Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb

Page created by Cindy Warren
 
CONTINUE READING
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
Column                         Insight                   Plus
USING GAMING TO SAVE           MAPPING THE MODERN        COMPANY NEWS
THE WORLD                  2   SOFTWARE FACTORY     12   TOP JOBS

JUNE 2018   |   Issue 42

Software Asset Management:
Strategise to mitigate risk
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
Covering the continent
    Daily news and analysis of Africa’s key ICT markets.

                                       www.itwebafrica.com

First with IT news. Every day.
www.itweb.co.za
326 Rivonia Boulevard, Rivonia, South Africa
Tel: + 27 11 807 3294
Fax: + 27 11 807 2020
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
IN THIS
                                              ISSUE
CREDITS

                                            B
                                                                                                              Column                              Insight                   Plus

                                                  usiness software is an asset that touches upon a
                                                                                                              USING GAMING TO SAVE                MAPPING THE MODERN        COMPANY NEWS
Publisher                                                                                                     THE WORLD                       2   SOFTWARE FACTORY     12   TOP JOBS

JOVAN REGASEK                                     company’s ability to strategise, control, secure and
jregasek@itweb.co.za                        ultimately run its operations.
                                               So the results of a recent Software Asset Management (SAM)     JUNE 2018   |   Issue 42

Editorial Director                          survey are thought provoking to say the least.
RANKA JOVANOVIC                                According to the results, while the majority of respondents
rankaj@itweb.co.za                          have a defined IT strategy in place, more than a third admitted
                                            to being concerned about the lack of adequate SAM tools
Editor                                      deployed in their organisation.
CHRIS TREDGER                                  And a note to decision makers: not having an effective SAM
chris@itwebafrica.com                       strategy can result in a higher liability with vendor software
                                            licensing compliance. Therefore, a dedicated SAM team that
Sub Editors                                 fully understands the risks and benefits of having an efficient
HEIDI HURWITZ                               SAM system in place is essential.
SIMON FOULDS                                   Software is a dominant theme in this issue. Andrea Lodolo,
                                            CTO at CA Southern Africa tackles the question How can
Production Manager                          business be rewritten by software?                                Software Asset Management:
                                                                                                              Strategise to mitigate risk
SINDISO KHUPE                                  We also feature insight from John McLoughlin, MD at J2
sindiso@itweb.co.za                         Software about the realities of phishing and its impact on
                                            business.
Designers
ZACK HOOSEIN                                Enjoy the read!
ONTIRETSE NGOLWANE
ANA GOLIJANIN                               Chris Tredger
                                            Editor
Circulation Manager

                                            CONTENTS
CARRIE-ANN WALDECK
carrie@itweb.co.za

Business Development Director
CARYN BERMAN
caryn@itweb.co.za                              2                                                                                         SURVEY
                                                                                                                                         Software Asset
Published by                                                                                                                             Management                                        6
ITWEB LIMITED
326 Rivonia Boulevard
Rivonia
PO BOX 2785,                                                                                                                             Skills Development                                18
Rivonia                                                                                                                                  Events                                            18
2128                                                                                                                                     Top Jobs                                          19

Web: www.itweb.co.za
Tel: +27 (011) 807 3294
Fax: +27 (011) 807 2020                                                                                                                  COMPANY NEWS

Printed by                                                                                                                               Business                                     3-5
NOVUS PRINT SOLUTIONS                                                                                                                    Financial                                      5
                                                                                                                                         TechForum                                 14, 15
Copyright ©2014 by ITWeb Limited.
                                                                                                                                         Security                                      15
All rights reserved. No part of this
publication may be reproduced or
                                                                                                                                         Enterprise                                    15
distributed in any form or by any                                                                                                        Software                                      16
means, or stored in a database or                                                                                                        Internet                                      16
retrieval system, without the prior                                                                                                      Industry Solutions                            16
written permission of the publisher.                                                                                                     Networking                                    16
Opinions expressed in this publication
are not necessarily those of the editors,
                                              COLUMN                                                                                     Computing                                     16
publisher, or advertiser.
                                              USING GAMING TO CHANGE THE WORLD                                2                          Hardware                                      20
                                                                                                                                         Channel                                       20

                                                                                                                     June 2018            |                                        01
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
COLUMN

Using gaming to
save the world
 Problem-solving, tactical gaming behaviour can transform societies if
                     it's applied in the real world.
                                                 plays Overwatch after hours, to the mom          on to their potential as e-learning tools,
                                                 who unlocks a new Candy Crush level while        especially when it comes to digital upskilling.
                                                 waiting in the supermarket checkout line.        Games like CryptoKitties are introducing
                                                 Just as social media and mobile shaped the       newbies to the intricacies of blockchain and
                                                 way we engage with the world, so is gaming.      smart contracts using virtual cat trading.
                                                                                                  Numerous educational games aim to teach
                                                 Sowing the seeds for change                      children coding skills through play.
                                                 When McGonigal first suggested the                  And while games get a lot of flak for
                                                 enormous power of games during her TED           supposedly promoting violence, they're
                                                 talk in 2010, there were laughs of disbelief     an ideal vehicle for teaching empathy and
                                                 from the audience. But what she was              conflict resolution. So-called empathy games
                                                 suggesting was not a particularly new idea.      like This War of Mine use immersion to put
                                                 After all, gaming has played an important        players in the shoes of non-combatants in
                                                 cultural role for millennia.                     war-torn areas, driving home the realities
                                                    Next time someone tries to act as if          they face in ways that other media might
                                                 gamification is a new concept, point them        struggle to convey.
                                                 to Mancala, played across Africa in various         These are generally known as serious
                                                 forms. The world's oldest game was first         games, which aim to not just entertain, but
                                                 developed as an agricultural record-keeping      solve real-world problems as well.
                                                 system and a way of teaching people how to          Perhaps the answer to our water shortage
                                                 sow seeds. Locally, we have popular cattle-      problem will one day be solved by projects
LEE NAIK, CEO of TransUnion Africa
                                                 herding board game Morabarbara, which            like Chezo Serious Gaming Hub. The Kenyan

M        y son has saved the world more times
         than I can count. He doesn't own a
unicorn company, nor has he invented a life-
                                                 was used thousands of years ago to train
                                                 young warriors how to plan cattle raids.
                                                    Using games to solve problems runs deep
                                                                                                  innovation space hosts gaming workshops
                                                                                                  and hackathons to design and develop water
                                                                                                  management games, and incubate local
saving innovation. But he, along with two        in Africa's blood. If anyone is poised to        business ventures ready to tackle urban
billion-plus other people around the world,      unleash the potential of gaming in bettering     water issues. It's one of many initiatives
likes to play games.                             societies, it's us.                              worldwide that could transform the water
   It's a marvel to watch. He's resilient and       We've come a long way from the days of        sector and drastically change behaviours.
committed to the tasks ahead of him. He          using seeds as playing pieces. According
thinks strategically to solve problems. He       to McGonigal, people have spent 1.75             Multiplayer mode activated
learns from failure and adapts his tactics       billion minutes on Candy Crush, equating         And just in case you think you need an
accordingly. It's the kind of behaviour that     to the efforts of over 3.5 million full-time     expensive game development team or
can transform societies if it's applied in the   employees. For comparison's sake, the            programming experience to use games to
real world.                                      largest non-governmental employer in             solve problems, I'll point to Block by Block.
   I'm not the only one who thinks gaming        the world, Walmart, has only 2.3 million         This UN project includes poor communities
holds the key to world-changing behaviour.       employees.                                       in the design of their own public spaces using
Jane McGonigal, whom I had the pleasure             The average gamer spends 10 000 hours         the popular game Minecraft.
of watching at last year's BCX Disrupt           gaming before they reach the age of 21. That's      In trying to solve the world's most wicked
conference, believes gaming is one of the        thousands of hours spent learning how to         problems, we're going to have to embrace
most powerful forces in existence to make a      run farms, execute military tactics, learn       different perspectives on a global scale, both
better world.                                    magic, design castles and build nations. Now     by better understanding the challenges people
   Don't believe her? Consider that gaming       imagine just a fraction of that effort being     face and involving those affected in the design
is a $100 billion industry, with almost half     spent on solving a problem like Cape Town's      of their own solutions. Games offer one of
of that coming from mobile. And Africa and       water shortage.                                  the most effective ways of doing so. Don't
the Middle East's gaming population is the                                                        get left behind; find ways of incorporating
fastest growing in the world. No longer just     Let's get serious about gaming                   gaming tools, interfaces, design choices and
the domain of kids with consoles, everyone       Building on the tradition of Mancala (and        ecosystems in your own organisation. It's
is a gamer in some way, from the CEO who         Encarta), more organisations are cottoning       time to power up. Are you ready?

 02                          | June 2018
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
COMPANY NEWS

  BUSINESS
Blue Pencil achieves
B-BBEE Level 3 accreditation
Blue Pencil is proud to announce that the final piece of the puzzle
in its restructure has been completed. Blue Pencil was recently
awarded its Level 3 B-BBEE Contribution Certificate. "With the
change in the market, we had to go back to the drawing board
and realign the business, but still remain focused on our vision
of retaining our status as one of the top SAP services partners in
South Africa," says MD Graham Henderson. "Achieving our Level
3 [certificate] reaffirms our commitment to creating sustainable
employment... It is now more important than ever to be part of
building the ICT sector in South Africa.”
www.bluepencil.co.za

                                  Retaining leadership                 The Oliver Top Empowerment accolade
                                  position                             Datacentrix, an ICT solutions company, received a highly commended
                                  Xerox continues to hold a            certificate of excellence within the Top Empowered ICT Award
                                  leadership position for channel      category at the 17th Annual Oliver Top Empowerment Awards held in
                                  managed print services (MPS)         Johannesburg on 12 April. The overall winner of the ICT section was a
                                  for its broad and accessible         Datacentrix customer - Multichoice. The Oliver Top Empowerment
                                  portfolio. This is according to      Awards is Africa's most established platform for recognising leaders in
                                  the latest European-focused,         broad-based black economic empowerment (B-BBEE).
                                  worldwide market landscape           www.datacentrix.co.za
                                  report by analyst research group
                                  Quocirca. "Xerox has one of                                              Comprehensive
                                  the most advanced and mature                                             threat protection from
                                  channel partner ecosystems                                               Infoblox, McAfee
                                  in the industry," says Louella                                            Infoblox has announced its
Fernandes, associate director, Quocirca. "What set’s Xerox apart                                            partnership with McAfee will
is its business development program, which offers extensive                                                 now offer organisations an
marketing, sales, training, operational support and resources for                                           increased level of sophisticated
channel partners."                                                                                          threat intelligence, as well
www.bdsol.co.za                                                                                             as faster response time to
                                                                                                            combat cyber threats. Today's
Innovative smart casino solutions                                                                           complicated threat landscape
Dallmeier, a worldwide acknowledged solutions provider for the         is no match for organisations protected only by disparate point
casino industry, is presenting its new and innovative smart casino     security tools; the lack of interoperability and data or threat
solutions at this year’s G2E Asia show hosted at the Venetian          intelligence sharing between systems and solutions prevents
Macau during May, as it establishes itself as a complete turnkey       companies from effectively responding to the ever-increasing
solutions provider. Konrad Hechtbauer, project and application         number of attacks. Fuelled through behavioural analytics, machine
development director of Dallmeier and MD of Dallmeier                  learning and up-to-date threat intelligence data at the DNS layer,
International says, "Asia, and especially Macau, is our key market     the comprehensive solution can identify potentially infected devices
for the casino industry and we are glad to reveal our newly released   and block DNS-based data exfiltration, including zero-day attacks.
technologies to the Asian operators first."                            www.infoblox.com
www.dallmeier.com
                                                                       ZTE participates in EANTC’s
                                  Unite cloud solution                 interoperability test
                                ConnectWise Unite, a cloud             ZTE South Africa has revealed that the ZTE, a major international
                                management solution is now             provider of telecommunications, enterprise and consumer
                                available to technology teams          technology solutions for the mobile Internet, has announced
                                across the globe. "What we've          that its data products have participated in the public multi-
                                done with ConnectWise Unite is         vendor interoperability test organised by the European Advanced
                                give our partners the ability to       Networking Test Centre (EANTC). The multi-vendor interoperability
                                access these disparate solutions       test held by EANTC aims to verify the capabilities of the vendors'
                                from a single pane of glass and        equipment in supporting the advances in EVPN, SDN, and PCEP
                                greatly simplify the complexity        features. The test results were released at the MPLS+SDN + NFV
                                that comes from dealing with the       World Congress 2018 on April 10th in Paris, France. Test results show
growing number of solutions they use," says CEO Arnie Bellini .        that ZTE data products feature excellent interoperability.
www.connectwise.com                                                    www.zte.com

                                                                                                         June 2018   |                   03
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
COMPANY NEWS

  BUSINESS
                                    User overview                         Over-the-counter trading
                                 DebiCheck by NuPay, has been             Buying and selling shares through matching mechanisms, whether
                                 designed by the banks and is             automated or not, are functions that are regulated by the Financial
                                 done in accordance with the              Services Board. When the Financial Services Board announced that
                                 prescribed industry standards.           existing over-the-counter trading (OTC) market operators are
                                 Though DebiCheck is a new                trading illegally, Singular Systems, upgraded its Equity Express
                                 payer authorisation process,             system to allow companies to remain unlisted, while giving their
                                 it allows debit orders to be             shareholders a legal framework to trade shares on an OTC basis.
                                 processed early in the morning.          The OTC Express provides these companies with a legal mechanism
                                 Ken Vermaak, manager -                   to trade their shares freely among investors over-the-counter and
                                 compliance and billing at                without any FSB regulatory issues.
                                 NuPay, says it will shoulder the         www.singular.co.za
Ken Vermaak, NuPay               burden of change and make the
transition to DebiCheck as smooth as possible for our users.              Visionary within the Gartner
www.altechnupay.co.za                                                     Magic Quadrant 2018
                                                                          Gartner has recognised Panda Security as one of the Visionaries in the
Cisco backs ITWeb Security Summit 2018                                    new edition of its Magic Quadrant of Endpoint Protection Platforms
Network hardware giant Cisco featured strongly at the ITWeb Security      (EPP) 2018, for the completeness of vision of its cyber security solutions
Summit 2018 held at Vodacom World, in Midrand, from 21 to 25 May.         and its ability to execute. Global trends such as Threat Hunting and
The five-day premier event centred on meeting the cyber security          Investigation, or the 100% Attestation service, which drastically reduce
challenge in an evolving threat landscape. Cisco used the platform to     security threats in the endpoint, are the main strengths that Gartner
share its insights and knowledge to help CISOs and other information      recognises in Panda to position it in the Visionaries quadrant.
security practitioners to evaluate the security tools and solutions       www.pandasecurity.com
available to them, and to properly assess their organisation's security
posture. The summit featured an impressive line-up of top local and       BLI Winter Pack 2018 winners
international security professionals, including Mikko Hypponen, April     Five of Kyocera Document Solutions multi-function A3 business
C Wright, Jason Street and Eleanor Weaver.                                printers from its TASKalfa range, have won the Buyer's Laboratory
www.itweb.co.za                                                           (BLI) Winter Pick 2018 award in the Copier MFP category. George
                                                                          Mikolay, BLI's senior product editor says, "These products proved
International AI expert to headline ITWeb                                 to be stellar players from which mid- to large-size businesses will
Artificial Intelligence 2018                                              certainly benefit.”
Aimee van Wynsberghe, assistant professor of ethics and                   www.kyoceradocumentsolutions.co.za
technology at Delft University of Technology, in the Netherlands,
and co-founder and president of the Foundation for Responsible            New appointment
Robotics, will present a keynote address at ITWeb Artificial              Kyocera Document Solutions has appointed Takuya Marubayashi
Intelligence 2018. Van Wynsberghe is a member of the 4TU centre           as president of the organisation's Europe, Middle East and Africa
for ethics and technology, where she heads the robotics task force,       operations from 1 April 2018. Marubayashi has been with the
and is a member of the board of the Institute for Accountability          company since 1999 and is no stranger to its operations as the
and Internet Democracy. She serves as a member of the Advisory            company drives its digital transformation and advances its efforts
Board for the AI and Intelligent Automation Network, and has              to be at the forefront of the document solutions industry.
been named one of the top 400 influential women under 38 in the           www.kyoceradocumentsolutions.co.za
Netherlands.
www.itweb.co.za                                                                                                            Infoblox
                                                                                                                           appoints
Transforming medical device                                                                                                Cherif Sleiman
manufacturers’ experience                                                                                                  as SVP
By rethinking the way their organisations handle labelling,                                                                International
and taking advantage of the latest technology within label                                                                 Business
management, Medical device manufacturers (MDMs) can comply                                                               Infoblox, the network
with industry regulations, cut costs, improve quality and create                                                         control company that
more efficient operations. NiceLabel offers a next-generation label                                                      provides Actionable
management system that enables UDI-compliant labelling and                                                               Network Intelligence,
empowers MDMs to digitally transform their business. Medical                                                             announced Cherif
records which include a printed bar code label are a more reliable        Sleiman’s appointment as senior VP International Business,
way of ensuring that each patient's record is uniquely identified         responsible for driving business growth in international markets.
and tracked. By undergoing this transformation, MDMs are able to          In this expanded role, he will lead all businesses outside the
increase agility while reducing operational costs and ensure their        Americas and continue to report to Bill McCarthy, executive VP,
future industry success.                                                  Worldwide Field Operations.
www.tpdc.co.za                                                            www.infoblox.com

 04                          | June 2018
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
COMPANY NEWS

  BUSINESS
                                         Redefining                           Eliminating non-compliance labelling fines
                                         business growth                      As companies struggle to meet industry requirements for barcode
                                         RubiBlue, an intelligent business    compliance, businesses are turning to data validation solutions
                                         solutions provider, has redesigned   to eliminate barcode errors, refused shipments and costly fines.
                                         its core values to redefine          Printronix Auto-ID has introduced the ODV-2D, a fully integrated
                                         business growth and enhance its      solution with the ability to print and validate 1D and 2D barcodes. Built
                                         business culture. The organisation   on the robust T8000 printer platform, ODV-2D includes a built-in
                                         underwent a lengthy process to       data validator that grades each barcode to ISO standards, overstrikes
                                         refine these values that are now     the entire label of rejected barcodes, reprints new labels and stores a
                                         embedded and fundamentally           detailed report of each transaction. This new solution validates up to
                                         influence its mindset. As MD         50 barcodes per label and ensures 100% barcode accuracy.
                                         Chris Ogden says, “The culture       www.tpdc.co.za
                                         of an organisation defines how it
                                         engages with its customers.”
Chris Ogden, RubiBlue                    www.rubiblue.co.za

Sage Enterprise Team in SA
Sage participated in the IDC CIO Summit 2018 South Africa, as part
of its commitment to reaching out to local customers and supporting
its business partner network. Two Sage business partners - Argon
Business Solutions and Parity Software - were among this year’s
sponsors at the summit. "It was a great opportunity for us to meet
some of South Africa's leading CIOs and talk to them about our vision
for enterprise management in the cloud," says Matthew Kibby, vice-
president, Enterprise Africa & Middle East at Sage.
www.parity.co.za

  FINANCIAL
                                             Modified Cash
                                             template launched
                                             CaseWare Africa, a division      IOT collaboration agreement
                                             of AdaptIT, has launched a       Software AG has announced a collaborative partnership with
                                             template for the Modified        Telef'onica to deliver a solution for digital transformation and
                                             Cash standard. Stephan           IoT in the B2B market in Spain. At the core of the collaboration is
                                             van der Merwe, product           Software AG's Cumulocity IoT platform, which operates across
                                             manager, CaseWare Africa,        cloud, on-premises and edge, and provides service providers with
                                             says the new template was        a comprehensive, end-to-end IoT solution. This approach ensures
                                             developed by themselves          any app or device - regardless of underlying technology or vendor
                                             has as its main benefit the      source - will operate seamlessly across Telef'onica's network.
                                             automation of the onerous        www.softwareag.com
                                             process associated with
                                             generating statements.           Building futures
Stephan van der Merwe, CaseWare Africa       www.casewareafrica.co.za         Syrex, leading provider of virtualised and hybrid network
                                                                              infrastructures and solutions, sponsored the Bryanston Country
                                                                              Club Easter Festival 2018. The club's annual Easter egg hunt this
                                                                              year benefitted the children from Noah's Ark Daycare who enjoyed

    ICT INSIGHT
                                                                              a fun-filled day. Noah's Ark Daycare also received a R10 000
                                                                              donation from Syrex towards building a new classroom.
                                                                              www.syrex.co.za

                                                                              Smartvue Corporation acquired
          To read the FULL company releases, visit                            Johnson Controls has acquired Smartvue, a leading IoT and video

                  www.itweb.co.za                                             provider which empowers cloud video surveillance and IoT video
                                                                              services. The addition of the Smartvue cloud-based video platform
             Contact sales@itweb.co.za for any sales enquiries.               will enhance Johnson Controls' offering of an end-to-end, smart
                                                                              cloud-based solution.
                                                                              www.tycosecurityproducts.com

                                                                                                                 June 2018   |                     05
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
SOFTWARE ASSET MANAGEMENT SURVEY
By SIBAHLE MALINGA

Lacking software asset
management savvy
Non-compliance and limited visibility of software deployments
                     are top concerns.
                                                                                                                      Furthermore, a third of respondents said
                                                                                                                   their organisation had not been audited
                                                                                                                   by a software vendor in the past three
                                                                                                                   years. Out of the 46% organisations that
                                                                                                                   have been audited by a software vendor,
                                                                                                                   29% said they had identified license
                                                                                                                   deficiencies.
                                                                                                                      According to industry research,
                                                                                                                   companies who do not manage their
                                                                                                                   software effectively tend to unknowingly
                                                                                                                   over-purchase software licenses or
                                                                                                                   inadvertently be out of compliance. They
                                                                                                                   also fail to negotiate their software license
                                                                                                                   agreements.

                                                                                                                   SAM policy
                                                                                                                   Without putting a SAM policy in place
                                                                                                                   ensuring staffs know what is expected of
                                                                                                                   them, the roll-out becomes disjointed,
                                                                                                                   slowing down an organisation’s SAM
Not having an effective SAM strategy can result in a higher liability with vendor software licensing compliance.   process.
                                                                                                                      The majority of respondents (63%) said

L    ocal businesses could be putting
     themselves at risk due to a lack of
adequate software asset management tools
                                                          achieving production targets, controlling
                                                          costs, and meeting corporate and
                                                          organisational goals.
                                                                                                                   they have a documented policy in place
                                                                                                                   that defines the process for procurement
                                                                                                                   of software that is easily accessible by all
and processes.                                               Only 14% of respondents said they                     personnel.
   This is according to ITWeb’s Software                  do not have a clear IT strategy in place.                   In terms of using visibility technology
Asset Management (SAM) Survey, which                      When it comes to defined organisational                  to help companies view and manage the
was recently conducted in partnership                     structure, roles and responsibilities for                entire end-to-end processes, 45% said
with Deloitte and Snow Software.                          SAM, 91% say they do have these, with 7%                 they are using automated reporting,
   The survey examined the state of SAM                   saying they do not.                                      while 7% were using internal audits with
in local businesses and how some of the                      Not having an effective SAM strategy                  another 7% using other forms of visibility
SAM challenges – ensuring compliance,                     can result in a higher liability with vendor             technology.
controlling software and licensing costs,                 software licensing compliance; therefore a                  As for SAM governance risk and
and reducing complexity – are being                       dedicated SAM team that fully understands                compliance programmes, 59% were using
addressed.                                                the risks and benefits of having an efficient            centralised contract repository, while 29%
   While the majority (78%) of respondents                SAM system in place is essential.                        were reporting to the executive board on a
have a defined IT strategy in place,                         While many organisations see a move                   quarterly basis.
more than a third (35%) admitted to be                    to the cloud as a key component to their
concerned about the restrictive or lack of                digital transformation strategy, 27% of                   WHO RESPONDED?
software asset management tools deployed                  professionals surveyed admitted to not
in their organisation.                                    yet making the move to cloud, while 63%                   33% of respondents were in middle
   A further 27% were concerned about                     had migrated. Another 83% said they                       management level, 29% were made up of staff
software non-compliance, while 22%                        are adequately prepared for the risks                     in non-management IT positions, and 21% were
were concerned about limited visibility of                associated with moving to cloud, and 14%                  in executive management positions – working
                                                                                                                    across several different industries within local
software deployments.                                     were not sure of their ability to mitigate                organisations.
   Managing assets effectively is key to                  risks.

 06                              | June 2018
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
SOFTWARE ASSET MANAGEMENT SURVEY
                      SOFTWARE ASSET MANAGEMENT SURVEY

 DOES YOUR ORGANISATION HAVE A DEFINED                   DO YOU HAVE A POLICY THAT DEFINES THE
 IT STRATEGY?                                            SOFTWARE PROCUREMENT PROCESS?

                                                                         Don’t know
           Don’t know

         No

                                                                  No                                                Yes

                                                   Yes

       • Yes                                 78%                  • Yes                                       63%
       • No                                  14%                  • No                                        23%
       • Don’t know                          8%                   • Don’t know                                14%

 TO WHAT EXTENT IS YOUR ENVIRONMENT                      HAVE YOU MIGRATED TO ANY CLOUD
 VIRTUALISED?                                            PLATFORMS?

                                Don’t know

   Not at all
                                                                   63%

                                                           60
                                                   Yes
                         47%
                                                           50

Completely
                                                           40

                                                           30
                                                                                 27%

     •   Partially                           56%
     •   Completely                          25%           20
     •   Not at all                          13%
     •   Don’t know                          5%
                                                           10
                                                                                                   10%

                                                            0
                                                                   Yes           No              Don’t know

xx                      | June 2018
07                       | June 2018                                             June 2018   |                        07
Software Asset Management: Strategise to mitigate risk 2 12 - ITWeb
SOFTWARE
SOFTWARE ASSET MANAGEMENT     ASSET MANAGEMENT SURVEY
                          SURVEY

WHICH CONCERNS DO YOU HAVE WITHIN YOUR                       WHAT GRC PROGRAMMES DO YOU HAVE IN
ICT ENVIRONMENT?                                             RELATION TO SOFTWARE ASSET MANAGEMENT
                                                             (SAM)?

 35%                                                                           Other

Lack of software asset management
tools deployed

 27%
Software non-compliance

 22%                                                         Quarterly reporting                         Centralised
                                                             to Executive Board                          contract repository
Limited visibility of software
deployments

 16%
Other                                                         • Centralised contract repository           59%
                                                              • Quarterly reporting to Executive Board    29%
                                                              • Other                                     13%
        0        10     20         30         40   50

HOW DO YOU ENSURE VISIBILITY OF YOUR SOFTWARE USAGE?

 50
              45%
                         25%
 40

 30

 20

 10
                                            7%
                                                        5%

  0
            Automated   Internal           Other    Forums
            reporting    audits

                                                                                       June 2018   |               xx
08
 08                       | |June
                               June
                                  2018
                                    2018
Software Asset Management
Unlocking the Value

Imagine if you could change the way you purchase and manage your software asset management?

   Reduce your overall software spend
   Eliminate duplicate software systems
   Improve cost saving
   Limit your risk

Accelerate your organisations IT performance and rethink your approach to Software Asset Management with Deloitte.

Over the last 20 years we have delivered thousands of Software Asset Management and software licensing engagements
globally. We have built a network of over 400 professionals, which allows us to rapidly scale across over 40 countries, 24
hours a day. We have developed a catalogue of offerings that can be tailored to your requirements.
Only Deloitte brings together the global scale of our unmatched software license domain expertise, proven process
optimization and a powerful technology platform to help our clients limit risks, control costs and increase
enterprise-wide IT efficiencies.

www.deloitte.com/za

© 2018. For information, contact Deloitte Touche Tohmatsu Limited
INDUSTRY INSIGHT: DATA MANAGEMENT

Predicting CX success
The customer experience is best when it's up close and personal.

                                                    the customer having to contact the company            of implementing a new channel may not see a
                                                    multiple times, repeating requests to different       return on investment that makes that channel
                                                    departments. This loop of communication is            worthwhile. Rather than have a chatbot just
                                                    confusing for the customer, and the company           because it's a current trend, for example, why
                                                    is also haemorrhaging vital data if its channels      not look at working with an app that mirrors
                                                    aren't integrated.                                    the company's Web site, only with increased
                                                                                                          interaction options? App development,
                                                    JoJo tank of data                                     depending on the complexity of the interface,
                                                    Think of data as a resource that's as essential to    can be costly, so extensive research should
                                                    communication channels as water is to human           be done to forecast the potential uptake of a
                                                    life. If it's not stored in one place, its uses are   new channel that's being introduced into the
                                                    limited.                                              communications portfolio.
                                                       Not all customers are entirely digital.               The goal, or at least the ideal, of omni-
                                                       Taking all data and storing it centrally           channel, is useful in theory, but the reality
                                                    means the company can then work more                  most companies achieve is a multichannel
                                                    effectively with it. Accessing the data for           environment with multiple moving parts. The
                                                    process and customer analytics can provide far        flow between these is guided by processes
                                                    better insights that in turn lead to enhanced         that must be efficient, allowing for fewer pain
                                                    processes, optimised efficiency and the               points. Reducing pain points takes painstaking
 Wynand Smit, CEO of INOVO                          resultant CX. It's not a finite task; data can        analysis, but it yields value in creating a more
                                                    find ways of 'leaking', so for the sake of the        seamless channel environment.
                                                    customers, centralised data must be secure.

O      ne doesn't need to be a prophet to see
       the opportunities that exist for enhanced
channel communication, but common sense is
                                                    BYOD
                                                    The marketplace has shifted to digital,
                                                                                                          Think like the customer
                                                                                                          Feedback is a great tool for monitoring
                                                                                                          effectiveness in the channel environment. It
crucial. It's a little more complex than "keeping   which provides fantastic opportunities to             allows the company to hear the voice of its
it simple", but a similar principle applies:        reach customers right where they are. Take            customer and respond accordingly. It also
reduce channel noise by integrating services so     the tourism sector, for example: travellers           gives the company insights into the operational
more seamless operations can be achieved.           are using their devices across their travel           capabilities and performance of its team,
    Customer experience (CX) is best when it's      experiences, from researching to booking and          providing an opportunity to adapt processes
personal and up close: between the front- and       then paying for trips and experiences. When           and give training where necessary. It also
back-office, a company may have so many             they get to their destinations, they're utilising     ensures, in general, that CX isn't limited to
layers that affect CX that the many touch           their devices to record their holidays, and           mechanical, digital or technological processes,
points (and pain points) can create a wall of       occasionally, to interact with brands.                but allows for human development and
noise that's difficult to penetrate. If customers      Bring your own device is becoming almost           understanding of the role humans play as the
have to go through 50 touch points to get           essential, but bear in mind this comes with a         face of CX.
the service they're looking for, it becomes         caveat: not all customers are entirely digital.          A complaint can lead to customer-driven
intimidating just dealing with the business.        Again, using the travel sector as an example,         service in the contact centre, if the company
The fewer steps it takes to achieve successful      those travelling may opt to leave devices at          walks the complaint back through the
interactions (sales, customer service), the         home, lose devices or contact the company             processes that led to the dissatisfaction and
more likely the company is to retain its            while on the go; can they still go old school         takes steps to remove the pain points.
customer base.                                      and reach a company by voice calls to get what           There are changes that can be made with
    Instead of simplifying the channel              they need done? Access is important to bear           relative ease to achieve enhanced CX. A little
environment, companies may make the                 in mind and improving this via the company's          like that lightbulb that has been out for a year,
mistake of making it more complex by adding         channels is a necessary task.                         all a company needs to do is pay attention to
channels to existing ones without integrating                                                             the problem and replace it, and the outcome
processes. This can result in mystified             Everybody's doing it...                               is brighter. In the same sense, CX requires
customers wondering why services offered            Some customers' needs are highly specialised;         attention, but depending on the changes made,
over voice calls are not the same as ones offered   they won't necessarily require 12 channels to         the company could be delivering enhanced
over e-mail or chat, for example, leading to        get their customers what they want. The costs         services within a short space of time.

 10                           | June 2018
INDUSTRY INSIGHT: ACCESS CONTROL

Have you gone phishing?
Layered security measures must go beyond the perimeter and anti-virus to
               protect companies against phishing attacks.
                                                  entertainment, the fact is most corporate            This time is used to gather information,
                                                  devices are used for many different purposes.     learn about the user, see what sites they
                                                                                                    are accessing and use this information to
                                                  Beyond the click                                  leapfrog to a more powerful position before
                                                  Because people are using these machines           delivering the real attack. It may takes days,
                                                  outside of the controlled environment, it         weeks or even months. Cyber thieves have
                                                  is no longer good enough to only provide          infinite patience.
                                                  corporate coverage. Today, staff make use            So, while companies have deployed
                                                  of file-sharing services and free-to-use          enhanced protection on their corporate
                                                  e-mail services to do their personal business.    e-mail system where these clicks will
                                                  All employees receive invoices, handle tax        be blocked, the user does not have that
                                                  returns and send personal information to          protection when tricked via Gmail.
                                                  banks or government departments. So, when
                                                  a user falls prey to a fake invoice or SARS       What can be done?
                                                  refund e-mail and clicks on that link in his/     The truth is, without visibility of the end
                                                  her Gmail account, s/he doesn't know that         point, with the user working at the device,
                                                  what has happened will hurt the business.         there is a heightened risk. The phish may
                                                  The prevalence of the digital world means         not immediately encrypt files because,
                                                  people now have no choice but to know what        rather like bellbottom trousers, this is so last
 John McLoughlin, MD, J2 Software                 happens beyond the click.                         season. The new attackers are there to learn
                                                     Recently, there has been an increase in        and siphon. When they learn, they have
                                                  invoice or refund-related attacks. Cyber          more power, and with more power, they

S    o, the company's security perimeter is
     tight, right? Its corporate e-mail has
advanced threat protection. It has deployed
                                                  criminals never keep office hours and are
                                                  innovating all the time. Whether it comes
                                                  around tax season or other events, they work
                                                                                                    have a bigger payday. This could be the entire
                                                                                                    network or highly sensitive IP.
                                                                                                       Layered security measures must go beyond
an anti-virus system. That means all is good      hard to get people to fall into their traps.      the perimeter and anti-virus. Anomaly
and it is time to hang up the sign: gone          When a user gets the refund confirmation          detection and immediately identifying
fishing, with not a care in the world.            or tax invoice that just won't open, s/he hits    changes are a crucial part of a comprehensive
    This might be an effective approach in a      the link to follow instructions. This innocent    security strategy. Anomalies can only be
world where the people using the devices          looking document can be laden with threats.       picked up once it becomes known what
never leave the office, and only have access      The innocent user has been sucked in and          activity is actually taking place, no matter
to information when seated safely behind          is sent to malicious sites, to enter personal     where they are. More attention has to
the firewall. It would be great if they never     information or install a seemingly innocent       be given to understanding behaviour in
searched for anything online and also             Web application.                                  order to better understand and identify
never saw a Web-based advert or used any             Malicious Web sites can contain malware        inconsistencies.
personal e-mail service such as Outlook.          or applications that can be loaded with              Layered defence, while vital, is also not
com or Gmail. If all of the foregoing is the      key-loggers and software designed to spy.         always going to save the company if the
case - rest easy and happy fishing.               The prevalence of password re-use on every        various layers are not bound together. Don't
    But, it never is the case.                    site and platform also means there is a           be fooled, because it will not help when
    The reality of the modern business is quite   massive probability that users have the same      an alarm is triggered by a tripwire and
far removed from this scenario. When looking      password for Facebook, Internet banking           everybody is focused only on the electric
at computer usage in SA and the rest of the       and corporate logins.                             fence. A consolidated view with built-in
continent, the vast majority of computer             Now that they are hooked, it is simply a       intelligence and up-to-date global feeds will
users have access only to the machine             case of the phishermen reeling in their catch.    ensure the alarm systems are always armed
provided by their employer. A very small             The modus operandi has changed; modern         and the response team is always prepped.
percentage have the luxury of personal home       phishermen now practice a great deal of              With visibility, behavioural monitoring
devices and, because of this, virtually every     patience. The infection no longer means           and immediate response, powered by
corporate security policy allows for personal     immediate action - there are now prolonged        automation, companies can rest easy
use of company equipment. Whether it              periods of reconnaissance. The attacker will      knowing that even when they are caught
is for Internet banking, school projects or       monitor the user before moving in for the kill.   fishing, they are not the trophy.

                                                                                                             June 2018   |                     11
INDUSTRY INSIGHT: SOFTWARE DEVELOPMENT AND TESTING

Mapping the modern
software factory
It is crucial to tap into the modern software factory for growth
                       and business survival.
                                                 predict problems before they happen? How           • Understanding customer needs and better
                                                 do I enable continuous delivery, frictionless          aligning IT with the business.
                                                 security and agile across my business, from           What it comes down to is the ability
                                                 mobile all the way to mainframe? Most              to exploit the digital world and all of its
                                                 importantly, what is my business's potential       opportunities to the hilt!
                                                 to grow and compete if the apps it is delivering      Of course, a company's next question
                                                 to customers do not deliver the service today's    is: "How do I create a modern software
                                                 consumer, with so many choices, demands?"          factory?"
                                                    A company should be asking itself all of the       Creating a modern software factory is
                                                 foregoing, otherwise the answer to the last        no easy feat as it involves far more than
                                                 question will be zero growth and a decline in      just technology and processes. It demands
                                                 business, as consumers hop between suppliers       a highly agile and collaborative working
                                                 and are brutal in their lack of forgiveness for    environment, which in turn requires the
                                                 poor experiences; they do not come back.           right people, culture and structure.
                                                    Disruption has arrived; it's everywhere.           The key principles that underpin the
                                                    So, now that the message is clear: what does    modern software factory:
                                                 a company do to get into the picture?
 Andrea Lodolo, CTO at CA Southern Africa
                                                                                                    Agility
                                                 Thriving on change                                 Delivering exceptional experiences to
                                                 Change and the possibility of it can scare the     customers means being able to respond

D     isruption has arrived; it's everywhere.
      A bank is no longer just a bank, it is
a purveyor of data, digital devices, and,
                                                 hell out of many businesses. The company has
                                                 a model that works, the business turns over
                                                 nicely and is reflecting reasonable growth in
                                                                                                    rapidly to their needs. Methodologies such
                                                                                                    as agile, DevOps and continuous delivery are
                                                                                                    essential to this capability.
of course, also financial services. A taxi       a pretty slow economy. But, that's no longer
company that is not a taxi company is            good enough; all businesses are in a highly        Automation
another example: it doesn't own a solitary       competitive race to win business, and even         The software development life cycle must be
car, other than the driverless variety           more so in a strained economy. Today, the          fully automated. This calls for consistent and
deployed in parts of the USA; nor does it        most competitive firms are built to change,        standardised ways of working, capturing
employ drivers. It's an app... or is it? Well,   actually to thrive on it and adopt an approach     feedback from users and other stakeholders,
actually, it is a business that has been         of "be the change you wish to see". These          and communicating it to developers.
rewritten by software.                           are the companies built on software that
   Almost all companies today use software-      allows them to thrive in a climate of constant     Insights
based solutions for traditional systems such     disruption, short innovation cycles, and ever-     Developers need processes to monitor, sense
as ERP, logistics, etc, and these systems        changing customer expectations.                    and respond effectively, and they need the
need to be managed. Once again, these               Research conducted by CA Technologies, in       analytical tools to enable them to receive
have become legacy-type applications             partnership with Freeform Dynamics, reveals        feedback, improve software and track the
that have been around for years. What has        important insights about those businesses          impact of the changes they make.
changed is that companies worldwide are          that are not just building, but mastering,
increasingly using software to drive their       the modern software factory. Not only do           Security
businesses forward and provide a competitive     'masters' demonstrate a staggering 70%             As cyber risks intensify and development
edge. They are either building these new         higher profit growth and 50% higher revenue        becomes more automated, security must
capabilities internally or outsourcing this      growth, they also lead on a host of key            be integral to software creation, not just
software development. This development is        business indicators, including:                    a feature that's bolted on at the end of the
referred to as software factories.               • Exploitation of new software driven              development process.
   So, the crux of the matter is not to ask:        technologies;                                      In my next Industry Insight I will present
"Why do I need a modern software factory",       • Better leadership decisions due to use           the principles on which the modern
but rather, to ask: "How can I get my business      of analytics, yielding valuable customer        software factory is founded, and how to
to build, test and deliver amazing apps that        information; and                                implement them.

 12                          | June 2018
Gartner’s Top 10
Strategic Technology
Trends for 2018
                             Intelligent                                                                               Mesh                                                                               Digital

       #1 AI Foundation                                                                         #4 Blockchain                                                                    #7 Digital Twins

    #2 Intelligent Apps                                                                      #5 Event-Driven                                                             #8 Cloud to the Edge
      and Analytics

 #3 Intelligent Things                                                                         #6 Continuous                                                                  #9 Conversational
                                                                                               Adaptive Risk                                                                      Platforms
                                                                                                 and Trust

     Join us at Gartner Symposium/ITxpo 2018 to
     learn about Gartner’s technology trends, if they
     will work for you and how to implement them.                                                                                                                                 #10 Immersive
     Gartner Symposium/ITxpo 2018                                                                                                                                                   Experience
     Cape Town, South Africa in September
     gartner.com/za/symposium / #GartnerSYM

© 2018 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner and ITxpo are registered trademarks of Gartner, Inc. or its affiliates. For more information, email info@gartner.com or visit gartner.com.
COMPANY NEWS

  TECHFORUM
                                     Archiving as a Service               How Common Criteria Certification
                                     Archiving has come a long way        helps with document security
                                     since the day of the dial-up         Everyone is concerned about data; whether it's your company's
                                     modem, says Danie Marais,            intellectual property, a customer's address, employee social
                                     director of product management       security numbers, bank account numbers, etc. Handling customer
                                     at Redstor. The company’s new        data is a priority for companies, as customers entrust organisations
                                     tool, Archiving as a Service now     to handle their personal information in a secure manner. Whether
                                     allows businesses to effectively     it's printing and mailing monthly bank statements or quarterly
                                     put its data into a controlled       retirement financial reports, to providing a medical benefits
                                     environment that creating insight,   package with a health assessment, it all comes down to trust,
                                     backup, disaster recovery and        says Carro Ford, content marketing strategist at Xerox. The above
                                     accessibility on-demand.             also holds true for securing documents that contain personal or
                                     www.redstor.com                      confidential data that need to be printed, scanned, copied or faxed.
                                                                          www.bdsol.co.za
One driver, many printers,
choice with pull print                                                                                      Women in tech can
The Pull Print Driver is a single driver that can be used with your                                         overcome challenges
Xerox printer fleet, giving you the choice of what printer to use to                                        The tech world is changing,
print your job, says Cheryl Otstott, social media project manager:                                          and the role and contribution
Forums and At Your Service blog at Xerox. The Pull Print Driver                                             of women is changing too,
allows you to "push" your job to a queue at your network server                                             says Melani French, executive
and then "pull" it at the Xerox printer convenient to you. The Xerox                                        head: Business Enablement,
Pull Print driver allows users of popular "Pull Printing" solutions to                                      DVT Academy. French believes
use one single, configurable print driver for their printing needs,                                         women in the tech industry need
with compatible Xerox printers and multifunction printers.                                                  not use their energy trying to
www.bdsol.co.za                                                                                             overcome outdated, stereotypical
                                                                                                            thinking – they should be their
STEM skills crucial                                                                                         unique, authentic selves.
The basic education sector in South Africa needs to increase the          Melani French, DVT Academy        www.dvt.co.za
number of institutions that focus on critical subjects such as science,
technology, engineering, and mathematics (STEM) says Richard Firth,
CEO of MIP Holdings. “An issue to overcome is that STEM subjects          Tackling security in hyper-connected world
are viewed as difficult and therefore are not popular among leaners,”     The rapid growth of devices and associated attacks aimed
adds Firth, “overcoming this hurdle is critical to improving skills and   at mismanaged or unpatched devices, in conjunction with
therefore making future generations an employable commodity.”             unsuspecting users, is proving difficult to keep up with. J2
www.mip.co.za                                                             Software has launched a range of solutions geared to meet these
                                                                          challenges. "Every day new devices are being added to the
New head at Software AG                                                   corporate environment, bringing new threats and vulnerabilities in
Kholiwe Makhohliso has been appointed as Country Leader for               the picture. This is why we push for visibility of an organisations'
Software AG South Africa effective 1 April 2018. Makhohliso takes         entire environment and this must go beyond the corporate
over from Mohamed Cassoojee who decided to leave the business at          network in our modern, hyper-connected society," says J2
the end of February. Makhohliso has 22 year’s business experience         Software MD John Mc Loughlin. "Without visibility, you will not
behind her and her passion, drive, enthusiasm, and commitment             even know if something has been lost.”
bodes well in driving the company forward.                                www.j2.co.za
www.softwareag.com
                                                                          Cisco, Xerox boost cyber security
                                       Affordable business                for printers on the network
                                       software                           Xerox maintains partnerships with security leaders like Cisco and
                                       One Channel CEO Bernard Ford       McAfee to ensure it keeps its customers' data, documents and
                                       says cloud ERP is more flexible    devices safe, says Tracey Koziol, senior VP, Workplace Solutions
                                       because it can be accessed from    Business Group, Xerox. Cisco's Identity Services Engine (ISE) now
                                       anywhere with any Internet-        comes with profiles of more than 200 Xerox printers, high-end
                                       enabled device. "This means        production presses and multifunction devices, including its
                                       business owners have the ability   portfolio of 29 new ConnectKey-enabled VersaLink and AltaLink
                                       to make good business decisions    workplace assistants. This enables the Cisco ISE to automatically
                                       no matter where they are, be it    detect Xerox devices on a network, cueing network managers to
                                       from a laptop, tablet or mobile    dial in the appropriate security controls, and to employ Cisco ISE as
                                       phone," he says.                   a convenient facility for monitoring printer and MFP activities.
Bernard Ford, One Channel CEO          www.onechannel.cloud               www.bdsol.co.za

 14                             | June 2018
COMPANY NEWS

  SECURITY
                                          Real-time                     ITWeb, VMware security survey: a first in SA
                                          incident                      ITWeb, in partnership with VMware, recently conducted a
                                          response                      comprehensive information security survey, the first of its kind in
                                           Johnson Controls has         South Africa. Those attending ITWeb Security Summit 2018 were
                                           introduced the newest        given a sneak preview of the results. The full research report is
                                           version of its victor        exclusive to survey respondents, and will be compiled by ITWeb's
                                           Video Management             research team and released in June 2018. "The objective of this
                                           System and VideoEdge         survey is to gauge the current state of cyber security readiness in
                                           Network Video Recorders      South Africa, by polling the very people who are in charge of their
                                           (NVRs) from American         company's security: CISOs and equivalent C-level executives," says
                                           Dynamics. Tyco Security      Ranka Jovanovic, ITWeb's editorial director.
Products says the video management system provides enhanced             www.itweb.co.za
video intelligence and analytics to greatly improve the efficiency of
security personnel and daily business operations.                                                              Is your data safe in
www.tycosecurityproducts.com                                                                                   the cloud?
                                                                                                               Control and security don't
Security solution for SMEs                                                                                     necessarily go hand-in-hand,
It’s particularly important that video security solutions are easy                                             and how data is accessed is
to install and smooth to operate, especially for SMEs. This is why                                             more important than the
Dallmeier offers VideoNetBox 3, which can be configured quickly                                                physical location where it is
and simply as a complete video security solution for up to 16                                                  stored. “Cloud providers have
HD video streams. The appliance combines the proven SMAVIA                                                     to be compliant and secure
recording and analysis software with compact, fan-less, energy-                                                before they can move any data
efficient server hardware. With VideoNetBox 3, shops, petrol                                                   and GDPR is making this more
stations, and small businesses can build solutions quickly and simply                                          of a reality,” says Nicolas Blank,
based on the proven Dallmeier camera and recording technology.                                                 group CEO of NBConsult.
www.dallmeier.com                                                       Nicolas Blank, NBConsult               www.nbconsult.com

Infoblox addresses DNS
cyber security blind spot                                                 ENTERPRISE
Infoblox, the network control company that provides Actionable
Network Intelligence, has announced significant enhancements to         Aruba introduces innovations in
its ActiveTrust Cloud offering. It now leverages advanced analytics     AI-powered analytics, assurance
to expand detection of potential zero-day threats and prevent           Aruba, a Hewlett Packard Enterprise company, advanced its
the loss of data, the ability to distribute threat intelligence to      Mobile First Architecture with the introduction of new innovations
other security products in the network, and ensures content on          in AI-powered analytics and assurance to enable autonomous
the network conforms to corporate policies. In this latest release,     networking, as well as partnerships to deliver smarter workplace
organisations are able to strengthen their protection across their      experiences. To help IT organisations enhance the user experience
entire security ecosystem with advanced machine learning, as            and ensure business resilience as they continue to adopt mobility,
well as distribute actionable threat intelligence across existing       IOT and cloud, Aruba has introduced NetInsight, an artificial
security solutions on the network. ActiveTrust Cloud is delivered       intelligence (AI) based analytics and assurance solution for
as a service.                                                           optimising network performance. Aruba has added a new category
www.infoblox.com                                                        of smart digital workplace partners to the ArubaEdge Technology
                                                                        Partner Program, including corporate real estate (CRE) leaders,
  TECHFORUM                                                             connected furniture companies, and technology vendors.
                                                                        www.arubanetworks.com
                                  Open all channels to
                                  learning                              Blue Pencil personal and consulting services
                                  Richard Firth, CEO of MIP             Blue Pencil Professional Resource Services has been servicing
                                  Holdings, believes the Film           the consulting market for the past 14 years, bringing skilled
                                  and Publications Board has            consultants and customers together for ad hoc SAP projects or
                                  become an anachronism. "Today,        permanent placements across various industries. As the economy
                                  government needs to open up the       shifts and the need for the right skills at the right time is critical,
                                  channels so South Africans can        Blue Pencil has been able to tap into its database of reliable skilled
                                  access all the learning content       consultants to meet the needs and expectations of its growing
                                  out there, not shut them down.        client base. The company uses a permanent team of creative
                                  And documentaries definitely          designers and SAP Solution Manager consultants to assist with
                                  play a role in learning too."         vetting and support of graduates in the new roles.
Richard Firth, MIP Holdings       www.mip.co.za                         www.bluepencil.co.za

                                                                                                           June 2018   |                    15
COMPANY NEWS

  SOFTWARE
Configure and customise security                                                                                A preferred
Tyco Security Products says the latest version of exacqVision video                                             partnership
management system from Johnson Controls, adds innovative                                                        SPI and the Omnicom Media Group
features that enable users to individually configure and customise                                              have entered into a new agreement,
their system, while providing strong security to protect against                                                in which IRI will serve as the
cyber attacks. With a simple click and drag of a mouse, users create                                            preferred consumer packaged
a customised video wall layout, including custom icons on maps,                                                 goods data provider for Annalect,
delivering more meaningful information, which can facilitate faster                                             the Omnicom Media Group data
and more intuitive responses.                                                                                   and analytics division that supports
www.tycosecurityproducts.com                                                                                    all Omnicom agencies.
                                                                                                                www.spi.co.za

  INTERNET
                                                                               INDUSTRY SOLUTIONS
                                        Help with capacity
                                        planning                                                                        CEG adopts
                                        Redstor, a leading UK-                                                          Embrace as
                                        headquartered SaaS business,                                                    preferred ERP
                                        has launched a free Storage                                                     system
                                        Analyser that shows                                                            The Capital Equipment
                                        organisations how much of                                                      Group (CEG), a division
                                        their expensive primary storage                                                of Invicta Holdings, has
                                        is potentially going to waste.                                                 adopted Embrace as the
                                        Available to as a download, the                                                preferred ERP. "Embrace
                                        Web-based Storage Analyser                                                     has proven to be the
                                        reveals what space would be          right choice for controlling costs, optimising the use of people,
                                        freed up if inactive data was        maximising revenue and making investment decisions that help
                                        offloaded to the cloud.              grow the company," states Geoff Balshaw, CFO, CEG Group.
Paul Evans, Redstor
                                        www.redstor.com                      www.embrace.co.za

  NETWORKING
                                       IOT                                   Remembering #KnysnaFires
                                        Comsol is an ideal partner to give   In June 2017 Knysna was set ablaze resulting in landlines and cellular
                                        you the flexibility of leveraging    networks not operational in most parts. Altech Fleetcall, a commercial,
                                        a hybrid approach to your IOT        national trunked radio operator, was leading the efforts to connect the
                                        needs. Its extensive experience      emergency teams. On Saturday 10 June, Altech contacted Comsol to
                                        in radio frequency networks          assist with connecting Fleetcall's Site at Brenton Towers (Knysna) to
                                        enables the company to build you     its Overport main hub (in Durban). Comsol and Fleetcall immediately
                                        a resilient LoRaWAN network          designed a plan of action and by 3pm on Sunday 11 June, less than 24
                                        for your private needs, while        hours after the initial call, services were up and running.
ensuring if you need to expand to any part of Comsol's public network,       www.comsol.co.za
you have the flexibility to do so with ease.
www.comsol.co.za
                                                                               COMPUTING
Dirty secrets of network firewalls
Sophos has announced the findings of its global survey: ‘The dirty           Intelligent apps get to work in 2018
secrets of network firewalls’, which revealed that IT managers               EOH says in our workplace, IAs are already in use. Consider
cannot identify 45% of their organisation's network traffic. In fact,        the way the latest version of Outlook prioritises your mail into
nearly one in four cannot identify 70% of their network traffic. The         'focused' and 'other'. But, these are simple features. The real art
lack of visibility creates significant security challenges for today's       is achieved through intelligent collaboration. Consider LinkedIn
businesses and impacts on an effective network management.                   Navigator, the recent launch by Microsoft and LinkedIn. It is a
"If you can't see everything on your network, you can't ever                 result of the convergence of cloud-based services, big data and IOT.
be confident that your organisation is protected from threats.               Combining the features of Office 365, Dynamics 365, and LinkedIn,
IT professionals have been flying blind for too long, and cyber              all supported by the cloud, Microsoft uses the power of IOT and
criminals take advantage of this," says Brett Myroff, MD of Sophos           machine learning to draw its users' attention to deals that have a
distributor, Netxactics.                                                     higher propensity to close versus those that are at risk.
www.netxactics.co.za                                                         www.eoh.co.za

 16                           | June 2018
You can also read