1 / 52

The 10 Best Performing Cloud solution providers 2018

Insights Success has come up with a list of “The 10 Best Performing Cloud Solution Providers, 2018/19.”<br>

Download Presentation

The 10 Best Performing Cloud solution providers 2018

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. www.insightssuccess.com October 2018 Industry Insight: data center security:controlling possible threats o o S S l lu ut ti i n n o o o o Providers 2018/2019 In Brief The New Way of business-mobility on Cloud Spence Witten Vice President of Global Sales Lunarline Lunarline Delivering the Best-in-class Cybercrime protection to Businesses Globally

  2. Cloud Computing: Shouldering the Pillars of a Digital Revolution rom ones and zeros to analyzing and imitating human behavioral patterns, a machine called F the advantages that a computer delivers, overweighs its drawbacks. The calculated assumptions which consumers make while deciphering the ways in which a computer would ease their work seldom includes the knowledge of its capabilities. The exploration, experimentation, and emancipation of these capabilities would only have been possible through the Internet. Being an endless and unfathomable universe of its own, the internet has given birth to a myriad of disruptive digital innovations. The blockchain technology is an apt example of such innovations. ’computer’ has come a long way, such as, it has become one of our basic needs. This evolution, through its course, has had both, constructive as well as destructive consequences. But, to sum up, One other innovation which was conceived by and for the internet, which is presently the primary component of technologies and platforms like IoT, Artificial Intelligence, Online Gaming, and Social Media apps, is Cloud Computing. The accessibility of networks with high-capacity, inexpensive computers and storage devices and the extensive implementation of hardware virtualization, architecture which is service-oriented, and autonomic and utility computing has aided the growth in cloud computing. The evident transformation of IT and its surrounding aspects has been brought about by cloud computing. As much as it has turned out to be beneficial for the common public, it has also become the boost for organizations with technology as their niche. The cost of installing heavy IT infrastructure can be completely avoided or reduced by utilizing cloud computing. The agility of organizations is effectively enhanced by cloud computing as it aids users’ flexibility, re-provisioning and expansion of technological infrastructure resources. Cloud computing delivers organizations the capability to scale flexibly. This means, it delivers appropriate proportions of IT resources, precisely, computing power, storage, bandwidth etc. when required, and from the right geographical location. Contemporary cloud providers deliver a comprehensive set of policies, technologies

  3. and controls which strengthen the overall security of organizations. This assists in safeguarding data, applications and infrastructure from probable threats. The cloud computing ecosystem is diversified into a myriad of its models, including, public cloud, private cloud, and hybrid cloud. Moreover, cloud services have been categorized into, Infrastructure as a Service, Platform as a Service, Serverless Computing, and Software as a service. The density of organizations offering these models and services has been rising exponentially. With a knack for innovation and its efficient delivery, these organizations are setting benchmarks in the global market. With the purpose of placing the spotlight on such organizations, Insights Success has come up with a list of “The 10 Best Performing Cloud Solution Providers, 2018/19.” In this issue, featuring as our cover story is Lunarline, which is a leading cyber security and privacy provider to the US Federal Government, as well as private industries. Founded in 2004 and headquartered in Arlington, Virginia, Lunarline helps over 500 clients fight back against modern cybercrime. Its portfolio of products, services, managed services, training and certifications, power Solutions Built on Security® for clients in the Intelligence, Defense, Federal Civilian and private Sectors. Lunarline has worked ceaselessly to build exceptional capabilities that solve each piece of the cyber puzzle for Cloud Service Providers (CSPs). From compliance to cloud security architecture & engineering to Managed Security Services that address unique cloud challenges, the organization’s job is to maximize the secure use of cloud services. Other commendable organizations which have been featured in this list are, Aerobyte, which provides Cyber Security Solutions that are scalable in protecting anything to everything in the Internet of Things (IoT); Druva Inc., which is the first and only cloud-first, Data Management-as-a- Service (DMaaS) company, providing new and innovative technology solutions for over 4,000 customers across the globe; Infront Consulting Group, which is a prominent IT consulting firm mainly focusing on implementation and automation of core Microsoft infrastructure; Reltio, which is a native cloud platform that organizes enterprise data for continuous self-learning; UVision Technology is a technology innovation company helping organizations to transform, innovate & grow with smart, scalable and secure solutions; and VCloud Group, which is a global leader, prominently providing cloud computing solutions with no geographical boundaries. Also, make sure to flip through the articles written by our in-house editorial team and CXO standpoints of some of the leading industry experts to have a brief taste of the sector. Bon Appetit! Abhishaj Sajeev

  4. Cover Story Delivering the Best-in-class Cybercrime protection to Businesses Globally 12 18 Cloud Insights: Using AI to Automatically Optimize Cloud costs 30 Leadership Viewpoint: Challenges in Cloud Computing 42 Tech Perspective: Rising Mobile Workforce and its Challenges in the Mobile-Cloud Era:

  5. Articles 25 36 Industry Insight: In Brief: Data Center Security: Controlling Possible Threats The New Way Of Business Mobility on Cloud 28 40 Druva: Pioneering Data Management and Protection Solutions for the Cloud Reltio: Organizing Data for Self-learning Enterprises 23 34 46 Aerobyte: vCloud Group: Infront Consulting Group: Next Generation Cloud Security Virtual Networking Made Simple Helping Enterprises Implement and Automate Microsoft Solutions

  6. Omnichannel Agent and Customer Engagement Solutions Simplify and personalize the customer experience, empower agents and achieve business success with one workspace for all channel interactions, application integrations, and CX reporting.

  7. Editor-in-Chief Pooja M. Bansal Anish Miller Managing Editor Executive Editor Shubham Khampariya Jenny Fernandes Kedar Kulkarni Ishan Mittal Assistant Editors Contributing Editors Bhushan Kadam Visualiser David King Art & Design Director Amol Kamble Associate Designer Sanket Zirpe Co-designer Mayur Koli Art & Picture Editors Paul Jayant Belin Khanna Senior Sales Manager Passi D. Business Development Manager Peter Collins Marketing Manager John Matthew Business Development Executives Steve, Joe, Alan, Vishal Sales Executives David, Kevin, Mark, Manish Technical Head Jacob Smile Technical Specialists Amar, Pratiksha Digital Marketing Manager Marry D’Souza Online Marketing Strategists Alina Sege, Shubham, Anup SME-SMO Executives Prashant Chevale, Uma Dhenge, Gemson, Avdhut Research Analyst Patrick James Circulation Managers Robert, Tanaji Database Management Stella Andrew Technology Consultant David Stokes sales@insightssuccess.com October, 2018 Corporate Ofces: Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone - (614)-602-1754 Email: info@insightssuccess.com For Subscription: www.insightssuccess.com Insights Success Media and Technology Pvt. Ltd. Off. No. 513 & 510, 5th Flr., Rainbow Plaza, Shivar Chowk, Pimple Saudagar, Pune, Maharashtra 411017 Phone - India: +91 7410079881/ 82/ 83/ 84/ 85 Email: info@insightssuccess.in For Subscription: www.insightssuccess.in www.twitter.com/insightssuccess Follow us on : www.facebook.com/insightssuccess/ We are also available on : Copyright © 2018 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success.

  8. Delivering the Best-in-class Cybercrime protection to Businesses Globally We provide Solutions Built on ® Security to help over 500 clients fight back against modern cybercrime.

  9. Cover Story Spence Witten Vice President of Global Sales

  10. T devising contemporary cybercrime protection strategies, ascending global progress, and a knack for innovation, Lunarline, Inc has been recognized as the best performing cloud solution provider. Founded in 2004 and headquartered in Arlington, Virginia, Lunarline helps over 500 clients fight back against modern cybercrime. Its portfolio of products, services, managed services, training and certifications, power Solutions Built on Security® for clients in the Intelligence, Defense, Federal Civilian and private Sectors. understand that they need to bring the same intensity and fearlessness to their own jobs. aking into consideration, the drive to transform the cloud computing ecosystem, We actively balance our client portfolio to ensure that we c over a broad array of clients and industries. Coming to Spence Witten, the Vice President of Lunarline’s Global Sales, comes from a federal service and sales background. Spence is pretty au fait with complex systems and technical requirements, massive Requests for Proposals, budgetary puzzles and procurement cycles that function on geological time. He ceaselessly works to instill that same patient, relentless attention to technical detail needed to support the Government in the sales culture at Lunarline, tempered of course by the need to move at private sector speed. Lunarline has worked ceaselessly to build exceptional capabilities that solve each piece of the cyber puzzle for Cloud Service Providers (CSPs). From compliance to cloud security architecture & engineering to Managed Security Services that address unique cloud challenges, the organization’s job is to maximize the secure use of cloud services. requirements. Lunarline’s Managed Security Services are cloud-focused, helping both CSPs and cloud users take secure advantage of the cloud to optimize performance. Spence also makes sure that the promises extended during the sales process are reasonable, reflected in any ensuing contracts, ingrained in project plans and then kept throughout execution. In short he views sales, not just as a revenue generator, but as a critical element of the project lifecycle, that sets the stage for project success. The Guiding Light of Inspiration Lunarline’s founder and CEO, WaylonKrush is a proven security visionary with a knack for understanding how to apply innovation solutions to achieve real results. He’s relentless in ensuring that the organization stays 100% focused on client service and problem solving. He is also fearless, and has taken enormous risks to push Lunarline into so many different disciplines in cybersecurity. In addition to Lunarline’s compliance work as a Federal Risk and Authorization Management Program (FedRAMP) Third Party Assessment Organization (3PAO), many of its products, services and training solutions have rapidly emerged as market leaders in the cloud space. As an example, the organization provides a suite of cyber intelligence tools and capabilities – such as LunarGroundStation and LunarDownlink – that help CSPs and users of cloud services in proactively addressing emerging cyber threats impacting the cloud. It also provides training and certifications that help cloud engineers improve security posture while cost- effectively meeting compliance Lunarline has found that its CSP clients find its approach to sales extremely valuable. “It is absolutely critical to move at the speed of modern business,” states Spence. “However in the cloud we’re dealing with complex, high-consequence stuff. It pays huge dividends downstream when we use the sales process to come to a mutual understanding of requirements and fully articulate our proposed solution up front during contract negotiations. Then we hit the ground running with an actionable plan that yields enduring results,” he adds. This fearless investment has led Lunarline to possess the capabilities to compete with anyone in any cyber discipline, from training to compliance to consulting to manage security services. His example of relentless client service and fearless investment in the future is reflected in every Lunarline employee – from the most junior to the senior executives – who Reformatory Service models One of Lunarline’s advantages as a

  11. Cover Story small business is essentially infinite flexibility in the services model(s) it can use to meet the needs of its cloud clients. Unlike large businesses wedded to specific approaches, the company can adapt to clients’ budgetary and contractual requirements. Lunarline comprehends that cloud security is complex, high-consequence stuff, with a major impact on organizational success. Thus it uses the sales process the way it’s supposed to be used – to come to a mutual understanding of requirements so that it can assemble the best possible solutions package that meets clients’ specific needs. From traditional consulting type arrangements to staff augmentation to comprehensive outsourced security-as- a-service, Lunarline helps choose the model that best fits clients’ present and projected needs. It also uses a wide- range of pricing models, from subscription and performance-based approaches to various hourly and firm fixed price arrangements, depending on client preference. The organization takes that same high- touch philosophy with it into project execution. As an example, its Managed Security clients have instant, ’round the clock access to an expert in its Security Operations Center to discuss, anything. to offer a broad array of products, managed services, training and certifications, a services-oriented approach remains a core part of the organization’s corporate DNA. Lunarline also holds weekly meetings where senior and middle management to discuss actionable initiatives which it can execute across the company to improve performance for its clients. The Success in achieving these initiatives is tracked through Key Performance Indicators for all personnel, to align performance incentives to its ability to stay focused on solving client challenges. Lunarline has witnessed a significant increase in the number of CSPs and cloud users looking for Managed Security Services to secure the cloud. Its MSS platform helps CSPs lockdown their infrastructure, but it also helps other organizations securely maximize their use of the cloud. The organization helps these organizations develop cloud migration plans and then secure their data through transition and beyond. “While my title is VP of Sales they make me do real work too. We don’t have dedicated sales folks. Everyone who interacts with prospective clients is a recognized cybersecurity expert in a relevant discipline,” Spence expresses. Surpassing Adversities Having been in business since 2004, Lunarline has survived a few ups and downs. It weathered the Great Recession, the US Government shutdown and sequestration and a constantly shifting, disruptive technical landscape. A major lesson learned by the organization is the value of diversification. Thus it actively balances its client portfolio to ensure that it covers a broad array of clients and industries. Another one of the advantages of the MSS model is that it’s extremely easy to tailor service packages to specific requirements. With an underlying subscription model Lunarline flexibly allocates services and/or surge support to requirements as needed. This lets it quickly deploy its diverse products, services and training to address any security challenge. It is absolutely critical to move at the speed of modern business. This protects Lunarline financially, and also ensures that its personnel can draw on technical solutions and best practices from across the Intelligence, Defense, Federal Civilian and private Being Customer Centric Lunarline received its start as a services company. While it has grown

  12. We don't have dedicated sales folks. Everyone who interacts with prospective clients is a recognized cybersecurity expert in a relevant discipline. sectors to provide the best possible solutions to its clients’ cyber challenges. Lunarline invests an enormous amount of time and money in cyber intelligence, to stay on top of emerging threats, and in training, to ensure that its personnel possess the skills necessary to defeat those threats. “The CSP threat landscape is constantly changing as are the tools and techniques necessary to fight back. Our cyber intelligence teams inform our training efforts to keep our frontline engineers and consultants prepared for whatever’s next,” Spence asserts. Lunarline has also learned that cyber professionals are extremely hard to come by. One of the reasons it founded the Lunarline School of Cybersecurity is to provide elite cybersecurity training and certifications to its own personnel, in addition to the thousands of external folks it supports each year. The organization identifies promising cyber professionals from all walks of life and equips them with the skills, certifications and mentoring they need to excel in civilian life. Lunarline has the in-house capabilities to tackle every piece of the cloud security puzzle while equipping clients with the real-time, actionable cyber intelligence they need to stay ahead of emerging threats. Confronting Challenges assurance capabilities and focused penetration testing teams on exhaustively testing access control systems and interfaces to more closely replicate real-world attacks. It has also increased its cyber intelligence collection efforts in this area, to help CSPs stay ahead of emerging threats. An obvious problem for Lunarline is just how challenging it is to find qualified cloud security engineers. “Simply, finding general security people has gotten extremely difficult. It’s an order of magnitude more challenging to find great security folks who also know the cloud. That’s because they don’t exist. You have to train them,” states Spence. According to Lunarline, an immediate challenge facing its federal clients is the need to significantly improve the ability of CSPs to rapidly and sustainably achieve FedRAMP accreditation. “The US Federal Government needs access to secure, compliant cloud services, but CSPs need to clear the demanding security bar set by FedRAMP before the government can access their solutions. In response we’re developing a package of products, services and training that help CSPs get up the FedRAMP curve faster and more effectively,” Spence expresses. Beholding the Future There is no other pure play security company in this space that offers Lunarline’s breadth of products, services, managed services, training and certifications. The organizations goal is to continuously improve its ability to bring these capabilities into unified solutions to clients’ security challenges. As a part of this process it invests heavily in security automation capabilities that automate monitoring, compliance, security testing, cyber intelligence and device hardening. This helps keep Lunarline’s employees focused on proactively driving continuous improvement in its clients’ security posture. On the technical front, Lunarline has also noticed an increasing number of attacks targeting access control and API security. Lunarline understands that CSPs in general are fantastic at securing their infrastructure and Software-as-a-Service offerings, but interfaces between CSPs and users are becoming hacker playgrounds. So Lunarline identifies promising security personnel from within its own ranks, equip them with training and certifications and then pair them with cloud security mentors. This is because the company comprehends that only after completing an apprenticeship program can the personnel become cloud security engineers and consultants. In response the organization has significantly enhanced its software

  13. www.inonic.com

  14. READ IT FIRST SUBSCRIBE T O D A Y Never Miss an Issue Yes, I would like to subscribe to Insights Success Magazine. Global Subscription Date : Name : Address : Telephone : Email : City : State : Zip : Country : Check should be drawn in favor of: INSIGHTS SUCCESS MEDIA TECH LLC CORPORATE OFFICE Insights Success Media Tech LLC 555 Metro Place North, Suite 100, Dublin, OH 43017, United States Phone: (614)-602-1754,(302)-319-9947 Email: info@insightssuccess.com For Subscription: www.insightssuccess.com

  15. Soluti n Providers 2018/2019 Management Company Name Brief Aerobyte provides Cyber Security Solutions which are scalable in protecting anything to everything in the Internet of Things (IoT). Aerobyte Howard Hellman Founder aerobytesecurity.com With a strong belief that ‘Best Practices are Overrated’, Searce assembles a small, highly empowered team of top performing engineers and geeks who work to identify better ways of doing things. Matt Heaton President & CEO Bluehost In searce.com CloudHesive helps businesses reduce their operating costs and increase productivity while improving their cloud security posture by migrating and securing mission-critical workloads on to Amazon Web Service (AWS) and other cloud partners such as Microsoft Azure. CloudHesive cloudhesive.com James H. Walker CEO Druva is the first and only cloud-first, Data Management-as-a- Service (DMaaS) company, providing new and innovative technology solutions for over 4,000 customers worldwide. Druva Inc. druva.com Jaspreet Singh CEO & Founder Infront Consulting Group is a prominent IT consulting firm mainly focusing on implementation and automation of core Microsoft infrastructure. Infront Consulting Group infrontconsulting.com Rory McCaw CEO Spence Witten Vice President Global Sales Lunarline is a leading cyber security and privacy provider to the US Federal Government, as well as private industries. Lunarline lunarline.com The mission at Matrix is to provide businesses a more secure and robust IT experience by providing and managing a suite of cost- effective, enterprise-grade business computing solution options. Matrix Neely Loring President matrix-ibs.com Reltio is a native cloud platform that organizes enterprise data for continuous self-learning. RELTIO reltio.com Manish Sood CEO & Founder Uvision is a technology innovation company helping organizations to transform, innovate and grow with smart, scalable and secure solutions. UVISION TECHNOLOGIES uvision.co Omar Uddin CEO & Founder vCloud Group is a global leader prominently providing cloud computing solutions with no geographical boundaries. Vcloud Group vcloudau.com Trevor Mifsud CEO

  16. UsingAI to Automatically Optimize Cloud costs T Back in the early days of cloud computing, if we would tell you that every business and consumer would eventually be running their entire compute and storage infrastructure digitally, we would sound crazy. But just 17 years later, it seems inevitable that the old world of data centers and on-premise servers will go the way of the physical newspaper and radio. he Birth of Cloud Computing The birth of Spotinst: Rising cloud costs Today, there is a similar revolution beginning in the world of cloud computing. One still in its early stages, but seemingly destined to grow just as quickly as AWS. “Spotinst aims to be the largest provider of cloud infrastructure without running any servers,” says Amiram Shachar, CEO & Founder of Spotinst. The statement is bold on its own, but when you dive a bit deeper, not much bolder a claim than had you asked Andy Jassy the same back in 2003. Indeed, even Andy Jassy, CEO of AWS, didn’t envision this future back in 2000. At the time, Amazon was simply struggling to scale despite hiring a lot of new developers. Jassy, who was Amazon’s Chief of Staff at the time, dove into the problem to discover that the hardware and infrastructural needs simply were not being met fast enough. Jassy set out to speed up this process internally, allowing the internal R&D team to access a pool of common compute and storage resources, making it easier for each to launch their own projects without needing to deal with the underlying infrastructure. Eventually, at a team summit in 2003, they realized this was a need for every other company on the planet, and so AWS was born. Just as Jassy found an internal struggle today, Spotinst began with Shachar’s identification of a problem at his company, then Lycos Global Group. As Director of DevOps, Shachar was pressed with the task of migrating all Lycos’ servers to the cloud, but costs quickly jumped. “Within a couple of months of moving to the cloud, our costs had actually risen dramatically, way beyond any calculator that we used to predict it” continued Shachar. “To the point where we were actually planning to move everything back to on-premise.” Just around that time, Shachar encountered the relatively unused offering at AWS, called Spot Instances. Spot 18 | October 2018

  17. Cloud Insights Amiram Shachar Chief Executive Officer About the CEO Amiram Shachar is CEO & Founder of Spotinst, which leverages excess cloud capacity to help customers save ~80% on cloud costs. Before Spotinst, he was Director of DevOps at Ybrant Media and led the Israeli Defense Forces migration to the cloud. 19 | October 2018

  18. Instances were spare server capacity at AWS, cleverly packaged to enable monetization of these servers. AWS offered these idle servers for massive 90% discounts with one major caveat - they’ll kick you off once a customer wants to pay full price for those servers. ensure that your applications are always running on the most cost-effective servers, given your performance requirements. Instead of exploring the long list of alternatives within and across the different cloud providers, Spotinst will take care of it all under the hood. Today, their platform recognizes any workload that could be run on a cheaper server. Just put those workloads under Spotinst’s control and their algorithms will take care of the rest - those workloads will forever run on the cheapest servers available. All without compromising performance or availability. Shachar smelled opportunity. “By building algorithms that could predict the spare capacity terminations in advance, we could then migrate to another spare server beforehand, saving us 80% on our cloud costs.” After a few months, Shachar and his team were running nearly 75% of their compute power on AWS spare capacity. Just like Jassy back in 2003, the lightbulb eventually went off - there was a far larger opportunity at hand here. The virtual cloud: run code without dealing with cloud providers Using a new Serverless offering, where developers can simply write code without dealing with any of the underlying infrastructure, Spotinst aims to deliver on this promise in a major way. “All you should ever have to do is write code,” says Shachar. “Our algorithms will make sure it is always running on the most cost-effective infrastructure, across all cloud providers, for your performance and availability needs.” In other words, just write the code, and Spotinst will make sure it always runs at the lowest cost possible for your performance needs. “All companies running on cloud struggle to keep costs down,” Shachar says. “But with a long list of priorities including security and maintaining site reliability, DevOps teams often don’t have the time to do all of the work required to optimize cost.” But while Spotinst’s first product was aimed at helping companies reliably leverage spare capacity to reduce costs, Shachar and his co-founders, Liran Polak and Aharon Twizer, had a bigger vision. As Shachar says, “in 10 years, just as everyone is making the shift to cloud today, they will be making the shift to Serverless computing. Only with Spotinst, they’ll be able to also ensure they are paying the best possible price, all without doing anything.” The promise of companies all running a perfectly optimized cloud without ever dealing with the infrastructure seems bold. But as we learned from Jassy and AWS, in another 10-15 years, it may just be an inevitability. Today, managing cloud infrastructure has become just as complex as running on-premises. With a plethora of new AWS, Google, and Azure offerings launching every month, along with an increasingly vast list of companies that build off these offerings, figuring out the balance between cost and performance is a major challenge. But, Shachar envisions a world where you don’t have to. The promise of the virtual cloud The promise of Shachar’s vision is simple at heart - a virtual cloud. Spotinst will leverage machine learning to 20 | October 2018

  19. Soluti n Providers 2018/2019 Aerobyte: Next Generation Cloud Security C mobility, flexibility and cost saving to organizations. The most valuable of all is security, as 94% of businesses have seen improvement in security after switching to the cloud. loud Computing is one of the many trends in IT industry and the reason is its growing popularity in the market. It offers valuable services like Howard: Aerobyte has learnt over the years that less is more. When we started this journey we were offering 6 different products to accomplish what one client server product can do. Thanks to advancements in server and network technologies, we can easily handle large workloads utilizing a handful of servers vs. buying expensive security appliances. What are the company’s strategies to evolve with the volatile trends of the industry? Aerobyte is one of the leading cloud solution providers. Founded in 2010, it has committed itself in helping enterprise organizations solve critical problems by addressing security and compliance concerns. In an Interview with Insights Success, Howard Hellman, the Founder of Aerobyte, shares his experiences on leading the company. Howard: Our solution allows organizations to cut down on the number of security vendors and products that are used to protect organizations through inefficient perimeter defense strategies. Our API integration allows our Cyber Defense Framework to integrate with best of breed products while reducing the number of resources and false positives to manage a secure infrastructure. Below are the highlights from the interview conducted between Howard and Insights Success: Describe the ways in which your cloud solutions are focused on being customer centric. Where does Aerobyte see itself in the long run and/or what are its future goals? Howard: Aerobyte reduces the complexity and trepidation of working with any cloud provider in ensuring their data and communications are protected through software vs. buying expensive appliance upgrades that most cloud providers offer. Our dashboard gives our customers the convenience and analytics to ensure their cloud systems are protected from an attack. Howard: Once our Cyber Defense Framework is deployed globally, Aerobyte literally will take the Wild West out of the World Wide Web. An internet based on trust and complete privacy opens the doors to new innovations of what can be done in the cloud that previously cannot be done. It is our objective to take this solution and add consumers which opens the door to unlimited possibilities on how we conduct business on the web today. Describe the experiences, achievements or lessons learnt that have shaped the journey of the company. 23 | October 2018

  20. ‘‘ ‘‘ We present a different approach to security, one that limits complexity by reducing the number of products and vendors once needed to operate a secure infrastructure. ‘‘ ‘‘ Howard Hellman Founder Considering the escalating number of Cloud Solution providers, how does Aerobyte stand out from its competitors? Resources group where he has been the Vice President Sales and worked as Senior Account executive also. About The Company Howard: Aerobyte drives down the cost and complexity of securing both the cloud and on-premise systems. Our simple approach allows organizations to focus on protecting what matters and who has access to the cloud through our multipoint trust methodology and data flow protection in every direction. Aerobyte’s Cyber Defense Framework helps organizations reduce the cost and complexity of their Security Infrastructure. Its Software Defined Security (SdS) allows organizations to move away from their perimeter defenses and protect data flow, systems and users from the inside out. Its solution is comprised of an encryption communications broker that orchestrates security throughout the enterprise and its edge interconnects which can be deployed on any Server, VM, Workstation, Mobile and IoT device. About the Founder Howard Hellman is the Founder of Aerobyte since 2010. Currently, he is responsible for handling the product development team in the company. Through a combination of technical know-how and an understanding of how technology influences the way the company works, the management team has developed a rare perspective in an industry that all too frequently emphasizes unnecessary features over practical benefits. By tempering the knowledge of what can be done with an appreciation for what should be done, Howard has been able to guide efforts towards the development of products and services that stand apart as unique, innovative, and most of all genuinely useful. Aerobyte helps customers identify areas of the Core Infrastructure and analyze total cost of expenditures that are spent protecting their critical applications and communications. It demonstrates to its clients how and where significant cost savings can be made in order to increase the protection of their organization while saving their money from their security budgets. Before Aerobyte, he has been a part of the business development team of Options Media Group. He has also worked for various enterprises including Scriptlogic, where he worked as account executive and Data 24 | October 2018

  21. Data Center Security: Controlling Possible Threats T 22 percent data center outages in 2015 opposed to 2 percent outages in 2010. Adding to all these, now most of the data centers are re-evaluating their security policies after the recent WannaCry ransomware attack. he rise in cyber-crimes is one of the main causes of Data center outages. As per the recent survey conducted by industry insiders, cyber-crime caused any interruption in traffic across east/west vs north/south, protected vs unprotected one can get to know about a threat. Additionally, vulnerable zones and unprotected traffic need to be monitored for a better result. Firewall rules need to be defined and implemented as per requirements. Additionally, one should allow traffic only after thorough verification and selectively allow communication to ensure maximum protection. The key is to identify, what;s legal and secured and what can be blocked to enhance security. Data center outages cause companies to loss revenue in many ways. However, the costliest loss is service interruption and loss of IT productivity. So, the organizations are now realizing that traditional security is no longer secure enough to secure any data center. A recent study has found that 83 percent of traffic travels east/west within the data center, which stays undetected by the perimeter security. In this environment, when an attacker infiltrates the perimeter firewall, then can jump across the system with ease, extract information and compromise valuable data. Additionally, data centers can fail due to trespassers or a terrorist attack or by natural calamities. One needs to Build a Team with executives who understand how traffic flows within the premises and can access & secure information, take necessary measures to secure important assets along with the implementation of roadblocks for the attackers. Security must move as fast as a data center’s technology adoption and integration. Security Strategy Should Change Alongside the Technology and it should not be treated as an add-on option. Additionally, businesses also should ensure that their virus protection, signatures other protection features are up to date for better protection. So, how can one secure a data center in the best way possible from any kind of cyber threat? Don’t worry we’ve got you covered, with the points below. As the first step, one should Map the Data Center and flag the hackers within the virtual and physical infrastructure. The CSOs and CIOs with a system map of their systems can react to any suspicious activity and take steps to stop data breaches. Being able to visualize different traffic patterns within a network helps to understand threats, that eventually elevates the level of security. Businesses should Identify and Place Controls over high- value assets, which will help to reduce risk. However, older security solutions are completely blind to new threats, new security companies have produced latest solutions that protect data in the virtual world. Access Restriction also needs to be imposed. Every business should thoroughly check a person’s background before giving the access to a prized possession. Access to the main site and the loading bay must be limited, Understanding and measurement of traffic flow within the data center boundary are very important. In the case of 25 | October 2018

  22. Industry Insight additionally, two-factor authentications and fortified interiors with security guards and roving patrols would help to safeguard the employees and the data center. Installing Surveillance Cameras around the data center, alongside removing signs which may provide clues to its function helps to locate an intruder. A buffer zone between the data center and all the entry points will limit unlawful trespassing to a great extent. Additionally, the data center needs to be far away from the main road and it should not have any windows other than administrative purposes for better security. A data center should Check Test Back-Up Systems regularly as prescribed by the manufacturer. It should also ensure to make a list and of Do’s and Don’ts in the event of an attack. Recovery plans and security plans also need to be checked thoroughly. Data centers are always a Soft Target for The Terrorists, as an attack on them can disrupt and damage major business and communication infrastructure. So, security needs to be taken seriously and to do that proactive steps should be taken to limit the impact of a terrorist attack. Trained Security Guards needs to be posted inside a data center and they should be well trained. Security officers must undergo strict site-specific training to monitor surveillance footage. Depending on the size of data center and the number of security cameras multiple security officers may be required on duty. Security officers dedicated to inspecting surveillance footage helps when it comes to securing a data center. Disaster Recovery is very much important, that must be in place. If the data center stops functioning after an attack or natural calamity, it must have a way to restore operations as soon as possible. To be ready for a disaster and to evaluate the disaster recovery plan, it’s necessary to train staffs well and experience simulated disasters. To avoid these obstacles, one needs a fair bit of knowledge of new security systems, solid plans, and comprehensive visibility. The more work a data center can do up front in the above-mentioned areas the better the chances of success with lesser outages. 26 | October 2018

  23. Soluti n Providers 2018/2019 Druva: Pioneering Data Management and Protection Solutions for the Cloud M laptops to data centers to cloud services. The complexity, amount of time and costs for businesses to protect, govern and manage their data lifecycle is increasing dramatically. Druva offers a Software-as-a-Service (SaaS) solution that enables organizations to address these needs in a cost efficient, centralized and easy to manage manner no matter where enterprise data is located. Its solutions include cloud data protection as well as data governance and data intelligence, all from a single, unified platform, and addresses these previously mentioned challenges to secure a leadership position in the market. any companies are overwhelmed from managing growing amounts of data that are being stored in many different areas--from Jaspreet’s market and technology insights have led him to create the first and only cloud-first, Data Management-as-a- Service (DMaaS) company, providing new and innovative technology solutions, as well as forward-thinking economic models for over 4,000 customers worldwide. Prior to starting Druva, Jaspreet has held foundational roles at Veritas. Jaspreet has a B.S. in Computer Science from the Indian Institute of Technology, Guwahati. Jaspreet asks all employees of the company to view their jobs as a means of personal growth and journey. He encourages them to be disciplined and ready to take advantage of any and all opportunities that come along, to lean forward and take charge, to be cautious but not afraid, to be courageous, and be honest and show integrity in all that one says and does. Founded in 2008, the company offers the Druva Cloud Platform, a SaaS solution that provides high performance, direct to cloud, data protection and management across servers, endpoints, cloud SaaS services (e.g. Office 365, Salesforce, Google), and cloud native workloads. In doing so enterprises achieve a centralized way to protect and manage their data, significantly reduce the cost of infrastructure, and increase overall data visibility to mitigate the inherent data risks caused by unmanaged data sprawl. Redefining Innovation Druva focuses on being customer-centric by understanding the pain points its customers face, then developing solutions to solve these problems. “What we’ve learned is that the digital transformation catalyzed by modern technologies, is rapidly changing today’s organizations of all sizes, as a variety of data is being generated continuously and exponentially at a high-volume and incredible velocity,” asserts Jaspreet. An Empowering Leader Jaspreet Singh, the Founder and CEO of Druva, brings a combination of product vision and business experience that has allowed the company to be one of the fastest-growing companies in the $28B data protection and management market. Druva raised nearly $200M in venture funding, with its most recent round of $80M in 2017. Businesses of all sizes are struggling to contain, manage, and protect data amid the complexities and limitations of today’s cloud computing environment. Druva offers easy to use software to manage and protect this data from a single, unified platform, a key to securing its leadership position in the market. 28 | October 2018

  24. ‘‘ ‘‘ We are a global leader in Cloud Data Protection and Management, delivering the industryʼs first data management-as-a-service solution. ‘‘ ‘‘ Jaspreet Singh Founder & CEO “Our first product was modestly successful from a revenue perspective but helped us to see that we were on the right path. It also provided the motivation to always be customer- focused and to continuously look for ways to add value to our customers,” Jaspreet states. “We believe that leveraging the cloud is the only way to manage and protect the vast amounts of data that each organization is responsible for, in a simple, scalable and cost-effective manner,” adds Jaspreet. Testimonials of Proficiency Distinctive Aspects The following reviews are taken from Gartner Peer Insights: Druva has grown its customer base to over 4000 in less than 10 years. The factors that distinguishes the company from the rest of the market includes regularly engaging its customers for feedback and then understanding them and applying them; looking at things from the customers’ perspective and not just the company’s; having empathy and understanding their pain points, motivations and needs of the customers. “Great Product - Great Support: Druva Nailing Cloud Backups” - From a Cloud Architect in the Energy & Utilities industry. “Great Product, Better Service!” - From a Systems Engineer, healthcare industry. Druva’s mission is to be an enduring company, one that lasts through decades. To accomplish this, it focuses on developing a platform which is not just a collection of products but an integrated line that delivers value to its customer network. The company is a SaaS company and adheres to a corporate philosophy that has three key fundamentals: the right mission and culture, the right team, and always offering value to the customer. “Exceeded Expectations” - From a Director of IT, Infrastructure and Operations, manufacturing industry. Outclassing Benchmarks To successfully compete in a fast growing, highly competitive industry, Jaspreet says, “We are a cloud-based software company that must out-innovate our competitors by providing cloud native software that takes full advantage of the benefits of the cloud. 29 | October 2018

  25. Challenges in Challenges in Cloud Computing Cloud Computing T now use the public, private, hybrid, or a mix of cloud computing models. To add some additional complexity to the mix, from the same survey, organizations are already running applications in 3.1 clouds and experimenting with 1.7 more for a total of 4.8 clouds. Assessment Once a complete inventory is created, each application and service can be evaluated to determine if it should be moved to the Cloud. If it is to move, is it best suited for public, private, or hybrid deployment or would it be better to move to a SaaS (Software as a Service) solution. Perhaps it can be decommissioned because there are duplicate services, or it is not being used anymore. It may also be determined that the application or service is not a good target to move. Perhaps it is a legacy application that can’t support more modern infrastructures. 2 he Clouds keep rolling in for enterprises. In the 2018 State of the Cloud Survey performed by RightScale, they found that 96% of respondents Businesses report the key advantages of moving workloads to the Cloud are flexibility, agility, easy access to information, and cost savings. All of these great advantages though come with a price. Just like any migration project, there are a lot of moving pieces and a lot of places a company can run into issues. This is also a good time to start reviewing Cloud service providers that may fit the requirements of your applications, your infrastructure, and your budget. There are really three silos of challenges that both cloud migrations and operating in the Cloud fall into. 1 Planning – Without a well thought out plan, your migration is destined to have a rocky road to operational readiness. 2 Risk Mitigation – It is key to understand all the risks, technology and business, that moving and operating in the Cloud creates. Adding risk mitigation to your initial plan will help ease the transition and make a surprise free environment when services go into production in the Cloud. 3 Governance (Cost and Security) – The ease of use, agility, and elasticity of the Cloud are great benefits, but, they can also lead to runaway costs and a lack of adherence to security best practices. Migration Planning Now that we know what we are moving and where it is moving, we can start to put together a plan. During the migration planning phase workloads are prioritized for the order they are going to be moved, a budget is put together, a business case is made for each workload that is to be moved, and pilot migrations are performed where further design, performance, or reliability testing is needed. Once this stage is complete, a full migration roadmap along with buy in from all the interested parties within the organization should be secured. 3 Migration and Testing Once a workload is migrated, full testing should take place. Testing for performance, load, security, resiliency and reliability should be performed. This is one of the most critical steps. It is much easier to mitigate issues BEFORE going into production. 4 At CCSI we break the migration and operation in the Cloud into 5 key areas. Discovery It is a critical start with a full understanding of what exists in the environment today. All applications, services, and supporting infrastructure should be inventoried and documented. This will ensure nothing gets left behind and that there is a clear understanding of the current steady state infrastructure. 1 Go Live This is probably the shortest but scariest part of the process. After all the hard work, the plug is pulled on the original system and the new system in the Cloud goes live. All support processes should be transitioned to support the new cloud infrastructure and all documentation should be updated. After any issues are 5 30 | October 2018

  26. Leadership Viewpoint About the Author Joe Goldberg is the Senior Cloud Program Manager at CCSI. Over the past 15+ years, Joe has helped companies to design, build out, and optimize their network and data center infrastructure. Joe is also ITIL certified. Joe can be contacted via Twitter handle @DevOps_Dad or by email jgoldberg@ccsinet.com. Joe Goldberg Cloud Program Manager CCSI ironed out, a post migration review is always valuable to see if there are any ways to improve the migration process for the next workload. decisions about which products, services, and payment models deliver the best results and have adequate planning in place - but it’s not easy. Now that your organization is officially “in the Cloud”, the challenge of governance begins. For effective cost control in cloud computing services, it is important to understand the different factors that impact an organization’s cost. Cloud cost management tools should be used to help discover the source of these inefficiencies. Unplanned costs are often due to a lack of visibility of current consumption and past trends. When organizations used on premise infrastructure, they financed it with fixed upfront CAPEX investments. Cloud consumption is an OPEX subscription model based on utilization. A shift in the approach to operational management is now needed. Optimizing for cost is as important as optimizing for performance. About CCSI For more than 40 years, Contemporary Computer Services Inc. (CCSI) mission has been to help solve modern business challenges with technology solutions that optimize cost, reduce risk, simplify operations, and increase performance. CCSI provides the highest quality of service in the industry for the full spectrum of technologies–from containers to PCs, network infrastructures, managed services, IP telephony, cybersecurity, cloud services, SD- WAN, to storage solutions. At CCSI, we believe that technology exists to make our lives - and our businesses - simpler, more productive, secure, and ultimately more profitable. Let’s Grow Together. Learn more at www.ccsinet.com. Cloud-based governance tools can track usage and costs then alert administrators when costs are greater than budgeted. These same tools can be used to ensure corporate security policies are being applied to all workloads and that best practice security frameworks like Center for Internet Security (CIS) are being applied. As cloud services move deeper into the organization, it’s as important as ever that technology leaders make informed 31 | October 2018

  27. Soluti n Providers 2018/2019 Infront Consulting Group: Helping Enterprises Implement and Automate Microsoft Solutions I Infront’s specialized solutions and services. He discusses the company’s core competencies the company’s global market. Give a brief overview of the company, its solutions, and its services. n an interview with Insights Success, Rory McCaw, CEO of Infront Consulting Group Inc. shares his insight regarding the enterprise IT journey and Infrastructure: Windows Server 2003/2008/ 2008R2 through to Windows Server 2016; Public Key Infrastructure (PKI); Active Directory Federation Services (ADFS). Other Technologies: Management Pack Development; Powershell; App-V; Simple Certificate Enrollment Protocol (SCEP); Virtual Desktop Infrastructure (VDI); Operating System Deployment (OSD); Linux; VMware Vsphere; AWS; Blockchain. Infront specializes in data center modernization, automated Windows 10 and O365 deployments as well as cloud solution design, automation, and deployment. Infront has helped enterprise clients move away from legacy applications and infrastructure and adopt a cloud-first strategy. Infront provides managed services for Azure and AWS workloads, and can help enterprises adopt a hybrid model. Infront’s teams of consultants who deliver Enterprise Advisory Services excel in a variety of technologies including: Describe the ways in which your cloud solutions are focused on being customer centric. Client feedback speaks for itself, with a 95.3% customer satisfaction rating that speaks to the project team delivering the results and quality promised. Our priority is to automate wherever possible, which is a key to scalability, manageability and cost efficiency in the cloud. Now that cloud technologies are maturing, Infront’s clients’ concerns are focused on governance, security, compliance, and efficiency—both human and financial. System Center: Operations Manager (SCOM); Service Manager (SCSM); Configuration Manager (SCCM); Orchestrator; (SCOrch); Virtual Machine Manage (VMM); Hyper-V; Application Performance Management (APM); Data Protection Manager (DPM). Clients investing in Azure IaaS are looking for competitive pricing and cost savings from cloud. Infront’s IaaS Automation provides customers the ability to automate the switch to HUB licensing, reserved instances, or the changing of VM types. Azure Self Service Portal is a self-service interface for virtual machine access and provisioning with built-in approvals, providing ease of use and governance. Windows 10 Skillset: Microsoft Security Stack All-Up; Deployment and Servicing (WaaS); Bitlocker and MBAM; Device Guard & Credential Guard; WIP and Hello; SCCM for Clients; MDT and WICD; Surface Products; Win10 and Enterprise Mobility. Describe the experiences, achievements or lessons learnt that have shaped the journey of the company. Cloud: Office 365 (O365); Azure Active Directory (AAD); Enterprise Management Suite (EMS); Operations Management Suite (OMS); Platform as a Service (PaaS); Infrastructure as a Service (IaaS); Azure Site Recovery (ASR). At Infront our core values are Agility, Passion, Ownership, Commitment, and Customer Focus. We love helping our customers increase efficiency and derive greater value from their IT investments through our expertise in automation and productivity. 34 | October 2018

  28. ‘‘ ‘‘ ‘‘ ‘‘ Need Expertise implementing Microsoft technologies? Infront is here to help. Rory McCaw CEO Founded by Rory McCaw in 2001 in Toronto, Infront was originally a Microsoft training company. By 2007, based on demand and reputation, the organization expanded into the United States. Over time, Infront has developed a series of Management Packs to help clients proactively monitor RightFax, Orchestrator, McAfee, and Isilon. What are your company’s strategies to evolve with the volatile trends of the industry? Infront’s strategy is to stay current with the needs of our customers to be able to help them continue to solve business problems with technology. Infront believes that there is a great deal of opportunity in the automation of IT operational tasks, particularly with cloud focused organizations. Moving workload to the cloud is the first step but there is much more automation required to achieve the benefits of cloud. Where does Infront Consulting Group see itself in the long run and/or what are its future goals? Infront is proud to be a highly recognized Microsoft partner and will continue to be while continuing to focus on helping enterprise customers successfully implement and adopt Microsoft cloud technology. Infront will continue to hire experts that are passionate about technology and who are customer focused. As technology changes, so too will the skillsets of the team but the passion for success and solving complex problems will remain. Considering the escalating number of Cloud Solution providers, how does Infront Consulting Group stand out from its competitors? Out of more than 496,000 firms globally, Infront has been a winner or finalist for Microsoft Partner of the Year, six out of the last seven years in a row. Infront can do more in less time with fewer resources than any of our competitors, for example We employ five full time Microsoft MVPs and one Regional Director. Our clients repeatedly tell us we hire smart consultants who are agile, passionate, customer focused, and committed to solving customer problems as they would their own. The Infront consultants take ownership of the situation to get issues resolved. Give us a few testimonials of your clients that accurately highlight Infront Consulting Group’s position in the market. Ÿ Ÿ Ÿ “Before Infront’s Isilon MP, we stood around pointing fingers and wondering where to start; now, we see a potential performance challenge before it is critical and address it.” “We were able to ensure PCI compliance monthly across 4,400+ restaurants while managing the solution centrally and maintaining control of the patching process.” About the CEO Rory McCaw brings both a business and technical background to the company. Rory was a Microsoft Most Valued Professional (MVP) for more than 10 years and was fortunate to meet many other smart, passionate IT professionals, some of whom worked for Infront over the years. The success of the Infront is defined by strong business leadership and a team of incredible, passionate IT professionals that exceed our customer’s expectations. 35 | October 2018

  29. The New The New The New Way Of Business- Way Of Business- Way Of Business- Mobility on Mobility on Cloud Cloud Cloud Mobility on 36 | October 2018

  30. In Brief T he radical change in the innovative technology, is changing the basics of the enterprises function. The way of the businesses today is very much affected by the convergence of enterprise mobility with Cloud Computing, Big Data Analytics and Social Media. The mantra for a successful business today is to observe and adopt the way employees, partners and customers connect and energetically engage in fulfilling business objectives and attaining the enterprise goals in record time. This is the reason, that the enterprises of today have to follow the current trends in the real time. There is one more paradigm shift the IT industry is observing, and that is the entrance of Enterprise Mobility in the business. With the use of it now critical business data, complex analytics and reports are getting available to the decision makers and executives in no time. The vast acceptance of the Mobile Phones and Tablets burgeon the businesses. With anytime-anywhere access to the business data for swift decision making and improved customer service, is only getting possible with the use of Enterprise Mobile Device Management (MDM). In this way Mobility on Cloud is helping SME’s to get benefited by the technological advances. Approximately, 70% of the North American workforce is now mobile, cloud-based environments require a transparent mobile policy management strategy. As is observed, more and more data of the companies, nowadays is residing on mobile devices and is distributed on off-site servers, protecting that data is becoming a mission-critical priority. That is the reason that security concerned enterprises are more concentrating on the three critical mobility factors as they evaluate and deploy cloud computing. The three important factors are: Easy access to cloud-based data and applications from anywhere at any time The availability of the flexibility of the mobile workforce is only possible with the enablement of easy access to the cloud-based data and applications from anywhere at any time. The workers today have to travel from one place to another switching between various public, private, wired and wireless networks in order to get access to the corporate applications. Mobile workers have to manually select and connect to the best available network in the given location because of this. This creates a confusion in between the workers what network to select, what policies to apply and etc. just because of the connectivity process is left on the end-users. This whole process is the reason of less productivity on the part of the mobile workers. Unnecessary Access Costs Wi-Fi and 3G like technologies are getting used to access cloud-based data and applications by the mobile workers today, from anywhere, on the road, from a hotel or a home office. This is becoming a reason of extra cost, when you are supposed to gain from the cloud computing environment. Most of the time this cost becomes unnecessary, like paying for LAN or Wi-Fi fees when a mobile worker is in an area covered by his paid 3G subscription, using 3G when roaming internationally or using 3G when a free or low-cost Wi-Fi or LAN option is available. Security Concern Today, many enterprises are investing on endpoint security solutions and corporate VPNs, data compromise is still a big threat for enterprises because of a variety of threats that stem from network bridging, visits to malicious Web sites, download of malicious software, and use of open and unencrypted networks. The process of connecting to wired and wireless networks is a manual, user-driven process makes the risk high. Despite these high risks, enterprises can maintain itself against these risks with the Mobile Policy Management (MPM): The critical mobility factors of cost control, security and end-user connectivity for cloud-based enterprises, comes under a term, ‘Mobile Policy Management (MPM)’. MPM adds to the overall return on investment of cloud-based initiatives through reduced costs and improved security. 37 | October 2018

  31. MPM helps enterprises to: Pre-define network prioritization policies MPM helps IT to pre-define network prioritization policies and assign specific mobile policies to a given network for cloud and non-cloud data and application access. By automating network selection and mobile access policies, MPM boosts the mobile workforce productivity. Additionally, MPM helps IT to pre-define network selection rules and assign mobile policies to each type of network. MPM solution automatically selects the best available network as defined by IT, connects the user and applies the relevant mobile policies, while the mobile workers roam around. This gives the worker a remote access and connectivity transparent to end-users, saving their valuable time when accessing cloud and non-cloud data and applications. Enables to cost-optimizing network selection MPM enables an option of ‘cost-optimizing network selection’ to reduce the cost of mobile data usage by cost- optimizing network selection. Leaving network selection up to the end-user can drive data costs far over budget and create significant cost liabilities, for the enterprises. For an instantance, a mobile worker with an unlimited 3G subscription should avoid connecting to, paying for and expensing hotel Wi-Fi when in an area covered by a 3G local provider. For the enterprises benefit, MPM platform avoids unbudgeted data costs by helping IT to define and enforce a network white list, preventing users from adding unsanctioned laptop communications options to their mobile Pcs. Avoids common Data-Security Threats The data security threats occur only because of the rogue access points or networks that are in place to lure mobile workers onto them in order for hackers to gain access to corporate data like public Wi-Fi access points in airports labeled “free Wi-Fi” or rogue Wi-Fi placed in proximity to corporate offices. Though there are security solutions working for the same, but of no use. When a mobile worker is working and visiting various places an MPM platform enables IT to dynamically automate and enforce network-specific security policies. Enterprises who are deploying cloud computing are influencing Mobile Policy Management to gain organization- wide visibility and control over their mobile workforce. 38 | October 2018

  32. Soluti n Providers 2018/2019 Reltio: Organizing Data for Self-learning Enterprises I companies in the digital economy are leading the industry with new revenue models and better, personalized customer experience. Reltio, a privately held company headquartered in Redwood Shores, California with the mission to help enterprise users ‘Be Right Faster’ calls them self-learning enterprises. internal, external, social and third-party sources. Companies can correlate various types of data, connect transactions, omnichannel interactions, master data, and reference data to create a complete picture of customers, products, suppliers or employees that help them make the right decisions, faster. It’s not just about collecting large volumes of data in data lakes; it’s about organizing it in a form that can be used for decision management. n today’s digital economy, the most successful companies know how to harness their data and learn from it. Be it Google, Netflix, or Amazon, successful Unify data sets to deliver personalized views Reltio helps create a consistent single-source-of-truth of data across applications, systems, and functional groups. Each user of data needs the information in the context of their business role and objective. Reltio delivers data-driven applications personalized and contextual to sales, marketing, customer service, field service, compliance, and call centers groups with data provided from a single source of truth. What sets these enterprises apart from others is how they have adopted the use of data to improve operations and business outcomes. A self-learning enterprise builds a holistic data strategy and is data-driven in all aspects of their business. Reltio Cloud, a data organization solution created by Reltio, is enabling enterprises to leverage data to its fullest potential and start a self-learning journey. Reltio Cloud, developed natively in the cloud, organizes enterprise data for continuous self-learning. With Reltio, businesses can now manage data like leading cloud companies, leveraging continuous data organization and recommended actions to measure and improve their operations. Reltio organizes data from all sources and formats, creating a unified data set with unlimited personalized views for users across sales, marketing, and compliance. With machine learning, Reltio then recommends actions, and finally measures and correlates the impact on the business. Infuse analytics into every business process Self-learning enterprises bring together all data they need for analytics and machine learning in one place, accessible in real-time. Reliable data from interactions, transactions, master profiles, third-party subscriptions, public and social media sources is consolidated for a more in-depth analytics. Reltio Cloud enables that seamlessly. Analytics running on a reliable data foundation ensures organizations can make better and informed decisions. Continuously learn about customers, products and their relationships Self-learning enterprises correlate and measure insights and recommendations with actual outcomes through a closed- loop cycle and keep improving. Bringing together analytics and operational execution helps with continuous measurement of results compared with projections, and identifying areas of improvement. Self-learning enterprises continually learn about customers, suppliers, and products. With improved knowledge about customer behaviors and preferences, they offer increasingly relevant products and services. Reltio Cloud helps enterprises to achieve the following: Make data the heart of every decision Self-learning enterprises are data-driven. Reltio enables enterprises to leverage data as a competitive advantage and use it for better customer experience as well as for regulatory compliance such as GDPR. Reltio helps enterprises design the right product for the right customer and offer it at the right time via the communication channel of their choice. Organize data of all types at unlimited scale Reltio Cloud helps collect and organize data from all 40 | October 2018

  33. ‘‘ ‘‘ ‘‘ ‘‘ Be right faster with the leading cloud master data management platform. Manish Sood CEO & Founder This self-learning cycle empowers companies to put data at the heart of every decision, build analytics into operational business processes and continuously learn about customers, products and their relationships. Leading Global 2000 and companies of all sizes and industries rely on Reltio to become Self-Learning Enterprises. Global Recognition Today, the Reltio platform is aggressively taking market share from legacy incumbents. Reltio’s innovative vision has delivered a Self-Learning Data Platform to enterprises, helping them solve their most complex business problems and enabling digital transformation across industries. Reltio counts as customers 8 of the top 10 pharmaceutical companies in the world, 2 of the top 10 global technology companies, 2 of the top 10 global cosmetics companies and one of the largest casualty and property insurers in the U.S. A Reformatory Leader Reltio was founded by Manish Sood, an entrepreneur with a passion for innovation. He previously co-authored the patent that revolutionized Master Data Management (MDM) through a global business identifier and served as the primary architect of some of the most widely used data management solutions in use by Fortune 100 companies today. The industry has taken notice of Reltio’s innovations and fast company growth. The company ranked in the Inc. 5000 list of America’s fastest-growing private companies two years in a row. Recently, it was also named a leader for the second time by Forrester Research in its Machine Learning Data Catalogs Wave. Technology channel news leader, CRN, named Reltio a Top 20 Coolest Cloud Software Vendor of 2018. Manish was previously part of the team that introduced a leading Master Data Management platform in the market. But despite that success and the maturation of a $1B+ software and services market for MDM, several factors aligned to form an opportunity to transform the industry. For the last three years, top data news publication, Database Trends & Applications has featured Reltio in its DBTA 100, a list of the companies that matter most in data. Additionally, Reltio has been ranked #1 in Fortune’s Best Small & Medium Companies to Work For, and ranked among the publication’s Top 30 Best Workplaces in Technology. Forbes has also recognized the company for its excellent workplace culture, naming Reltio one of the Best Big Data Companies to Work For in 2018, as well as one of the Best Cloud Companies to Work For. First, from a technological evolution perspective, the commercial availability of big data technologies and elastic cloud computing showed how traditional heavyweight, on- premise, ERP-class data management was inefficient and costly. Second, the time-to-value did not align with the expectations of frontline business users, who in their frustration were pouring billions of dollars of their own into self-service ad-hoc business intelligence or analytics tools. With this perspective and a passion for change, Manish founded Reltio in 2011. And within a few years of the formal product launch, Reltio became a leader in the data management space. Top technology industry analyst form, Forrester Research, named Reltio a leader and “most visionary” in its Forrester Wave on Master Data Management. 41 | October 2018

  34. Rising Mobile Workforce and its Challenges in the Mobile-Cloud Era: Data & Endpoint Management M enterprises around the world. In turn, enterprise IT departments are facing new management and security challenges as the amount of business data soars and the number of endpoints explodes. The question that is doing the rounds is what IT teams need to consider to manage and secure their businesses in this new era. obility and cloud computing are rapidly becoming the norm for Industry analysts predict deep penetration of enterprise mobility by the year 2020. IDC, for instance, forecasts Mathivanan V Vice President ManageEngine 42 | October 2018

  35. Tech Perspective that mobile workers will account for almost 75 percent of the total workforce in the U.S. Meanwhile, Strategy Analytics projects that the global mobile workforce will reach 1.75 billion users and account for 42 percent of the global workforce overall. More troubling, the typical end user has little knowledge of those threats or their ramifications. The result is more users are more likely to leak enterprise data by using compromised websites and rogue online services. The CVE listed 14,712 cybersecurity vulnerabilities for 2017 and has already listed 2,848 for the first two months of 2018. In response, vendors large and small are releasing patches on a daily basis. Enterprise IT teams clearly need to focus on endpoint security management to ensure business success in the mobile-cloud era. necessary mobile device management software before they are given to end users. Devices that are not appropriately managed are security risks, so no business application should be installed or run on them. Related to the day-one management challenge is updating endpoints that are on the go, anytime and anywhere. IT teams must be able to install critical patches while employees are traveling, commuting, or otherwise offsite. The economic perspective is just as bright as a button. The global enterprise mobility market will be worth as much as $140 billion, predicts the National Association of Software and Services Companies. And the investments are paying off. To date, 84 percent of all companies who consider themselves on the cutting edge of mobility report an increase in overall productivity as a direct result of incorporating mobile apps into their business, according to a survey by AppsFreedom. Data leakage presents yet another security challenge for IT teams to overcome. Data leakage can happen with or without the users’ knowledge. For instance, users may knowingly copy business data to a USB device or upload it to a cloud storage service. They may also unknowingly expose that data to a public cloud service when using third-party apps such as document viewers and predictive keyboard apps. Such apps may compromise user IDs and passwords, account numbers, and other sensitive enterprise data by exposing it to public cloud services. Endpoint security challenges Keeping endpoints up to date with the latest versions of their OSes and applications has become a full-time job, one that is getting harder to perform in the mobile enterprise. A growing challenge is the diversity of endpoint operating systems that must be managed, including Android, iOS, MacOS, Windows, Linux, and Chrome OS. For each, the IT team must learn that OS along with its corresponding patching technique. Likewise, applications acquired from the various app stores are managed with different techniques that must be learned and mastered so that the team can secure the endpoints. Likewise, enterprises are expected to continue relentlessly adopting cloud technologies. By 2020, Gartner forecasts the public cloud services market will reach $383 billion. This includes spending on cloud business process services, cloud application infrastructure services, cloud application services, cloud management and security services, cloud system infrastructure services, and of course, cloud advertising. When a user’s device is lost or stolen, the IT team must be able to track and recover the device or wipe the data if the device isn’t recovered. To maintain the user’s privacy, however, the IT team can not continuously track the location of the user’s device. The flip side of increasing enterprise mobility and cloud usage is the increasing risk to enterprise security. Today, most users have at least two endpoints – a laptop and mobile device – and 80 percent of network devices are be endpoints that are constantly connected to the internet and exposed to its threats such as Meltdown, Spectre, Wannacry, and Petya. Another challenge is managing the endpoints from day one, especially mobile devices. While it’s been relatively easy for IT admins to install agent software on desktops and laptops, smart phones and other mobile devices make life harder for the admins because the devices are rarely if ever connected to the corporate network. Consequently, devices must be provisioned with the BYOD presents another privacy vs security challenge: When users use their own devices for business purposes, privacy needs to be maintained. Photos, contacts, and other personal data should not be 43 | October 2018

  36. managed by company’s mobile device management app. On the other hand, security needs to be maintained, too. To that end, the IT team should create a container on the user’s personal device – a secure, managed area that isolates business email, CRM, and other enterprise apps and data from the rest of user’s personal apps/data. soon as possible rather wait until after hours or weekends, which can leave systems unnecessarily vulnerable. Meanwhile, the internet of things (IoT) will introduce many organizations to a new breed of endpoints and connected devices. Unlike their iOS- and Android- powered predecessors, IoT devices will be running many different OSes and applications, all of which may be vulnerable yet must be managed and secured. To establish strong endpoint security and prevent unwanted attacks, IT teams must apply strict security policies on their endpoints. Laptops, for instance, should always run a firewall, prevent the creation of unwanted network shares, and encrypt data via BitLocker or FileVault. Such security policies can protect enterprises from the security risks posed by mobility. Finally, most business applications are moving to the cloud and accessed via browser, effectively making the browser an endpoint. That means to defend against attacks, IT teams need to manage browsers and perform all security operations for them just as if they were desktops, laptops, or any other device. Predicting the development of data and endpoint management Going forward, machine learning and AI will help make data and endpoint management a proactive, rather than a reactive process. For instance, these technologies could prevent data theft by detecting anomalies such as unusual login activities or an unusually large number of documents being uploaded to the cloud. They could analyze the root cause of patch deployment failures and suggest fixes. They could also detect system idle times – during lunch hours, for instance – to deploy patches as As organizations continue to adopt mobility and the cloud, they must also adopt the practices necessary to support this new reality. Data and endpoint security and management are priority one in IT departments. For the vast majority of companies around the world, their future success depends on recognizing and committing to that priority. 44 | October 2018

  37. Soluti n Providers 2018/2019 vCloud Group: Virtual Networking Made Simple T cloud technology gives them the power to streamline their operations, the flexibility to access data at any time and place, and the freedom to break free of the traditional limitations of business communications. leading internal R&D developments, and proactive support at competitive prices, the company has leveled the playing field for businesses of all sizes. he last few years have been marked by a phenomenal increase in the adoption of cloud computing. More organizations are realizing that This means that many traditional limitations no longer apply; their clients have access to technology that is otherwise solely within the reach of large enterprises. These three factors are supported by vCloud Group’s software, which is based on VMware. The industry’s top engineers ensure peak performance and high speed through an advanced network that allows clients to access their resources instantly from any device and any location. This potent trifecta of power, flexibility, and freedom is at the center of every solution that Melbourne-based cloud computing specialist, vCloud Group creates for its clients. A Strong Foundation The rise of cloud computing as the preferred solution for business has fueled a corresponding surge in the number of cloud solution providers. In this increasingly crowded and competitive environment, vCloud Group sets itself apart with a three-pronged foundation to client satisfaction. The first of these is an unwavering commitment to providing a completely integrated solution. vCloud Group does not outsource any of its services – its clients can oversee, manage, and modify their cloud infrastructure through a single point of contact. This simplified philosophy improves transparency and enables every client to make better business decisions. Meeting Challenges Head-on As is the case with any technology in the first stages of implementation, the cloud computing world is still susceptible to significant paradigm shifts. This volatility has the potential to wreak havoc on providers that do not have a strategy to dampen the effects of such changes. vCloud Group does, and central to the company’s efforts is its Research & Development department. In-house R&D allows vCloud Group to internalize technological progress in a way that its competitors cannot. It gives them the foresight to anticipate shifts and adjust their platform and strategy to align with the projected changes. For their clients, this translates to uninterrupted connectivity, seamless workflow, and access to the most advanced and effective cloud technology solutions before any of their competitors. The second prong of vCloud Group’s service strategy is their comprehensive support framework. Apart from the standard phone, web, and email help options, clients can also allow remote access to specialists using any device through Windows, MacOS, Linux, Android, iOS, ChromeOS, or BlackBerry operating systems. vCloud Group’s third prong is perhaps its most powerful – pricing. By providing their advanced expertise, industry- vCloud Group is no longer just another cloud services provider. The company has evolved to be at the forefront of IT technology, shaping the future of the industry, and paving the way that others will follow for years. 46 | October 2018

  38. ‘‘ ‘‘ ‘‘ ‘‘ Providing a revolutionary cloud platform combined with excellent customer service. Trevor Mifsud Founder & CEO Proactive Management Strong and informed leadership is critical to any industry- leading company. Charting the company’s groundbreaking course is vCloud Group’s founder and CEO, Trevor Mifsud. Molding the Future Few people doubt, that cloud IT services are the future of computing, particularly in the world of business. While vCloud Group has already established itself as one of the most innovative and reliable players in the industry, Trevor’s leadership ensures that complacency does not set in. He places extraordinary emphasis on the R&D aspect of their abilities, and this has already proven to be invaluable. An accomplished computer systems engineer, Trevor has spent almost three decades in the IT industry. His leadership extends beyond vCloud Group; he is also the founder of managed services provider, Associated Computer Engineers (ACEIT). Trevor is quick to point out that the focus of their research is not solely on cloud computing. Instead, they are driven to develop technological solutions that allow their clients to succeed, without limiting themselves to any specific field. vCloud Group’s clients may come from a range of industries but they have one thing in common – they never compromise with business processes and communications. vCloud Group first made a name for itself in software development and IT networking. This gave the company penetrative insight into the limitations of central repositories of information, like physical servers. Trevor initially focused on backup, security systems, software development and business continuity. This changed with the surge in demand for cloud solutions. Today, vCloud Group has formed long-term business partnerships with more than 20 companies across Australia. It is also surging ahead with new collaborations both within Australia and across the world. The quick change of tack towards cloud technology alludes to one of Trevor’s key strengths - his holistic understanding of the world of IT. This ability has elevated him from being just a participant in the industry to the status of a thought leader. His talent for farsighted planning gives vCloud Group the edge it needs to maintain a lead over its competitors. www.vcloudgroup.net This advantage was demonstrated to the world when the company incorporated SD WAN (Software Defined Wide Area Network) based on MPLS networking months before the rest of the industry. 47 | October 2018

More Related