business
opportunities and drive revenue to new heights – and Iridesse is the
perfect example as it helps our customers lead the way in beyond
CMYK printing.”
Trang 16eScan Rolls Out New Deals to Bring Channel
Partners More Closer to the Brand
eScan has introduced a special incentive program for the channel partners that include various gifts
like gold coins, silver coins and gift vouchers to be claimed by the partners This program is designed to
reward the channel partners for their contribution towards the growth of eScan products The offer is
valid for all the sales made from 1st January to 31st March 2019
The specially designed program is valid on purchase of eScan’s products for Small Office & Home
segments This segment includes products like eScan Anti-Virus with Cloud Security, eScan Internet
Security Suite, eScan Total Security Suite etc However the offer is not applicable on eScan Anti-Virus
with Total Protection eScan values its relationship with the channel partners and with this scheme
rewards their commitment for their contribution to make the company reach the end users
This special offer has been created to encourage partners to participate in the program and get various
gifts with a minimum purchase of Rs.5,000 onwards up to Rs.50,000 The partners have to register
themselves on the Touch Point Network (TPN) Reward program, created by eScan for more benefits to
the partners
DIGEST
UNISTAL CELEBRATES 25 GLORIOUS YEARS OF SERVING EXCELLENCE
Unistal Systems Pvt Ltd., the developer and provider of Antivirus, data care, data recovery, data security software and Oil & Gas solutions, recently celebrated 25 glorious years of serving excellence The pompous celebrations started
at 7 p.m at the Crowne Plaza Hotel, New Delhi The company shared its success stories and recognised the contribution of mentors, employees, partners, vendors, friends and family for their continuous support The event was graced by the presence of well-known dignitaries from top corporates, partners, OEM heads and media houses.
LARSEN & TOUBRO INFOTECH ACQUIRES RULETRONICS
Ruletronics enables businesses to transform and evolve digitally by providing innovative BPM and CRM solutions leveraging Pega Platform Their current industry strength lies across Insurance, Banking, Healthcare and Retail segments The company offers unique product based offerings for Disability Claims management, KYC Bulk Remediation, and Insurance Sales & Service applications The acquisition will strengthen LTI’s rapidly growing digital business with a suite
of capabilities in Pega implementation space around establishing BPM Roadmap & Strategy, Customer Services, RPA and Decisioning.
ATEN TURNS 40, CELEBRATES ITS PASSION FOR EXCELLENCE
ATEN reached another milestone this year, celebrating 40 years of successful global busi- ness Initially established as HOZN Automation
Co Ltd in 1979 and later renamed in 1988 as ATEN International Co Ltd, ATEN is one of the largest KVM switch manufacturers in the world All ATEN products are ISO 9001 and ISO
14001 certified Imbued with the core values
of Integrity, Caring, Ambition, and Novelty (ICAN), ATEN has been creating new innovative products and solutions to address the changing demands of customers across decades.
BITDEFENDER RELEASES POINT SECURITY SOLUTION
END-Bitdefender has rolled out its newest software
‘GravityZone Ultra Suite’ a complete Endpoint Security solution that uncovers and stops elusive threats with Endpoint Detection and response (EDR) that works GravityZone Ultra integrates layered next-gen endpoint protection and easy-to-use EDR platform to accurately protect enterprises against even the most elusive cyber threats It offers prevention, au- tomated detection, investigation and response tools so enterprise customers can protect their digital assets and respond to these threats GravityZone Ultra excels where most products are too complex and resources intensive GravityZone Ultra sharply limits the number of incidents requiring manual analysis, reducing the operational effort required to run a EDR solution Cloud-delivered and built from the ground up as an unified, single agent/single console solution, it’s also easy to deploy and integrate in the existing security architecture.
Kodak Alaris and Newgen Software Announce
Global Strategic
Cisco’s 65% of Indian organizations better prepared for GDPR, making India the sixth leading nation
in readiness index its 2019 Data Privacy Benchmark Study which placed India amongst the leading
nations globally in their preparedness towards the General Data Protection Regulation (GDPR)
According to the report, organizations worldwide that invested in maturing their data privacy
practices are now realizing tangible business benefits from these investments The study validates the
link between good privacy practice and business benefits as respondents report shorter sales delays as
well as fewer and less costly data breaches
The European Union’s General Data Protection Regulation, which focused on increasing protection
for EU residents’ privacy and personal data, became enforceable in May 2018
TechnoBind conducted 2 city partner’s meet in Mumbai & New Delhi Attended by over 70+ channel
partners, the event was targeted to educate and help partners capitalize on future opportunities in
enterprise security space
Being a distributor for Gemalto’s range of solutions since 3 years, TechnoBind has delivered
exponen-tial growth in the Indian market
With Gemalto SafeNet Identity and Data Protection solutions for enterprise security, organizations
can take a data-centric approach to their security posture, all while controlling access to the
infrastruc-ture and applications they rely upon Not only can they create trust and authenticate their transactions,
but they can ensure that sensitive data is protected and controlled – both on-premises and in public
and private clouds In addition to a heightened level of protection, enterprises are also able to improve
business efficiencies and scale to the identity and data protection needs of tomorrow
Kodak Alaris and Newgen SoftwareTechnologies announced a new global strategic alliance that will
provide their customers and channel partners with access to best-in-class solutions to help
organiza-tions drive digital business Under the agreement, Newgen and Kodak Alaris will expand, connect and
grow their network by jointly recruiting partners with similar profiles to help sell their solutions Kodak
Alaris scanners are now included on the Newgen certified document scanner list
The alliance is expected to generate new business opportunities for channel partners that work
with Alaris and Newgen across geographies, vertical markets, and applications It positions Alaris and
Newgen as partners of choice for customers around the world looking to leverage the power of their
information, reduce cost, save time and optimize business processes
Kodak Alaris enables organizations to automate business processes and take complexity out of
information capture
India Sixth in GDPR Readiness index: Cisco
TechnoBind Empowers Partners
Trang 17Eurotech Launches BestNet 2-Post
Frame Open Network Racks
Eurotech Technologies has launched BestNet 2-post frame open network racks The
racks are suited for cabling and patching frames, intermediate distribution points
and safely houses all networking equipment’s, ensuring complete convenience &
flexibility Available in 19” and 23” models the racks come with heights ranging from
27U to 42U
The 2-post frame open racks are made of strong and lightweight aluminium
(6063-T6 alloy) extrusion or 2.0 mm steel These racks have universal 5/8”-5/8”-1/2”
vertical mounting hole patterns, which allow mounting of 19”equipment’s Multiple
racks can be bayed with the help of BestNet baying kit The top and side frames are
provided with cable entry cut-outs which allow effective routing of cables Both the
steel and aluminium models can be used to either fit 19” or 23” equipment’s
The units which can either be fitted on the floor or allowed to move are well
suited for networking and data transmission applications Used in open accessibility
lab applications, these products can be modified and customized with the help of
BestNet accessories to specific user requirements
GajShield Only Indian Vendor in the
Gartner’s 2018 Asia/Pacific Context
GajShield Infotech is the only Indian vendor to be named in the Gartner’s 2018 Asia/
Pacific Context: ‘Magic Quadrant for Enterprise Network Firewalls’
GajShield is one of the few companies worldwide and the 1st Indian Firewall
Product Company to have earned ICSA Labs Firewall Certification criteria 4.1
They are a leader in innovating security technologies like Context based Data Leak
Prevention, Cloud Security, Zero-day Anti-Ransomware, OOPs based Management
and more
GajShield’s approach of looking beyond traditional security solutions and focusing
on Data First security strategy is a leap forward in the security solution industry that
is helping enterprises to secure cloud and SaaS applications by implementing a Next
Generation Fire Wall solution
Portronics Launches
“My Buddy Hexa”
Portable Laptop Stand
Portronics, a leading provider of innovative and portable gadgets has added “My Buddy Hexa”
to its existing range of laptop stands The brand has provided most ergonomically styled, strong and lightweight laptop stands and has set an industry standard over the last 5 years Taking
up to its stride, the company has launched - My Buddy Hexa that boasts of unmatched features like 7 adjustable levels which can be set up as per the user’s convenience
Being fan-less, it’s completely noiseless as it uses natural ventilation of your laptop One of the best ventilation is the natural air ventilation that works with the laptop’s in-built fan to cool the laptop Not only has it improved the lives
of your laptop battery but also of the internal components like CPU and motherboard Longer battery life is also caused by less battery charging cycles required
By improving your working posture on the desk and reducing strain on your neck by having right screen viewing angle, you can work longer and without any neck or back pain Also, your fingers and wrists too get optimum 7 adjustable angles when typing on the keyboard which also reduces the fatigue
My Buddy Hexa is available at an affordable price-point of INR 699/- from online and offline stores
Check Point introduced Check Point Maestro, the
industry’s first truly hyperscale network security
solu-tion Check Point Maestro enables businesses of any
size to enjoy the power of flexible cloud-level security
platforms, and to seamlessly expand their existing
security gateways to hyperscale capacity
“Check Point Maestro extends the Gen V security
capabilities of our Infinity architecture into hyperscale
environments It ensures organizations can secure
their dynamic, evolving environments without limits,
now and in the future, The principle behind Maestro
is very simple: it enables organizations to start with
their existing security implementations, no matter
how small, and scale their protection almost infinitely
according to their changing business needs” said Itai
Greenberg, VP of Product Management, Check Point
Consul Neowatt Appoints Savex
Tech-nologies as National Distributor
Consul Neowatt, the Global Indian UPS company has appointed Mumbai based Savex Technologies as National Distributor for its full range of power back up and power conditioning products This alliance will help Consul Neowatt leverage the strength of Savex Technologies to expand its IT channel reach and for Savex to offer attractive power solutions to complement their Enterprise IT distribution business offerings
Savex is a 32-year-old organisation and is the largest Indian distribution house in India today catering to more than 7000 plus Channel partners/SI’s across India They are head quartered out of Mumbai with 39 branch offices, 43 warehouses and 105 sales locations across India
Through this alliance Consul Neowatt would leverage Savex Technologies 7000+ partners across the country The primary intent is to cover a larger region in India with multiple channels while providing access to a larger audience and secondly engage with new partners in larger cities as well as strengthening reach in high growth Tier – 2 and 3 regions
Check Point Launches
Maestro
SME CHANNELS 17SNIPPETS
Trang 18the highest quality gaming experience to users.
Within the next six months, ACT Fibernet plans to launch its broadband services
in multiple cities across North & West India, thereby expanding its footprint in the country The company will also be launching a 24*7 call center and a unified call center number to address customers’
queries in real time “We have always believed in providing our customers the best solutions through our products and services Today, consumer needs and usage behavior is continuously evolving Newer technologies are constantly being adopted and becoming mass-scale by the day, be
it streaming or gaming or smart homes
It is therefore our responsibility to work
in conjunction with the rapidly evolving
customer’s expectations and find feasible ways to serve them We strongly believe that our new brand identity reflects this value and commitment we have towards our customers” said Bala Malladi, CEO, Atria Convergence Technologies Ltd
“Moving forward, we will be launching new products and services that our consumer’s desire We are confident that with our pioneering fibernet connec-tion, hyper fast speeds, new offerings and industry’s best customer service in place, we will successfully transform our customer’s experience enabling them to do and accomplish more With ACT you can feel the Advantage” he added
Compuage &
Microsoft Organize
Multi-City events
Compuage Infocom and Microsoft
organized joint partner programs for
the launch of Microsoft Cloud Solution
Provider Events were conducted in
Mumbai, Pune, Delhi and Lucknow in
the month of December
These events imparted knowledge
on Microsoft Cloud Solution Provider’s
usage and offerings Speakers from
Compuage & Microsoft demonstrated
how partners can benefit with the cutting
edge technology of cloud empowering the
channel partners
Senior members from Microsoft as well
as Compuage together made the events
engaging and solved one on one queries
of the partners Over 200 unique partners
attended the meets making it successful
Compuage& Microsofttogether plan to
organize similar meets in Hyderabad,
Ahmedabad, Indore and Raipur
Atul H Mehta –Chairman& MD,
Compuage said “These meets are a superb
platform for effective interaction and
optimism for the road ahead Moving
forward, our strong relationships with
our channel partners will pave the way
for continued success in this important
business segment alongside empowering
them with cloud business opportunities.”
DigitalOcean Launches Managed Databases
DigitalOcean announced the launch of Managed Databases, with PostgreSQL as its first offering The service will allow developers to create fully managed database instances in the cloud quickly and efficiently.DigitalOcean takes care of the setup, maintenance, configuration and security of databases, so developers can remain focused on creating great applications
“Our product development is driven by one vital question: How we empower developers to do more valuable work in less time, with Managed Databases, developers and their teams can focus on creating meaningful applications and sharing them with their communities, without the headache of having to manage the database infrastructure that enables the process We do this all with an intuitive interface, full API support, transparent pricing, feature richness and flexible scalability” said DigitalOcean’s Senior Vice President of Product Shiven Ramji
As one of the company’s first fully-managed offerings, Managed Databases represents another key step in the company’s mission of becoming the Developer Cloud of choice for building modern apps
TSC Launches Cutting-Edge “Print Engine PEX-1000 Series” in India
TSC Auto ID Technology has launched of its innovative Print Engine PEX-1000 Series The latest series offers the Left-hand model (PEX-1100 Series) and the Right-hand model (PEX-1200 Series), to meet comprehensive print requirements
PEX-1000 Series print engine incorporates a robust die-casting structure with a stable media path which ensures outstanding print quality and accuracy This model is specifically designed for integration with various label applicators making it highly compatible It features three different levels
of models that cover 203, 300 and 600 dpi resolutions
The PEX-1000 Series has a powerful peel-off capability which makes it an excellent choice for printing small labels This model has a high-performance speed (up to 18 inches per second) and high connectivity which enhances the usability of the model The rear-side drawer design makes for ease of maintenance and quick replacement
Leveraging the user experience and complex applications across industries, the PEX-1000 Series
is ideal for manufacturing and logistics applications where high speed and mission-critical demand label printing is required
ACT Fibernet unveils new brand identity, enriches customer value
RaamayaACT Fibernet, launched its new brand
identity with the unveiling of the logo and tagline
‘Feel the Advantage’
The new brand identity represents ACT Fibernet’s
differentiated approach towards offering
innova-tive customer centric solutions that will enhance
user experience and provide maximum value
In 2019, ACT Fibernet will expand its products,
service offerings and partnerships across various
categories, namely – ACT Advantage
Entertain-ment, ACT Advantage Gaming, ACT Advantage
Speed, ACT Advantage Service, ACT Advantage
Smart Cities, and ACT Advantage community
ACT Fibernet will partner with content provider
like ZEE 5 and Sony Liv amongst others to
strengthen its content offerings Being the
preferred choice of every gaming enthusiast, ACT
Fibernet is working with popular gaming cafes,
gaming OEMs and gaming publishers to provide
Trang 19What are some of the major
chal-lenges you see for the Indian
market from security point of view?
There are various challenges with which Indian
enterprises are struggling to deal with With
digi-tisation and technology revolution going across
the country, the Indian security market is most
concerned about,
l Fear of state-sponsored and financially
moti-vated attacks
l Need for security across the supply chain
l Fear of corporate espionage, data theft
l The sophistication of cyber-attacks, rise of
cybercrime as a service
l Constant upgradation and keeping abreast
to latest/ next-gen developments & technology,
thereby avoiding technological obsolescence
l Lack of awareness on data protection,
pri-vacy and internal security threats
l Complying with GDPR norms
What will the threat landscape
look like in over the next 12
months?
The threat landscape will definitely going to rise as
the hackers nowadays are much smarter than ever
and this will give a sure shot rise in the number
of cyber-attacks and increase in the cases of cybercrime
What will be the biggest drivers for security spending in 2019?
In past, we have seen many cyber-attacks where companies have paid billions of dollars to hackers
in ransom Many small and medium-size nies must shut their operations after becoming victim to the cyber-attack This will certainly prompt companies to increase their spending in security The other major factors which will con-tribute as a driver for security spending are,
compa-l Internal data thefts
l Proposed Data Protection Bill of India
l Digitisation and streamlining the tion in accordance with the latest technologies
organisa-How do you see India as a market for your solutions?
India has been our biggest contributor in terms
of revenue since our inception Presently, we are
“UNISTAL’S PROTEGENT ANTIVIRUS IS THE WORLD’S ONLY ANTIVIRUS WHICH COMES WITH INBUILT DATA RECOVERY OPTION”
ALOK GUPTAMANAGING DIRECTOR, UNISTAL SYSTEMS PVT
LTD
Indian security market is growing at a rapid pace and it
is going to grow much faster in the years to come SME Channels spoke to Alok Gupta, Managing Director, Unistal
Systems Pvt Ltd to know about his perspective
OUR PRODUCTS ARE DESIGNED TO PREVENT
DATA LEAKAGE AND PROVIDE PROTECTION
AGAINST VARIOUS
more focused on Tier II and Tier III cities as well
as in North East India Our channel partners are lending us great support in expanding our reach
as well as taking our products to masses spread across the length & breadth of the country Our products are designed to prevent data leak-age and provide protection against various types
of cyber threats Also, we are providing solutions for data recovery and activity monitoring, which will have a great prospect for Indian markets in the coming days
What is your focus in the market
- Channel market and CIOs/ CISOs
Unistal believes that the channels are the core of our business, but we are also going ahead with our new products and solutions to target the CIOs and CISOs With data security being a priority for every organization, we want to help the enter-prises in tackling the challenges related to security
& safety of their valuable data
SME CHAT
SME CHANNELS 19
Trang 20Mobiles phones are also part of the cyber space as all these smart devices interact with internet all the time for running vari- ous utilities and games.
CYBER AWARENESS
ANIL CHIPLUNKAR,
LEAD AUDITOR ISO27001 (IRCA
ACCREDITED), CERTIFIED FRAUD
EXAMINER (CFE), CERTIFIED
INFORMATION SECURITY MANAGER
(CISM), CERTIFIED FORENSIC
ACCOUNTING PROFESSIONAL
(CFAP), CERTIFIED ANTI-MONEY
LAUNDERING EXPERT (CAME),
Systems and has been working
in information security space for
corpo-to perform their activities using internet from anywhere in the cyber world and try to remain hidden Today we all use internet services in some
or the other forms including email, on-line cations, games on computers and mobiles, social media sites like Facebook, Twitter, and Instagram etc and for many such functions This necessitates use of internet in a secured, sensible, and safest possible way to avoid the risks posed by malicious users / applications present out there in the cyber space
appli-Mobiles phones are also part of the cyber space
as all these smart devices interact with internet all the time for running various utilities and games
The applications like google map allows the vice provider to know mobile phones location including the path the person is taking to reach the destination The games on mobile phones
ser-do ask for accessing multiple utilities like SMS, Address Book, Camera, WiFi etc but all of the games may not really require these accesses There
is a possibility of a malware being installed by disguising as a game and can misuse these permis-sions The popularity of mobile phones provided much wider attack surface that can be targeted by the malicious users The users of computers and related tools are comparatively more aware about the cyber risks but the mobile phones being used practically by everyone including little children who do not have even a hint of the kind of cyber threats / risks Theft or misplacing the mobile phones pose various security risks such as the information stored on these devices can be mis-used by the person getting hold of these devices
As stated by KnowBe4, “today, only about 3%
of malware tries to exploit an exclusively technical
flaw The other 97% target instead users through Social Engineering”
RISKSFollowing is an indicative list of various risks which are posed via internet / because of intercon-nection of multiple devices to the cyber space i.e internet
l Phishing / Spamming / Vishing / Executive Targeting – Sending unsolicited emails to a large audience and try to steal information or block the email server access by overloading the server by number of emails Similar to emails, SMS or indis-criminate voice calls can also be used for carrying out the malicious activities Advanced techniques
in phishing are used to target specific als and this technique is called spear phishing or executive targeting
individu-l Impersonation – In the cyber space, it is comparatively easy to assume somebody’s iden-tity and project different identity by hiding the original identity of the user This is termed as impersonation and in the cyber world, it becomes challenging to verify the exact identity of a user unless strict controls are implemented
l Social Media Scamming – As the term indicates there can be various types of scams run
by the malicious users using social media The scams can be fake promotional sales, fake lotteries, fake work-from-home schemes, fake recruitment drives etc
l Targeted Malware (Exploits insertion / Bot Harvesters) – These are the applications targeted
to harm specific companies’ / government ments / devices to paralyze the operations of the target
depart-• Credentials theft – Malicious linksshared via email, SMS, WhatsApp can be used to trick the user in giving away the user’s credentials like user ID, password, PIN number etc
l Physical access (such as tailgating) – This
Trang 21SME CHANNELS 21
BE SAFE – SPREAD THE AWARENESS – PROTECT YOURSELF AND THE COMMUNITY FROM THE CYBER RISKS
includes following a legitimate user who has access
to a restricted area with the aim of gaining
unau-thorized access to secured areas
l Shoulder surfing – When operating in public
places or even cyber cafes, there is a possibility of
someone overlooking the user’s shoulder to get
information about the user’s credentials
l Dumpster diving – Is a technique used to
gain information from the dustbin of the
competi-tor as there are number of organization /
depart-ments just throw away old papers, devices without
taking due care
l Social engineering – It is a technique used
for exploiting the weakness in human psychology
or behavior to gain illegitimate access to devices
/ information There are people who are called as
‘social engineers’ and these personnel can use their
skills in either way like to steal / misuse the data /
information or to test the ‘possibility of
exploita-tion’ and advise users / organizations for suitable
preventive measures This is a very effective nique where the focus is not on technological weaknesses but more on human weaknesses
tech-Prevention – key is “be ALERT”
As discussed above, there are many risks present is the cyber space / world and they can be prevented
by being alert, taking proactive care and using technical tools
l Protect devices with known / reputed malware application
anti-l User strong passwords for application and avoid using same credentials across multiple applications
l Do not store user credential on devices including mobile phones
l Do not share the credentials with anyone without any specific need
l Do not post personal information on social media sites unless necessary or the site is trusted because the information shared over internet is
always available on the internet somewhere
l Take utmost care while accessing internet
in public place as well as while communicating information
l Do not join any open forums or reply to messages asking for information / funds without properly verifying the authenticity of the forum / messages
l To protect the availability of critical tion, take periodic backup of this information
informa-l Do not download any applications / games unless verified to be safe (there are various tools available to check the security) and while installing
do provide the access to device functions carefullyThe cyber security can be as strong as the weakest link and in this case the weakest link is ‘human’ (all of us) so it is of utmost important to be a responsible user and follow all the preventive techniques This will enable a safe cyber working experience
Trang 22It is just important to remember that Artificial Intelligence and Machine Learning will soon
be the same tools being leveraged against you, and to plan accordingly.
To manage increasingly distributed and
complex networks, organizations are
adopting artificial intelligence (AI)
and machine learning to automate
tedious and time-consuming activities that
nor-mally require a high degree of human supervision
and intervention To address this transformation
of the security ecosystem, the cybercriminal
com-munity has now clearly begun moving in the same
direction
For many criminal organizations, attack
tech-niques are evaluated not only in terms of their
effectiveness, but in the overhead required to
develop, modify, and implement them As a result,
many of their attack strategies can be interrupted
by addressing the economic model employed
by cybercriminals Strategic changes to people,
processes, and technologies can force some
cyber-criminal organizations to rethink the financial
value of targeting certain organizations One way
that organizations are doing this is by adopting
new technologies and strategies such as machine
learning and automation to take on tedious and
time-consuming activities that normally require a
high degree of human supervision and
interven-tion These newer defensive strategies are likely
to impact cybercriminal strategies, causing them
to shift attack methods and accelerate their own
development efforts In an effort to adapt to the
increased use of machine learning and
automa-tion, we predict that the cybercriminal munity is likely to adopt the following strategies, which the cybersecurity industry as a whole, will need to closely follow
com-1 AI Fuzzing:
Because they target unknown threat vectors, exploiting zero-day vulnerabilities is an especially effective cybercrime tactic Fortunately, they are also rare because of the time and expertise needed
by cyber adversaries to discover and exploit them
The process for doing so involves a technique known as fuzzing
Fuzzing is a sophisticated technique generally used in lab environments by professional threat researchers to discover vulnerabilities in hard-ware and software interfaces and applications
They do this by injecting invalid, unexpected, or semirandom data into an interface or program and then monitoring for events such as crashes, undocumented jumps to debug routines, failing code assertions, and potential memory leaks
Though using fuzzing to discover zero-day nerabilities has, so far, been beyond the scope of most cybercriminals, as AI and machine learning models are applied to this process it will become more efficient and effective As a result, the rarity
vul-of zero-day exploits will change, which in turn will have a significant impact on securing network devices and systems
2 Continual Zero-Days:
While a large library of known exploits exists in the wild, our cyber adversaries are actually only exploiting less than 6% of them However, to be effective, security tools need to be watching for all
of them as there is no way to know which 6% they will use Also as the volume of potential threats continues to grow, performance requirements will continue to escalate as the scope of the potential exploit landscape continues to expand To keep
up, security will need tools to be increasingly more intelligent about how and what they look for
While there are some frameworks like trust environments that may have a chance at defending against this reality, it is fair to say that most people are not prepared for the next genera-tion of threats on the horizon — especially those that AI-based fuzzing techniques will soon begin
zero-to uncover Traditional security approaches, such
as patching or monitoring for known attacks, will become nearly obsolete as there will be little way to anticipate which aspect of a device can be potentially exploited In an environment with the possibility of endless and highly commoditized zero-day attacks, even tools such as sandboxing, which were designed to detect unknown threats, would be quickly overwhelmed