Tarkan Maner Joins Nutanix as Chief Commercial Officer

Executive Brings Over 25 Years of Industry Experience and a Deep Commitment to the Saying “Partners Are Customers”

Nutanix (NASDAQ: NTNX), a leader in enterprise cloud computing, today announced that it has appointed Tarkan Maner as Chief Commercial Officer, where he will lead Nutanix’s global business development and corporate development efforts, with a focus on strategic partnerships, alliances, system integrators, and service providers.

“Nutanix’s DNA is rooted in disruptive innovation on behalf of its customers. I am delighted to partner with Dheeraj and the executive team to accelerate Nutanix’s position as a leader in enterprise cloud computing,” said Maner. “Nutanix has accomplished so much over the past ten years, but there’s so much potential to go even further. I am excited to charge ahead and play a critical role in helping realise Nutanix’s vision of making computing invisible, anywhere.”

Maner’s responsibilities will include leading critical hybrid cloud-focused strategy and product teams including Nutanix’s core virtualisation platform (AHV), software-defined networking, and some of the key hybrid cloud services: End User Computing (Xi Frame), Database-as-a-Service (Era), DR-as-a-Service (Xi Leap), Xi Partner Network (XPN), and Solutions Engineering.

Maner brings more than 25 years of experience as an executive at disruptive technology companies in the IT infrastructure space. Most recently, he served as Chairman and CEO at Nexenta Systems, Inc., leading the organisation from its open-source focus through its acquisition by DataDirect Networks (DDN) in May 2019. Prior to Nexenta, he was the President and CEO at Wyse Technology, one of the virtual desktop computing pioneers acquired by Dell in 2012. He also held executive roles at Dell, CA Technologies, IBM, and Sterling Software. Maner served on the boards of several organisations including Teradici, CloudCheckr, Wheels, and leading non-profit organisations in Silicon Valley.

“Tarkan brings an entrepreneurial mindset and an acute awareness of the computing landscape to lead Nutanix in its second decade,” said Dheeraj Pandey, Chairman, Founder and CEO at Nutanix. “His authentic leadership style, a clear bias for action, and a broad industry network have helped him create high-energy companies, as I’ve observed him from afar. Given his deep sense of commitment to company-building, I look forward to this new partnership to build Nutanix into a hybrid cloud powerhouse.”

Veeam 2020 Technology Predictions

By Dave Russell, Vice President of Enterprise Strategy at Veeam

Throughout 2019, technology has continued to have a transformative impact on businesses and communities. From the first deployments of 5G to businesses getting to grips with how they use artificial intelligence (AI), it’s been another year of rapid progress.

From an IT perspective, we have seen two major trends that will continue in 2020. The first is that on-premises and public cloud will increasingly become equal citizens. Cloud is becoming the new normal model of deployment, with 85% of businessesself-identifying as being predominantly hybrid-cloud or multi-cloud today. Related to this are the issues of cybersecurity and data privacy, which remain the top cloud concerns of IT decision makers. In 2020, cyber threats will increase rather than diminish, so businesses must ensure that 100% of their business-critical data can be recovered.

Here are some of the key technology trends that businesses will look to take advantage of and prepare for in the year ahead.

  1. Container adoption will become more mainstream.

In 2020, container adoption will lead to faster software production through more robust DevOps capabilities and Kubernetes will consolidate its status as the de facto container orchestration platform. The popularity of container adoption or ‘containerization’ is driven by two things: speed and ease. Containers are abstract data types that isolate an application from an operating system. With containers, microservices are packaged with their dependencies and configurations. This makes it faster and easier to develop, ship and deploy services. The trend towards multi cloud means businesses need data to be portable across various clouds — especially the major providers — AWS, Microsoft Azure and Google Cloud. 451 Research projects the market size of application container technologies to reach $4.3 billion by 2022and in 2020 more businesses will view containers as a fundamental part of their IT strategy. 

  • Cloud Data Management will increase data mobility and portability.

Businesses will look to Cloud Data Management to guarantee the availability of data across all storage environments in 2020. Data needs to be fluid in the hybrid and multi cloud landscape, and Cloud Data Management’s capacity to increase data mobility and portability is the reason it has become an industry in and of itself. The 2019 Veeam Cloud Data Management report revealed that organizations pledged to spend an average of $41 millionon deploying Cloud Data Management technologies this year. To meet changing customer expectations, businesses are constantly looking for new methods of making data more portable within their organization. The vision of ‘your data, when you need it, where you need it’ can only be achieved through a robust CDM strategy, so its importance will only grow over the course of next year.

  • Backup success and speed gives way to restore success and speed.

Data availability Service Level Agreements (SLAs) and expectations will rise in the next 12 months. Whereas the threshold for downtime, or any discontinuity of service, will continue to decrease. Consequently, the emphasis of the backup and recovery process has shifted towards the recovery stage. Backup used to be challenging, labor and cost-intensive. Faster networks, backup target devices, as well as improved data capture and automation capabilities have accelerated backup. According to our 2019 Cloud Data Management report, almost one-third (29%)of businesses now continuously back up and replicate high-priority applications. The main concern for businesses now is that 100% of their data is recoverable and that a full recovery is possible within minutes. As well as providing peace of mind when it comes to maintaining data availability, a full complement of backed up data can be used for research, development and testing purposes. This leveraged data helps the business make the most informed decisions on digital transformation and business acceleration strategies.

  • Everything is becoming software-defined.

Businesses will continue to pick and choose the storage technologies and hardware that work best for their organization, but data centre management will become even more about software. Manual provisioning of IT infrastructure is fast-becoming a thing of the past. Infrastructure as Code (IaC) will continue its proliferation into mainstream consciousness. Allowing business to create a blueprint of what infrastructure should do, then deploy it across all storage environments and locations, IaC reduces the time and cost of provisioning infrastructure across multiple sites. Software-defined approaches such as IaC and Cloud-Native — a strategy which natively utilizes services and infrastructure from cloud computing providers — are not all about cost though. Automating replication procedures and leveraging the public cloud offers precision, agility and scalability — enabling organizations to deploy applications with speed and ease. With over three-quarters (77%)of organizations using software-as-a-service (SaaS), a software-defined approach to data management is now relevant to the vast majority of businesses.

  • Organizations will replace, not refresh, when it comes to backup solutions. 

In 2020, the trend towards replacement of backup technologies over augmentation will gather pace. Businesses will prioritize simplicity, flexibility and reliability of their business continuity solutions as the need to accelerate technology deployments becomes even more critical. In 2019, organizations said they had experienced an average of fiveunplanned outages in the last 12 months. Concerns over the ability of legacy vendors to guarantee data Availability are driving businesses towards total replacement of backup and recovery solutions rather than augmentation of additional backup solutions that will be used in conjunction with the legacy tool(s). The drivers away from patching and updating solutions to replacing them completely include maintenance costs, lack of virtualization and cloud capabilities, and shortcomings related to speed of data access and ease of management. Starting afresh gives businesses peace of mind that they have the right solution to meet user demands at all times.

  • All applications will become mission-critical.

The number of applications that businesses classify as mission-critical will rise during 2020 — paving the way to a landscape in which every app is considered a high-priority. Previously, organizations have been prepared to distinguish between mission-critical apps and non-mission-critical apps. As businesses become completely reliant on their digital infrastructure, the ability to make this distinction becomes very difficult. On average, the 2019 Veeam Cloud Data Management report revealed that IT decision makers say their business can tolerate a maximum of two hours’ downtimeof mission-critical apps. But what apps can any enterprise realistically afford to have unavailable for this amount of time? Application downtime costs organizations a total of $20.1 million globally in lost revenue and productivity each year, with lost data from mission-critical apps costing an average of $102,450 per hour. The truth is that every app is critical. 

Driving the Omnichannel Strategy with AI

By Vikram Bhat, Chief Product Officer, Capillary Technologies

The Ecommerce momentum is becoming unstoppable as brands are cashing in on a number of factors such as spike in mobile applications, a new generation of high-spending shoppers, and the availability of faster internet speeds to enable them to offer their customers a shopping experience whenever and wherever they choose. In addition, an omnichannel approach has clearly shaped the retail industry in 2019, a sector largely driving ecommerce sales in the region.

Going omnichannel is tempting for many retailers who have not yet embarked on their digital transformation journey. However, implementing an omnichannel strategy isn’t only about being present on all channels and platforms available. It is about providing a seamless and unified brand experience to customers across channels to enable them to connect with a brand and simplify their shopping experience.

A Google report further proves this is the right approach after the study found that 85 percent of shoppers start their shopping journey on one device, like a laptop for example, and end it on another, say a smartphone, or even a physical store.  

While technology is the key enabler for brands wanting to enhance their omnichannel strategy, Artificial Intelligence is another crucial component that is driving its success. But AI is only a tool and not a standalone solution, so organizations need to understand that while it can be immensely beneficial in providing customer insights, it cannot compensate for a modest or nonexistent omnichannel strategy. In short, AI needs to be a supporting element of a wider omnichannel strategy and not being implemented for the sake of being a hot technology. 

When organizations take this approach, the power of AI can truly be unleashed to boost sales and customer engagement. Let’s take a look at how AI can be applied online as well in brick-and-mortar stores.

  • Unlocking data potential: Imagine the amount of data brands have access to via multiple platforms. AI can help brands to processthis datato identify consumer spending patterns, buying preferences, customer demographics, personal preferences, and so on. 
  • Personalization:The best way AI can help brands is with the power of personalization. It allows brands to communicate with their target audience at the right time, with the right product, the right offer and message, through the right channel. Brands are able to achieve higher response rates, increased customer loyalty, and lower marketing costs
  • Image Search: AI allows consumers to search for products based on images they’ve come across. Shoppers simply take a picture and get matched to similar items on ecommerce websites. A good example is Pinterest who are leveraging this technology by allowing its users to select any item from any photograph online and then throws up similar items through an image recognition software.
  • Enhancing customer service: Chatbots are a popular and invaluable way for brands to offer24/7 customer service support on their ecommerce websites. They simulate human-like conversations with customers and can execute tasks, automate order processing, and can also provide accurate answers to customers about product details, quantities and shipping terms.
  • Generating customer insights Instore: AI deployed in physical store helpscapture, andcorrelatein store customer behaviour data and shopping preferences with digital channels like social, email, and mobile app. These insights can be passed onto the sales associates for cross-selling, up-selling and strengthening the customer engagement directly on the sales floor. 

The use of AI becomes even more powerful when combined across all channels. Organizations that realize its potential will not only drive sales and improve efficiency across platforms, but will also build a strong and loyal clientele in the long-run.

Simplifying 8 Key Authentication Terms

By: Axel Hauer Director EMEA Enterprise Sales, IAMS at HID Global

Industry jargon around authentication is practically inescapable. In today’s threat landscape, there’s certainly justification for keeping these topics front-of-mind and sparking conversation. But when authentication concepts start to get a little tangled, it can be hard to know if you’re speaking the same language as everyone else. Simplifying key terms is important to understand what they really mean, so you’ll see just how complex the world of authentication can be.

1. Strong Authentication

Strong authentication is one of those industry terms that’s been overused in so many contexts, that its significance has been blurred. 

Many people consider strong authentication to be the same as multi-factor authentication (MFA) or two-factor authentication (2FA), but if you examine the European Central Bank’s standards for strong customer authentication, there are a few more hoops to jump through than just having more than one factor:

  • There have to be at least two methods used to authenticate. These two methods should come from these three categories: something only the user knows, something only the user has, or something only the user is.
  • The methods used have to be independent of one another, meaning if one is breached, the others aren’t automatically compromised. One also has to be non-replicable (unable to be duplicated), unable to be stolen through online means, and not reusable.

Here’s a caveat, though: this term, like any term based (however loosely) on codified standards, can be a double-edged sword. Just because you’ve complied with standards doesn’t mean you’ve chosen the most secure or appropriate mix of authentication factors for your organization. Compliance matters, but strategy and thoughtful implementation matter too.

2. Authorization Creep

To understand the problem posed by authorization creep you first need to understand the difference between authentication and authorization. Authentication is when a system determines that you are who you say you are. Authorization is when the system determines what you have the right to do within the given network or application, given your authenticated identity. That’s where things can get tricky.

The problem with authorization creep, also called privilege creep, is that the threat it poses to your organization will typically have nothing to do with the strength of your authentication, but instead is all about your policies, oversight, and the ease of managing your system. The fanciest, most high-tech authentication protocols won’t mean a thing if legitimate users are over-authorized. Pretty creepy, right?

3. Biometrics
In the authentication framework, biometrics are a factor linked to something you are, and they can be incredibly difficult to steal, spoof, or lose. That’s what’s so strong about them. Typically, people think of biometrics as things linked to physical characteristics—like eyes and fingers. They’re something you’re born with, right? Not necessarily. Yes, physical characteristics that you’re born with still account for the largest portion of biometric use cases. But there’s another category: behavioral biometrics. Your voice, gait, your way of typing, and a whole host of other unique characteristics are all a part of this group. These “life measurements” are acquired over a lifetime and may change subtly, all while remaining as unique as a fingerprint.

4. Federation and Single Sign-On

To nail down the differences between these two terms, let’s start by explaining the comparatively simple structure of an SSO authentication environment. Single sign-on allows you to sign on once with a service provider for a range of services, allowing that one authentication event to give you access to a suite of services. There are plenty of services that enable SSO, and the beauty of SSO is how frictionless it is for users. 

Federation works slightly differently, as it isn’t just requesting access from a single service provider. There’s still one sign-on involved on the user’s end, but not on the back end. Instead, federation relies on a trust relationship between multiple service providers, with a single source for that trust. So, the user signs on to the source of the trust relationship (a centralized identity provider, or IDP) with all of the necessary credentials once. Attempts to access federated services will involve re-authentication through that IDP. You won’t be using credentials to access those diverse services—the IDP will be sending them out. Same time savings as SSO, and similar risks if the IDP is breached.

6. Zero Trust

A Zero Trust model says that anything coming onto your network (person, or device) has to have a positive identity that’s verified by the system. Put simply, “Trust never, always verify.” That way, access is restricted to licit users and devices: trusted entities. When hundreds or even thousands of internet-enabled devices are able to come on the network of a large organization, it’s crucial to give them access rights commensurate with what they need from the network—which shouldn’t be much.

So how does a Zero Trust security posture contribute to a safer organization? Basically, it makes sure that what’s on your network belongs there and heads off breaches by unauthorized devices that may not be properly configured. It also addresses vulnerabilities arising from use of your network’s resources by devices that may be communicating remotely over an insecure internet connection. Finally, it keeps users from bringing in their own less-secure devices and inadvertently causing a breach. No one wants to be that guy. With a Zero Trust security model, they wouldn’t get the opportunity.

7. Phishing

Phishing, as you probably know, continues to be one of the most common security scams. Through email (the usual source), text, phone, or even messaging, social media, and productivity apps, crooks attempt to steal user data. Usually, they’ll pose as a legitimate organization and steal a bit of formatting from licit communications from those organizations. The goal is to get people to click a malicious URL, log in to a fake site, or download a virus-ridden attachment.

Because it can be devastatingly successful, cybercriminals have continued to innovate. They all want to build the better phish-trap, which is why there are some new terms associated with this old-school brand of attack, such as: Spear Phishing, Whaling, Clone Phishing.

8. Internet of Things

If you think of a certain talking home speaker system or your smart oven when you think of the Internet of Things (IoT), you’re not alone. Consumer “smart” devices overwhelm the public imagination when it comes to IoT. The surface area of this ecosystem and its vulnerability to breach is enormous. A “headless” device, which has no clear user interface and may even communicate through archaic or unsecured protocols, is an attractive target for crooks. What’s crucial is to have an identity and access management solution that encompasses all of these headless devices (Zero Trust), ensuring that their access to the network is licit, and that no bad actors are hijacking the device to access your network.

The consequences of an IoT breach can be dire, but avoiding breach isn’t necessarily simple or straightforward. A great illustration of this concept is the recent discovery that one popular smart light bulb sold on Amazon was essentially cracking network security wide open for many consumers without their knowledge. This bulb stored wi-fi credentials in plaintext in its firmware and had no security settings whatsoever. Because these devices tend to utilize low-energy chipsets and low-complexity code (code that is sometimes downright archaic), they can be a welcome mat for hackers. Today’s IoT ecosystem is full of mismatched headless or limited UI devices that may be ticking time bombs.

Ooredoo Kuwait Chooses Fortinet to Deliver the Region’s First Secure SD-WAN Managed Service to Enterprise Customers

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced that it has been chosen by Ooredoo Kuwait, a part of Ooredoo Group – a leading international communications company operating across the Middle East, North Africa and Southeast Asia – to deliver the region’s first secure SD-WAN managed service. Fortinet Secure SD-WANwill allow Ooredoo’s existing and new enterprise customers to achieve accelerated connectivity, transport mode independence, and increased application performance while benefiting from tightly knit SD-WAN and advanced security features. Ooredoo Kuwait itself is deploying Fortinet’s Secure SD-WAN across its retail branches and will serve as a reference for customers wishing to follow suit. 

“Ooredoo Kuwait’s broad managed security services rely on several Fortinet solutions, including the Fortinet Secure SD-WAN solution, which significantly reduces onboarding efforts and speeds time to market for the service,” said Abdulaziz AlBabtain, Chief Business Officer at Ooredoo Kuwait. “Our secure SD-WAN managed service is much more than just a new connectivity service for the enterprise WAN edge. It is paving the way for significant benefits for our customers and significant new revenue streams for Ooredoo Kuwait by leveraging our security operations center, clean pipe, secure WiFi, email security, end-point security and advance threat protection.”

As organizations increase the use of business-critical cloud-based applications and infrastructures, they are becoming more attuned to the benefits of extending these tools to remote locations through software-defined wide-area network (SD-WAN)architectures, a network segment now referred to as the WAN Edge. In fact, because the need to provide the services and applications being generated by digital transformation to the WAN Edge is accelerating so rapidly, the global SD-WAN market is projected to reach $4.5 billion and grow at over 40% CAGR by 2022.

“SD-WAN offers accelerated connectivity, cost savings, and increased performance for Software-as-a-Service (SaaS) applications. However, the benefits of SD-WAN cannot be truly realized without security as an integral part of the solution,” said Joe Sarno, International Emerging Vice President at Fortinet.“Without an integrated security solution, organizations are forced to overlay security, creating significant overhead and leaving gaps in protection as security and management systems remain isolated. We’re pleased to work with Ooredoo Kuwait to deliver the region’s first secure SD-WAN managed service and continue our focus of delivering integrated SD-WAN and advanced security to enterprise customers around the world.”

The following Fortinet products underpin Ooredoo Kuwait’s Secure SD-WAN managed service:

  • FortiPortalprovides turnkey, easy-to-deploy customer portals for self-service without having to worry about complex development or maintenance costs
  • FortiSandboxdelivers real-time actionable intelligence through the automation of zero-day, advanced malware detection and response
  • FortiMailis a top-rated secure email gateway that stops volume-based and targeted cyber threats to help secure the dynamic enterprise attack surface, prevent the loss of sensitive data and help maintain compliance with regulations
  • A range of FortiGate Next-Generation Firewallsdeliver both advanced security and SD-WAN services
  • FortiManagerdelivers single-pane-of-glass management for both SD-WAN and security, end-to-end visibility, and multi-tenancy to support many enterprise customers at scale 
  • FortiAnalyzerdelivers centralized reporting, advance analytics and open-programmable interface to integrate with customers’ existing investments and solutions 
  • FortiClientensures that all fabric components – FortiGate, FortiAnalyzer, EMS, Managed AP, Managed Switches, Sandbox – have a unified view of endpoints in order to provide tracking & awareness, compliance enforcement and reporting

Fortinet’s Secure SD-WAN solutioninteroperates as part of a comprehensive security architecture through the Fortinet Security Fabric, producing an integrated end-to-end security solution across the entire attack surface that leverages Security-Driven Networking.

 

R&M Hosts Middle East Launch of Latest Copper and Optical Cabling Solutions in Dubai

R&M CEO Michel Riva visited the UAE and joined top regional executives to officially launch the company’s new Cat. 8.1, Netscale 72 and inteliPhy net solutions in the Middle East

At a premier event, held this week in Dubai, R&M unveiled its new Cat. 8.1, Netscale 72 and inteliPhy net network cabling solutions in the Middle East. The launch was attended by Peter Harradine, President of the Swiss Business Council, Dubai & Northern Emirates as well as several prestigious R&M customers from the region, including the Deputy General Manager and top executives from Istanbul Grand Airport (IGA).

Michel Riva, CEO, R&M group and Nabil Khalil, Executive Vice President, R&M Middle East, Turkey & Africa delivered the evening’s keynotes. These were followed by a detailed presentation of the Netscale 72 and inteliPhy net solutions, provided by Reinhard Burkert, Product Manager Smart Networks, R&M under the theme ‘Driving Digitalization with Smart Networks’. Netscale 72 offers the highest density of FO ports and can be used to create large spine-leaf network architectures in cloud data centers and facilitate fast migration to new network generations, such as the step from 10 Gigabit to 40 or 100 Gigabit capacity. inteliPhy net is R&M’s easy-to-operate DCIM solution for asset, capacity and change management in data centers. The solution attaches importance to a simplified representation and convinces by its intuitive, web-based operation.

“To date, R&M’s fiber optic solutions have represented a perfect balance between high performance, flexible configuration and state-of-the-art port density. With Netscale 72 we have shifted the balance further towards intelligence, monitoring and automation,” said Dr. Thomas Wellinger, Market Manager Data Center, R&M.

Alfred Tharwat, Head of Training & Data Center Consultancy, R&M MEA & Turkey then introduced attendees to the company’s new Cat. 8.1 cabling system with his presentation titled “Next Generation Components for LAN and Data Center”. R&M new cabling solution is designed for data centers and office LANs and supports up to 40 Gigabit/s Ethernet (GbE) – the fastest data transmission rate that local networks with structured copper cabling can achieve today. In line with the specifications of the ISO/IEC and TIA standards, the company guarantees 40GbE performance for 24-meter permanent links and the up to 30-meter channel depending on the patch cords used.

In addition to the product launches, Emrah Bayarçelik, Deputy General Manager, IGA, delivered a compelling testimonial detailing how the largest airport in the world is now also the first globally to be fully digitized with its key security, communication and IT functions based on a network provided by R&M. The Swiss company’s cabling connects the airport’s ICT systems for customs, security staff and the police force, as well as 9,000 surveillance cameras, 3,000 card readers and 5,000 Wi-Fi access points, giving the airport a full-coverage WLAN.

Commenting on the launches, Michel Riva, CEO at R&M said, “We are proud to bring to the Middle East these innovative solutions that represent the pinnacle of technology in their respective cabling domains. 2020 will be a landmark year for the whole region with Dubai hosting the Expo 2020, opening new horizons for the sustainable future of our planet. The Middle East is also one of the most important sales regions for R&M and a focus for our activities in the coming year. We are proud to be among the top three providers of connectivity, exciting our customers in the government, telecom provider and enterprises sectors with next-generation networks.” 

Companies Worldwide Struggling to Better Optimize, Manage and Protect Multi-cloud Compute Infrastructures, According to New Survey

BPI Network Study Finds Multi-Cloud Security Is Top Challenge for Enterprises Globally

A vast majority of enterprises worldwide have adopted multi-cloud strategies to keep pace with the need for digital transformation and IT efficiency, but they face significant challenges in managing the complexities and added requirements of these new application and data delivery infrastructures, according to a global survey conducted by the Business Performance Innovation (BPI) Network, in partnership with A10 Networks.

The new study, entitled “Mapping The Multi-Cloud Enterprise,” finds that improved security, including centralized security and performance management, multi-cloud visibility of threats and attacks, and security automation, is the number one IT challenge facing companies in these new compute environments.

Among key survey findings:

  • Approximately two-thirds of companies have now deployed enterprise applications across two or more public clouds
  • 84 percent expect to increase their reliance on public or private clouds over the next 24 months
  • 35 percent have already moved half or more of their enterprise applications into the cloud
  • Only 11 percent believe their companies have been “highly successful” in realizing the benefits of multi-cloud
  • Improving multi-cloud security is seen as their most critical challenge, followed by a lack of multi-cloud talent and expertise, the need for centralized visibility, and the capacity to more effectively manage application and infrastructure complexity.

 “Multi-cloud is the de facto new standard for today’s software- and data-driven enterprise,” said Dave Murray, head of thought leadership and research for the BPI Network. “However, our study makes clear that IT and business leaders are struggling with how to reassert the same levels of management, security, visibility and control that existed in past IT models. Particularly in security, our respondents are currently assessing and mapping the platforms, solutions and policies they will need to realize the benefits and reduce the risks associated of their multi-cloud environments.”

“The BPI Network survey underscores a critical desire and requirement for companies to reevaluate their security platforms and architectures in light of multi-cloud proliferation,” said Gunter Reiss, vice president of worldwide marketing at A10 Networks. “The rise of 5G-enabled edge clouds is expected to be another driver for multi-cloud adoption. A10 believes enterprises must begin to deploy robust Polynimbus security and application delivery models that advance centralized visibility and management and deliver greater security automation across clouds, networks, applications and data.” 

The study finds that some 38 percent of companies have or will reassess their current relationships with security and load balancer suppliers in light of multi-cloud, with most others still undecided about whether a change in vendors is needed.

Benefits and Drivers of Multi-Cloud

IT and business executives respondents point to a number of benefits and business and technology forces that are driving their move into multi-cloud environments. 

The top-four drivers for multi-cloud:

  • The desire to improve efficiency and cut costs (47 percent)
  • The need to move applications and data closer to users (43 percent)
  • Safeguards against single-vendor cloud failures (32 percent)
  • The desire to access new solutions and technologies (28 percent)

The top-four benefits for multi-cloud:

  • Redundancy and disaster recovery (61 percent)
  • Cost optimization (50 percent) 
  • Performance optimization (47 percent) are also seen as top benefits 
  • Using the best cloud environment for specific workloads (34 percent) 

Security Tops IT To-Do List

Respondents report facing a long list of challenges in managing multi-cloud compute environments, with security at the top of their agenda.

The top-four challenges for multi-cloud:

  • Ensuring security across all clouds, networks, applications and data (63 percent)
  • Acquiring the necessary skills and expertise (37 percent)
  • Dealing with increased management complexity (33 percent)
  • Achieving centralized visibility and management across clouds (33 percent)

The top-four requirements for improving multi-cloud security and performance:

  • Centralized visibility and analytics into security and performance (56 percent)
  • Automated tools to speed response times and reduce costs (54 percent)
  • Centralized management from a single point of control (50 percent)
  • Greater security scale and performance to handle increased traffic (38 percent)

The top-four security-specific solution needs:

  • Centralized authentication (62 percent)
  • Centralized security policies (46 percent)
  • Web application firewalls (40 percent)
  • DDoS protection (33 percent)

Survey Methodology

In partnership with A10 Networks, the BPI Network conducted a global survey of IT professionals and business executives to understand the state of multi-cloud deployments worldwide, including their priorities, intentions and concerns. The study includes responses from 127 participants across North America, Europe, Asia-Pacific, South America, Africa and the Middle East.

Nutanix Reinforces Commitment in Saudi Arabia by Opening New Office and Hiring Resources

Company invests in new office, in addition to hiring resources in order to accelerate business growth

Nutanix (NASDAQ: NTNX), a leader in enterprise cloud computing, announced that it is further investing in Saudi Arabia by opening a new office and hiring new technical and sales resources in order to better support customers and partners. The company has been posting revenue growth, driven in part by the increasing uptake of the company’s market leading hyperconverged infrastructure solutions by enterprises in the Kingdom looking to embrace the power of cloud computing.

Mohammad Abulhouf, Country Manager – Saudi & Bahrain at Nutanix says, “Against the backdrop of Saudi Vision 2030 which outlines the government’s intent on developing the digital economy, digital transformation and cloud computing has become an imperative for enterprises in Saudi. We see a lot of companies making the transition to a multi-cloud environment. In this scenario, Nutanix’s value proposition of modernizing datacentre infrastructure and making clouds invisible is very appealing to customers. Our solutions help enterprises embrace the power of hybrid clouds by eliminating pain points, and enabling them to manage, govern and optimize applications across public and private cloud architectures.”

Over the past year, the company has expanded its channel base and seen growing interest from customers. An example of one of its customer successes is Saudi Arabian Capital Markets Authority (CMA) that partnered with Nutanix to transform its datacentre infrastructure – to improve manageability of its operations, reduce running costs and provide better IT support to internal users.

Nutanix Saudi is very much committed to Saudization and empowering local caliber to drive business. Recently, Nutanix started hiring both male and female Saudi engineers in order to have the right diversity in its workforce.

To further accelerate growth, the company recently signed partnership agreements with two leading system integrators in the Kingdom – International Systems Engineering (ISE) and Advanced Electronics Company (AEC). The partnerships aim to leverage the strengths of Nutanix’s market-leading hyperconverged infrastructure solutions and the strong capabilities that ISE and AEC have in technology implementations.

In terms of channel initiatives, keeping in mind the key role that the channel ecosystem plays in helping drive Nutanix’s growth, the company recently introduced updates to its Channel Charter with the intention of increasing profitability for partners selling the company’s solutions.

Over the past year, Nutanix has brought a number of new products and innovations to market in the cloud space, including the expansion of its multicloud solutions portfolio, introducing cloud native solutions for enterprises and the launch of a new service called Nutanix Xi IoT that enables best practice for edge computing.

In order to educate the market about the latest developments in data center modernization, multi-cloud and automation, the company is hosting its annual .NEXT on Tour with the theme ‘Invisible Clouds, Visible IT’ at the Fairmont Riyadh, Saudi Arabia. The conference will focus on helping enterprises in the Kingdom free themselves from the complexity and cost of legacy IT and embrace the power of cloud.

“We believe that with our increased investment into Saudi Arabia, we are well placed to address the cloud computing needs of enterprises in the Kingdom and further   continue our business growth next year and beyond,” concluded Abulhouf. 

HID Global Completes Acquisition of De La Rue’s Citizen Identity Business

HID Global®, a worldwide leader in trusted identity solutions, today announced that it has completed the acquisition of the international identity solutions business of De La Rue (LSE:DLAR), the world’s largest commercial issuer of banknotes and passports. The De La Rue business will be merged with HID’s citizen identity solutions portfolio, broadening HID Global’s leadership position, extending its capabilities to scale and assemble government-issued citizen IDs, and expanding the value delivered to customers. 

“HID Global and the De La Rue international identity solutions business share the common goal of helping governments fulfill their e-government initiatives today and in the future by converging physical and digital identities to increase efficiency, security and flexibility,” said Stefan Widing, President and CEO, HID Global. “The acquisition sets the stage for HID to leverage the decades-long relationships De La Rue has had as a prime citizen ID supplier providing HID’s innovative solutions to governments seeking to modernize. From making it possible for citizens to use mobile IDs with their smartphones in everyday life to providing travelers with a more secure and convenient passport for border crossing, HID is transforming the citizen experience.” 

Today, HID Global’s citizen identification solutions can be found in sixty percent of all government-issued electronic identity projects around the world.  HID delivers complete, end-to-end system solutions that meet governmental requirements for national IDs, passports, foreign resident IDs, driver licenses, vehicle registration and other programs.

De La Rue’s direct relationships with ministries of the interior, immigration departments, police departments, and numerous other government entities/agencies will enhance HID’s ability to provide customers with a broader suite of offerings that include mobile IDs, automated verification capabilities, and e-passports with advanced physical and electronic security features.

The addition of the De La Rue citizen ID business also extends HID’s capabilities to assemble secure ID documents from end to end in world-class facilities.  It will create new opportunities to apply its design excellence, data analysis services/consultancy, and proven software and systems–including civil registry and vital statistics (CRVS)–to HID’s citizen ID portfolio. 

Kodak Alaris’ IN2 Ecosystem Wins KMWorld Readers’ Choice Award

Readers of KMWorld, a popular business and technology publication focused on document, content and knowledge management, have recognized the Alaris IN2 Ecosystem as the “Best Content Management/Services Solution” in the publication’s inaugural Readers’ Choice Awards. Developed in response to the growing scale and complexity of data, the IN2 Ecosystem provides organizations with an integrated approach to help capture, process, and share information.

“We’re excited to announce the winners of the inaugural KMWorld Readers’ Choice Awards,” said Thomas Hogan, Group Publisher, KMWorld. “With a diverse array of knowledge management products, services, and technologies to consider and the stakes getting higher for information-driven success, it can be challenging to make the right choices. The KMWorld Readers’ Choice Awards list provides a new resource to help make the job of identifying solutions to investigate easier.”

The company recently launched a new wave of network-connected scanning solutions aimed at tackling the most difficult pain points organizations face when onboarding content into line-of-business applications. The Alaris INfuse Smart Connected Scanning Solution integrates directly with enterprise applications and enables customers to carry out tasks in hours which, in the past, may have taken days to complete. INfuse also offers an unprecedented opportunity for channel partners to engage with customers to streamline expensive business processes and quickly grow new revenue streams. The Kodak Scan Station 730EX Plus Scanner is an integrated network scanner that securely automates document capture and allows for fully finished files to be scanned directly into business processes. Like INfuse, the Scan Station is a network-connected solution that sits at the edge of workflows and operates in a wide range of customer environments. It offers embedded Windows 10 IOT Enterprise Operating System and network domain authentication for secure log-in.

Alaris has built on its heritage and expertise in enabling customers to transform data into a powerful competitive advantage, by enhancing its Managed Capture Services proposition. Partners looking to deliver added customer value, deepen customer relationships and expand their business opportunities can now leverage the value of the Alaris’ repair and maintenance and professional service offerings. With the new Alaris Scanner Management Platform, Alaris and its partners can directly monitor scanner operational data, deliver usage reports and manage multi-variate alerts for its customers’ scanners.

“We continue to invest in intelligent solutions that drive business efficiency, growth and profitability for end users,” said Don Lofstrom, President & General Manager, Alaris, a Kodak Alaris business. “Being recognized with a KMWorld Readers’ Choice Award confirms we understand how to deliver value to our customers and partners.”

The complete list of Readers’ Choice Award winners is published in the November edition of KMWorld where it will reach more than 50,000 IT and business professionals. This is the fourth time KMWorld has recognized Kodak Alaris for its innovative solutions and services. The Alaris IN2 Ecosystem was named to KMWorld’s list of Trend-Setting products in 2017 and 2019. Alaris Capture Pro Software received the award in 2018.