Dimension Data Unifies Middle East Operations to Drive ‘Client-First’ Regional Strategy

Mohammed Hejazi has been appointed to lead Dimension Data’s operations in the Middle East as company consolidates Saudi and UAE entities

Dimension Data today announced the restructuring of its operations in the Middle East with the aim of elevating its customer-centric market approach through streamlined decision making, enhanced organisational synergy, and a unified go-to-market strategy. In line with this undertaking, Mohammed Hejazi, who has served in regional sales and leadership positions at the company for nearly a decade, has been appointed to lead the newly consolidated Middle East entity.

Outlining his objectives as the Managing Director for Dimension Data Middle East, Hejazi said, “Saudi Arabia, the UAE and other countries in the Middle East have clearly demonstrated their desire to be global technology pioneers. By merging our team, we are bringing together the expertly qualified technical, sales and support resources that have been driving innovation for some of the region’s largest and most prestigious public and private sector organisations.”

“We have reorganised ourselves with growth and the market needs in mind. This move transforms Dimension Data into a truly client led company that will continue to spearhead the digital transformation of the Middle East through collaborative, co-creation with our customers,” he added.

The company’s strategy in the region will now strongly pivot around five go-to-market areas to deliver intelligent technology and services that are aligned to our clients’ journeys, including Intelligent Infrastructure, Intelligent Workplace, Intelligent Customer Experience, Intelligent Business Applications, and Intelligent Security.

Hejazi reassured customers that Dimension Data will continue to deliver services seamlessly and efficiently through the integration process. “Recent months have highlighted that now more than ever, digital technologies are critical to unlocking business potential. As the market evolves at breakneck pace, we were committed to working together with our clients to enabled them to remain industry vanguards and power their digital futures by using game-changing technologies,” he said.

 

Automation that Matters and Eliminates Errors

Hesham

By: Hesham Elsherif, Principal System Engineer at A10

Operators consider network complexity to be the greatest threat for the next three years, according to a research survey by 451 Research. At 61 percent of respondents, this ranks higher than competition from cloud providers or concerns about the pressure on service margins and lower operating costs.

Greatest Threat for the Next Three Years

  • Network complexity 61%
  • Competition from cloud service providers 49%
  • Inability to adopt agile service delivery models 35%
  • Regulatory constraints on spectrum 29%
  • Inability to lower operating expenses 25%
  • Increased pressure on service margins 25%

This concern was echoed by analyst, Patrick Donegan of HardenStance, from an interview with an A10 customer who pointed to complex and unwieldy manual operations as the primary security challenge for operators scaling out their networks with more 5G devices and elements. For example, “fat finger” errors by operations personnel can cause configuration issues and potential disruption when new devices are brought online. Manual application for security patches is also prone to error or inconsistent updating, leaving network devices vulnerable. With a variety of individuals implementing different configurations at different times along with the growing number of devices, it becomes difficult to compare configurations and patch updates to see if the correct one is in place. The automation of simple tasks and discrete but complex processes are the first steps to better consistency. Automation, even in small steps, can provide big rewards to operators in reducing costs and enabling faster, more secure rollouts of 5G use cases such as fixed wireless access (FWA).

Operators are caught between needing to automate and reduce costs while still managing older, multi-generational and hybrid technologies of 3G, 4G, 5G and fixed broadband. The automation of deployment, configuration, update and upgrade processes can substantially ease the pain of this transition and support operator goals of lower cost, stronger security and better customer experience.

Service providers operating both mobile and fixed networks, such as the one interviewed in the HardenStance brief, are focused on FWA with 5G to improve the volume and quality of their video services, to further enable the convergence of the mobile and fixed infrastructure and to reduce costs. This operator wants to provide consistent services for fixed broadband users, even when connecting via 5G FWA, and to extend broadband coverage to underserved areas such as rural populations.

Globally, the FWA market is surging worldwide with over 100 million households now using fixed wireless access. Overall, the mobile industry sees fixed wireless access with 5G and 4G as providing a cost-efficient way to connect underserved populations. Broadband deployment has been particularly slow in developing and underdeveloped countries where as many as 1 billion families are estimated to be without any fixed broadband access at all. The operators’ opportunity for fixed wireless access services (both 4G and 5G) is huge. 5G for fixed wireless access provides up to 100x more capacity than 4G and eliminates the need to deploy costly fixed wireline or fibre infrastructure, which requires digging trenches, laying cable and securing the right of way.

At A10 Networks we believe a comprehensive set of API scripts that allow operators to automate multiple tasks and simplify complex processes and meet network transition business goals. A10 approach is we only require no more than a handful of API calls to execute many changes, which may require a thousand API calls from other vendors. This greatly simplifies the management of ever-expanding network nodes. Furthermore, clustering functions and licensing options allow for the flexibility to increase capacity across different nodes, regardless of location and without service interruption in just 20 minutes.

The automation of seemingly simple tasks and processes and elastic scalability help optimise investment per site and enable operators to more easily build out mobile edge computing and to converge mobile and fixed technologies while ensuring a uniform subscriber experience.

NetApp Closes Acquisition of Spot

anthony-lyeSpot by NetApp establishes leadership in application-driven infrastructure

NetApp (NASDAQ: NTAP), the leader in cloud data services, today announced that it has completed its acquisition of Spot, a leader in compute management and cost optimization in the public clouds.

Spot by NetApp® delivers application-driven infrastructures (ADIs), cloud infrastructures that use analytics and machine learning to continuously adapt to the needs of applications, to help drive cloud resource optimization in real time, for both compute and storage. ADIs automatically deliver the availability, performance, and capacity that applications need at the lowest cost, accelerating the deployment and innovation of applications. ADIs help application teams shorten development lifecycles and run more applications in their choice of cloud. Customers can save up to 90% of their compute and storage infrastructure expenses, which typically make up 70% of total cloud spending, while maintaining SLAs and SLOs.

“Together, we are extending NetApp’s vision for helping customers unlock the best of cloud,” said Anthony Lye, senior vice president and general manager of NetApp’s Public Cloud Services business unit. “With Spot by NetApp, we will enable customers to get more out of their cloud investment to gain competitive advantage and accelerate their business success.”

“Cloud infrastructure gives application developers the ability to develop and deploy applications faster by providing resources almost instantly at any time,” said Amiram Shachar, CEO and cofounder of Spot. “We are excited to join NetApp in pursuit of the shared vision to help application owners embrace and take advantage of the full power of the cloud.”

Spot by NetApp offers a portfolio of compute and storage services that monitor and analyze the needs of applications and automatically optimize cloud resources to meet those needs. Customers will be able to:

  • Make reliable and greater use of cloud excess compute capacity (aka spot instances) and save up to 90% of compute and storage costs, which typically make up 70% of cloud spend.
  • Use compression, dedup and tiering technology to provide dramatic costs saving, up to 60% less than standard cloud storage
  • Provide full value out of customers’ cloud reserved capacity
  • Integrated, actionable approach to managing cloud spend
  • Continuously monitor, analyze and predict applications’ resource needs.
  • Proactively optimize cloud infrastructure to meet business and application demands.
  • Automatically scale and adapt to deliver optimized capacity and performance.

86% Percent of Public Sector Decision Makers Believe their Organisations’ Productivity Depends on Network and Application Performance

Riverbed® today launched its expanded ‘Rethink Possible: Visibility and Network Performance – The Pillars of Business Success’ Study, focused on the public sector. The study revealed that 89% of IT decision makers (ITDMs) and 82% of business decision makers (BDMs) in the public sector believe productivity is reliant on effective network and application performance. In addition, three-quarters of those surveyed (72% ITDMs and 79% BDMs) agreed that visibility into IT performance is the key to driving business innovation and staff retention.

These and other findings in the study highlight the necessity for public sector organisations to have effective IT infrastructure in order to be successfully productive, innovative and drive their growth. These are key considerations given the critical challenges public sector organisations are facing to maintain infrastructure, policing, health, and political balance in today’s environment.

Poor visibility and outdated systems proving to be a hindrance

Decision makers within the public sector recognise that improved visibility into network and application performance will have a direct, positive impact on their organisations’ development. In fact, over three-quarters of ITDMs (77%) think that having more visibility into their organisation’s systems will help to mitigate risk and ensure productivity. Both of which are essential factors in improving efficiency, driving employee engagement, and developing projects within public sector organisations. However, a clear conflict exists in the public sector between the visibility experienced by the IT teams and business decision makers. More than half of ITDMs (54%) state that they do not have enough visibility into the performance of their networks, applications, or infrastructure, compared to 76% of BDMs who believe IT has a comprehensive overview of applications. This disconnect may be why 75% of public sector leaders surveyed felt frustrated by their current network performance (74% of BDMs and 76% of ITDMs). Ensuring ITDMs and BDMs see eye-to-eye is paramount to helping them recognise the need for new technology that will improve visibility and performance, overcoming this frustration.

Productivity and organisational growth need the right IT infrastructure

As the recent global pandemic has shown, the public sector needs technology that evolves with the increasing demands placed on national services. In fact, over 90% of IT decision makers in the public sector believe future success hinges on their organisations’ ability to innovate and break boundaries. It is therefore encouraging to see that over 85% of both ITDMs (89%) and BDMs (86%) in the public sector believe there should be more investment in technology solutions that enhance overall IT visibility. With more than three quarters (78%) of public sector leaders agreeing that investment in next-generation technology is vital, organisations need to act quickly or they risk not only diminishing productivity levels from employees but also failing to keep up with customer needs and expectations.

Commenting on the research findings, Mena Migally, Senior Director, MENA at Riverbed, said: “Strong IT infrastructure is essential for any business but in the public sector – where ineffective systems cause major disruptions for national government departments, non-departmental public bodies such as the NHS, and service delivery – it is crucial. Especially during these unprecedented times, it is really positive to see that both IT and business decision makers in the public sector recognise the need to invest in the right technology to optimise their IT infrastructure – for both employees in the office and those working remotely – and successfully achieve business growth, now and in the future.

Migally, continued, “At Riverbed, we want to encourage public sector leaders to work together in order to identify and overcome the IT challenges they may be facing, from the lack of visibility, to poor network performance and inefficiencies due to outdated infrastructure. We fundamentally believe that in finding a solution to these problems, ITDMs and BDMs can unlock the capability to evolve their business, drive innovation, boost productivity and ultimately, achieve success in the public sector.”

Rethink Possible: Evolving the Digital Experience

Over 80% of all public sector leaders (87% of ITDMs and 81% of BDMs) agree that organisations must rethink what is possible to gain true success in today’s fast-moving world. Technology has to be the enabler in the process. Riverbed’s portfolio of next-generation solutions is giving customers in the public sector across the globe the visibility, acceleration, optimisation and connectivity that maximizes performance and visibility for networks and applications.

To find out more, download the full ‘Rethink Possible: Visibility and Network Performance – The Pillars of Business Success’ report by visiting here, and join in the conversation here.

Natural New Zealand water source and Executive Property with Equestrian facilities promoted by Courtney & Co.

Courtney & Co., a well-respected Real Estate Company based in Auckland, New Zealand, appoints Coral Coast PR as their official PR agency for the GCC market to promote a very exclusive offering for overseas investors looking to purchase a unique equine property, with a massive natural underground pH9 Mineral Water source in Auckland.

The property is 15 acres set up for horses, both for Equestrian activities and Racing. There is a current income from a tenanted dwelling that accommodates a hair salon, beauty spa, nail spa, Chinese massage and a quality three-bedroom apartment penthouse.

Complementing this fabulous property is a four-bedroom executive family home. Including a pool, games room, garaging and spa. Together with a large barn, out buildings, stable, there are two massive equestrian arenas, training track, horse walker, the grazing paddocks are kept in park like condition.

According to Courtney Wood, CEO of Courtney & CO., this unique offering comes with a large annual volume take, of 100% Natural High Alkaline Mineral Water pH9, that comes from a deep underground sustainable Aquifer providing this incredibly healthy and pure drinking water. This water source is one of only ten natural sources with a bottling consent in the Auckland region.

The naturally energized water sourced at the Riverhead property is super hydrating and offers revitalizing cellular health for humans and animals alike. The property has Auckland Council resource consent to construct a factory, abstract the water, and bottle at source, creating a lucrative export opportunity.

Located three minutes to the North West Motorway, 35 minutes to Auckland CBD and International Airport (Emirates 3 weekly direct flights). The property is perfectly positioned for a large volume water business to be established with possible future land subdivision potential. An 18-hole golf course is on the properties back boundary, with exclusive membership.

Coral Coast PR is proud to be the publicity partner to bring this offering to you. The chance to purchase your own exclusive Natural Water source in New Zealand, with considerable export potential, with all additional attributes, is now.

More information for the property and water business opportunities can be discussed further with the PR team at Coral Coast PR.

Email: shereen@coralcoastpr.com

Mobile: +971 50 769 0087

By: Claude Schuck, Regional Manager, Middle East at Veeam

Over the last few months, we’ve seen many organizations in Saudi Arabia have arranged for employees to work from home. Living in the golden age of Digital Transformation means that we are connected at all times. Consequently, the workplace today has evolved significantly to allow individuals to communicate seamlessly and connect from anywhere through mobile devices, digital tools, cloud services and many more. But what does this mean for organizations and the protection of its data?

With many employees working from home, businesses can expect a huge spike of personal file storing coming in from external sources. This is the perfect opportunity for malicious malware to make their way into servers, potentially corrupting a network of data.

Here are some of the necessary steps businesses should be taking to protect their data and IT architecture:

3 layers in the circle of defense

Businesses need to be aware of how they manage data between cloud and consider tools that will give them an advantage. Today, businesses are continuously backing up and replicating applications and we can only expect this to increase over the next few years as others learn the significance of data that are easily recoverable.

They need to understand the different roles that are needed for consideration when optimizing their systems for backup and replication. This can be easily summed up into the 3 layers of defense in data protection.

  • Perimeter: Firstly, businesses must consider the situation at hand – in this instance, it is remote working or working from home. Protection must be made available for employees to be able to access the cloud and in turn, ensure that these data can be backed up.
  • Mid: Next, businesses need to note that with an increase in the number of people working from home, measures must be put in place so that the systems are still able to run smoothly and efficiently. To counter this, it is highly recommended that servers be optimized for different groups of networks to tap into.
  • Base: It goes without saying that having more people accessing the servers from an external network will also result in an increase in the number of personal files coming in. Businesses need to ensure that they are able to mitigate any malware that might make its way through.

 Data backup and protection

There are many unforeseen circumstances that businesses need to prepare for. Therefore, it is important for them be highly adaptable. Having data that is easily accessible is part of the solution to be ready for remote working. Over the next few years, businesses can expect to see an increase in the number of tools that can allow them to continuously back up their data and perform recovery in a matter of minutes. With these tools, they will be insured with more than just backed up data – they will also have access to insights that will allow them to make informed decisions in their digital transformation journey.

Apart from that, it is also important for businesses to protect their data – as seen with the recent increase of data breach. Cloud Data Management is expected to see an increase in mobility and portability over the next few years. With added security measures, businesses will have access to data easily outside of their workplace with a peace of mind.

Prevention of cyberattacks

One of the essential steps businesses need to take is to minimize administrative access to platforms and servers and increasing rules of operation. Not everyone needs to be able to access all the systems in place.

It is also vital for organizations to educate their employees – often, ransomware finds its way through a system because of an individual’s mistake. It is important for businesses to remind employees on best practices, especially in times when telecommuting is an option for everyone. They need to understand that being connected to a network outside of the company’s system exposes the servers to potential malware.

To sum it all up, businesses in Saudi need to always prepare ahead for any disruption that might have an impact in the way they work. Especially in an era where remote working is a step forward, organizations need to ensure that their systems are ready and fully protected so that their employees can remain efficient and productive.

 

Age of Uncertainty drives the need for a dynamic Startup Studio to build a UAE entrepreneurship ecosystem

Innovating and Scaling in the Age of Uncertainty drives the need for a dynamic Startup Studio

To bring together innovative and forward-thinking visionaries to build an entrepreneurship ecosystem in the UAE that engages not only entrepreneurs but also decision makers and encourages startups to aim higher in terms of visibility and impact on the global stage, Strategi Advisors initiates their startup arm, the Strategi Startup Studio.

With an abundance in Risk Capital in the UAE and startup scalability being the new heaven for investments diversification, Investors at all levels like HNI, family offices, shares and crowd-funding see great potential in technology especially post COVID-19 but need guidance in paring up with an innovator with similar passion and vision.

Mana Sultan Al Suwaidi, Founder of Strategi Startup Studio said, “The need for an evolving Startup Studio was evident way before COVID-19 but the recent crises strongly drive a larger force towards technology infrastructure and efficiency in all areas of business. We believe that successful businesses emerge when great ideas and entrepreneurs come together in a creative and nurturing environment to bring new concepts to life.”

Strategi Startup Studio conceives, launches and scales local and international startups bringing innovative ventures to the city. Supported by Strategi Advisors that already has dedicated experts on board to cultivate a world class tech driven ecosystem, stakeholders can benefit from the team’s local know how, get clarity and be inspired to transform their businesses with the best global talent and capital.

Mana adds, “We hope to build ventures with success stories for unicorns created in the UAE making local, regional and international impact. Experts from Strategi Advisors will represent, support, and protect the growth of the startup business community with world-class expertise in every discipline required to build a market-leading company. Our objective is to collaborate with the most experienced and trusted partners to give direction to high growth startup entrepreneurs by listening, reflecting and guiding them.”

Offering requirements of a conducive Tech Ecosystem with capital, talent, Infrastructure, market potential and supportive regulations, Strategi Startup Studio aims to make Dubai a thriving global startup hub by working in synergy with the local government, incubators and accelerators.

According to Mana, UAE is ready to create its own hub for building businesses and the young generation is ready for this. Coming from a pedigree of Emiratis keen on cultivating the vision and framework of leadership, entrepreneurship and “glocalization”, Mana and his peers aspire to demonstrate an advanced level of ecosystem development, characterized by cross-border venture building capabilities.

In the last four months, Strategi Startup Studio has been in investment discussions with a sovereign fund in Abu Dhabi and other regional venture capital investors to invest USD50 millions for exchange of equity in startups in the next five years.

To investors, UAE’s strategic positioning as a vibrant hub for trade, finance, media, tourism, hospitality, talent and technology offers great potential for investment opportunities across multiple sectors as 60% of humanity exists within a 5-hour flying radius of UAE (China, India, Europe, Russia and North Africa).

While neighbouring countries are competing as conventional economies, UAE is evolving into a knowledge economy offering the perfect platform to connect startups, investors and enablers with relevant resources, accessibility and opportunities and Strategi Startup Studio is the first step towards building an ecosystem that rivals entrepreneurial hubs like the Silicon Valley.

Today more than ever companies need a forward-thinking strategy with new set of tools and frameworks to navigate through uncertainty and stay relevant. Strategi Startup Studio aims to do just that and guide businesses to think and act differently as well as gain leverage as ecosystems gain relevance to impact economies in a meaningful way.

TLS/ SSL Decryption – One of the Main Pillars of Zero Trust Model

Adil Baghir Photo

By: Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks

In a world where everything and everyone is connected to the internet, in one way or another, it’s hard to imagine a network that is truly secure. Data, large amounts of it, are at the centre of it all. With industries from healthcare to the education sector to the government using the internet to provide easy access to data, it is no wonder that cybersecurity teams are always working around the clock to try and come up with better ways of defending these networks and the data they store.

Insider Threats – Need for Security to Evolve from “Castle and Moat” Approach

Modern cyberattacks are not limited to just network intrusion from the outside. Internal threat actors can often be found at the centre of sophisticated attacks.

Initially, we had the concept of zones, perimeters and network segments – placing all the protected assets “inside” the secured network perimeter. However, attackers are always evolving the methods they use; always on the lookout for weak points in your network defences; and coming up with newer ways of infiltrating the perimeter. Keeping up with them is a challenging and ongoing struggle. We also need to realize that the “castle and moat” approach to our network defences was mostly effective against threats that resided outside the network. But what about the threats on the inside? What about modern attacks that work on multiple levels to try to bring your networks down? How do we protect our networks from people who have legitimate access to all its resources? How do we battle the ever-growing and ever-evolving modern cyberattacks? Add to these questions, regulations like GDPR, and the rising fines, and you will see that having your networks attacked and data breached is one of the worst things that can happen to your company. With these issues as the backdrop, we are forced to re-assess and re-think the way we defend our networks, users and data.

Zero Trust Model – a Modern Cybersecurity Approach

Zero Trust attempts to fix the problems, and patch the holes, in our cybersecurity strategies. At the core of it, the Zero Trust model is based on the principal of “trust nobody.” The Zero Trust model dictates that no one in your network should be trusted completely, that access should be restricted as much as possible, and that trust should be seen as yet another vulnerability that can put your network at risk.

Some of the precepts of the Zero Trust model are:

  • Networks need to be redesigned in a way that east-west traffic and access can be restricted.
  • Incident detection and response should be facilitated and improved using comprehensive analytics and automation solutions, as well as centralized management and visibility into the network, data, workloads, users and devices used.
  • Access should be restricted as much as possible, limiting excessive privileges for all users.
  • In multi-vendor networks, all solutions should integrate and work together seamlessly, enabling compliance and unified security. The solutions should also be easy to use so that additional complexity can be removed.

Danger of Security Blind Spots

In recent times, we have witnessed a phenomenal rise in the use of encryption across the internet. Google reports that over 90 percent of the traffic passing through its services is encrypted. The same is true for all the other vendors. This rise has been driven by many factors, including privacy concerns.

However, with encryption comes the creation of a “blind spot” in our network defences as most of the security devices we use are not designed to decrypt and inspect traffic. The Zero Trust model is not immune to this problem as visibility is considered as one of the key elements to its successful implementation. Without complete encrypted traffic visibility, the model will fail, introducing vulnerabilities that can be exploited by both insiders and hackers.

TLS/SSL Decryption – One of the Main Pillars of Zero Trust

A centralized and dedicated decryption solution must be placed at the centre of the Zero Trust model and should be included as one of the essential components your security strategy.

Many security vendors will make claims of the ability to decrypt their own traffic, working independently of a centralized decryption solution. However, this “distributed decryption” approach can introduce problems of its own, including inferior performance and network bottlenecks, and fixing these would require costly upgrades. In a multi-vendor, multidevice security infrastructure, the distributed decryption also forces you to deploy your private keys in multiple locations, creating an unnecessarily large threat surface in your network, which could be subject to exploitation.

Key features of a good TLS/ SSL Decryption Solution

It is important that a dedicated, centralized decryption solution provides full visibility to the enterprise security infrastructure for TLS/SSL traffic. Not only that, but the solution also needs to provide a multi-layered security approach, which then makes it the perfect candidate to be deployed at the centre of a Zero Trust network.

Below are some of the features to look out for when looking to implement a TLS/ SSL Decryption Solution:

  • Full Traffic Visibility – It needs to enable the entire security infrastructure to inspect all traffic in clear-text, at fast speeds, ensuring that no encrypted attacks or data breaches can slip through
  • Ease of Integration – It should be vendor agnostic and easily integrate with security devices already deployed within the network. This drives down additional costs and upgrades.
  • Multi-Layered Security Services – These are additional security services, including URL filtering, application visibility and control, threat intelligence and threat investigation, that help strengthen the security efficacy of the entire enterprise network
  • User Access Control – The product should be able to enforce authentication and authorization policies to restrict unneeded access, log access information and provide the ability to apply different security policies based on user and group IDs.
  • Micro Segmentation – It should facilitate micro-segmentation through its ability to provide granular traffic control, user and group ID-based traffic control, and support for multi-tenancy
  • Securing Cloud Access – SaaS security is an important feature which can be provided by enforcing tenant access control and visibility into user activities.

In conclusion, without a centralized and dedicated TLS/SSL decryption solution, the Zero Trust model is unable to do what it was designed to do – protect our networks, users and data from threats residing inside and outside the network.

 

Kodak Alaris Announces 2020 Partner of the Year Award Winners for EMEA Region

Kodak Alaris has recognised eight partners from the Europe, Africa and Middle East region (EMEA) in its annual Partner of the Year awards. The awards are an integral part of the global information capture leader’s annual Partner Summit, which this year was held as a virtual event due to the COVID-19 pandemic.

The Kodak Alaris Partner Awards acknowledge partners who have demonstrated excellent growth, engagement, innovation, and implementation of customer-centric solutions based on Kodak Alaris’ technology and services portfolio. The finalists and winners were chosen based on their commitment to customers, investment in solutions from Kodak Alaris, year on year revenue and growth trajectory, as well as successful joint wins over the past year.

“Kodak Alaris has a market-leading partner network and I am delighted to formally recognise our highest performing partners who continue to deliver added value to our joint customers, helping them to transform their and their clients’ businesses,” said Gerry Kelliher, Managing Director, EMEA Region, Alaris division of Kodak Alaris. “This year’s winners stand out by delivering the expertise organisations need to automate business processes, to maximise productivity and drive growth in increasingly complex business environments.”

Kodak Alaris Virtual Partner Summit 1

Spigraph, Benelux was named Top Value Added Distributor; the company has collaborated closely with the Kodak Alaris sales team and continued to drive high market share in the region. “To be awarded as Top Value Added Distributor of the year is a great recognition of all our joint efforts to drive profitable growth through the region,” said Koen Beeuwsaert, Vice President Sales, Northern Europe, Spigraph. “The unique ecosystem built between our reseller community, Spigraph and Kodak Alaris is offering tremendous value to end users that are in the middle of their Digital Transformation.”

Having delivered significant revenue growth in FY20, long-standing partner ALOS, one of the leading system providers of capture and Enterprise Content Management solutions in German-speaking countries, secured the Top Performing Partner accolade. The Top Solutions Provider award category which recognises partners’ success in developing solutions capability around Kodak Alaris’ complete hardware, software and services offering, was won by e-das, Germany. “We have been a partner of Kodak Alaris now for over 20 years,” said e-das CEO Helmut Geilenkeuser. “We have a fantastic working relationship and many successful projects. A good relationship is important but not everything. Brilliant products like the scanner range from Kodak Alaris as well as the software and service offerings make the total package complete.”

Pitney Bowes UK scooped the Top Strategic Partner award. The partnership between the two companies is a relatively new one. Pitney Bowes has very quickly integrated Kodak Alaris into its solutions portfolio, rapidly growing the business and is driving new opportunities, particularly within the digital mailroom. In the service category, Restore Digital UK won the 2020 Service Partner ‘Large Deal’ award, and the Service Partner ‘Loyalty’ award was presented to ScanfabrikTM KG.

A Special Award went to Wietec in Israel celebrating its successes over the past 12 months, most notably winning three major tenders to deliver election solutions despite tough competition. And Dubai-based distributor Rookie Ninja, was the first recipient of the Service Partner ‘Start-up’ award which was designed to recognise a partner that has built a successful service business from scratch. “We are proud and humbled to receive this award from Kodak Alaris for our Services,” said Shashank Patel, Managing Director, Rookie Ninja. “Kodak Alaris believes in delivering industry leading service to its clients globally and it feels great to be the torch bearer for the same in this region.”

To learn more about the Kodak Alaris Partner Programme, please click here.

SUNREEF 70: A FUTURE CLASSIC

The Sunreef 70 joins Sunreef Yachts range of exclusive sail catamarans. With outstanding living spaces, Sunreef Yachts’ latest model balances extreme comfort, great performance under sail and advanced technology. A fully-customizable craft, she offers an infinite variety of layouts and décors.

Named Ocean Vibes, the first launch of the Sunreef 70 features a spacious 5 cabin layout, a vast flybridge and a bow terrace accessed directly from the main saloon. Equipped with a hydraulic aft platform, the yacht’s generous stern cockpit uses the yacht’s entire 10.8m beam to provide for supreme comfort and perfect conditions for watersports.

The Sunreef 70 now joins Sunreef Yachts’ sail catamaran range, alongside the Sunreef 50Sunreef 60, and Sunreef 80. For more information about the Sunreef 70, feel free to get in touch with the team.