award

In a year that saw this organisation crossing many milestones and winning many awards, RAH Infotech wins yet again and this time the ‘Fastest Growing Technology VAD 2016’ award from SME Channels at the recently held SME Channels Achiever’s Award function 2016.

With a consistent 50% growth YoY RAH Infotech has been scaling new heights every fiscal. This is second such award in less than a month with a similar award received from VAR India. All these awards put RAH Infotech clearly ahead of the race and the company aims to take it to next level in the coming years.

cisco-event

On Friday the 18th of November at Le Meridian Delhi, RAH Infotech and Cisco called upon their customers to ready them to transform their organisation with Cisco’s Digital Network Architecture (DNA) and Hyperconverged Infrastructure.

During the session, Mr. Manjeet Singh briefed to customers on how RAH Infotech can add value to its customers’ business and how together with Cisco can help organizations transform their network. Mr. Somil Mathur from Cisco further briefed about the advantages of Cisco’s on-premises and cloud-managed technology and solutions through Digital Network Architecture (DNA) and how customers can unify compute, storage, and networking with HyperFlex to gain competitive edge.

The session was attended by over thirty CIOs, IT Heads and CTOs from more than sixteen organizations. Mr. Srinivasa Vangala, Group CIO, India, SAARC & China of MAT Holdings stole the show with his presentation on ‘Journey towards IT transformation’ by demonstrating to the audience on how his organisation benefited from using Cisco’s solutions and how they managed to gain better control over their network.

He touched upon the key IT issues organizations face today including lack of stable digital infra to support the business, challenges of independent IT operations in each entity of the organization, service delivery, monitoring, accountability, operational and security issues and how his organization overcame each of these challenges with Cisco’s next gen solutions and realizing key benefits like:

  • Improved network up-time and enhanced operational efficiency
  • High Availability and Reduced Cost of Ownership
  • Achieved Uninterrupted Production Support
  • Faster design innovation and time to market
  • True mobility and introduction of global business processes
  • Enterprise Security Enhancement

Post the session, it was down to networking over cocktails where the participants further interacted with RAH Infotech and Cisco teams on how Cisco’s solutions can help their organisations to improve IT efficiency and resilience. An eventful evening came to an end with participants expressing their happiness about the usefulness of the session.

p_20160923_201753

RAH Infotech, a leading value added distributor in India in association with WinMagic, a global leader in Data Security, held channel meet at The Lalit Mumbai on 23rd September 2016. The meet received an overwhelming response with 48 channel partners from 25 organisations gracing the moment despite thunderstorms, heavy rains and militant movements in the city.

The meet was aimed at introducing partners to the latest offerings from WinMagic and also enhancing their knowledge on the existing solutions. Session was kicked off by Mr. Suchit Karnik, Senior Vice President, RAH Infotech with an introductory note where he briefed the partners about the strength, capabilities and solution offerings of RAH Infotech.

Later the dias was handed over to Mr. Rahul Kumar, Country Manager, WinMagic India who appraised partners about the latest encryption solutions from WinMagic and how these solutions can help partners not only offer best of security solutions to their customers but also enhance their bottom-line in a competitive market.

Mr. Raju Veeranna, Senior Presales Engineer from Winmagic India further stressed on the technical aspects of encryption solutions and their key features and benefits. Mr. Gautam Jaiswal, Regional Sales Manager – West, WinMagic India explained about the channel incentive schemes to further encourage partners to adopt WinMagic encryption solutions.

The meet was summed up with a round of networking, cocktails and dinner.

Posted by: RAH Infotech | September 12, 2016

RAH Infotech bags “Outstanding contribution Award” from F-Secure

f-secure

RAH Infotech, a leading value added distributor in India was awarded “Outstanding contribution Award for 1H 2016” by F-Secure at the recently held F-Secure Channel Partner Meet “Let’s Create Value Together” on 2nd September 2016 at Hotel Lalit, Mumbai.

The channel meet was presided over by Mr.Jaakko Hyttinen, F-Secure Vice President, Global Corporate Sales and Mr. Jimmy Ruokolainen, F-Secure Vice President, Product Management. The meet was attended by over 200 partners from 90 organisations where partners were recognized for their contribution to F-Secure business in India.

This is the second award in a row for RAH Infotech from F-Secure. Earlier this year, RAH Infotech had bagged “Best Execution Partner 2015” from the European cyber security company.

WinMagic, a global leader in encryption management, has entered into a strategic tie-up with RAH Infotech, a leading value added distributor in India. The collaboration is aimed at leveraging the synergies of the two partners to help organizations minimize business risks, meet privacy and regulatory compliance requirements and protect valuable information assets against unauthorized access.

Rahul Kumar, Country Manager, WinMagic India Pvt. Ltd., shared “Within an enterprise, there are a wide variety of systems and processes that make data security complex and challenging. To ensure the success of your IT infrastructure as it grows, it’s critical to host and manage the keys to encryption effectively.”

“RAH Infotech as our distributor will play an instrumental role in enhancing our channel base by helping us reach out to various untapped markets across India. We are confident that the channel strength that RAH Infotech brings and the innovation in technology that WinMagic is known for will work in synergy to our mutual advantage in India. This tie-up would enable us to meet the ever changing demands of customers,” he added further.

Mr Ashok Kumar, Chief Executive Officer at RAH Infotech said, “When companies bring teams into a centralized data security management environment such as WinMagic SecureDoc Enterprise Server (SES), you have better control over who can access and see files on your network. With their powerful application-aware platform, companies will be able to instantly gauge the health of their security keys within a single-pane view, making it faster to administer and execute manual security tasks across any platform.”

“RAH Infotech’s focus is on providing excellence to our partners while successfully introducing and establishing new technology vendors in the market and strengthen existing vendors’ market share. This association with WinMagic will help us reinforce our support to our esteem partners and customers,” further added Ashok.

Posted by: RAH Infotech | September 7, 2016

Radware Positioned as Leader in Gartner Magic Quadrant 2016

Radware’s Seventh Inclusion in the ADC Magic Quadrant for application delivery controllers; Evaluation Based on Completeness of Vision and Ability to Execute.

Radware has been positioned in the Leaders Quadrant for its Application Delivery Controllers in the September, 2016 Magic Quadrant for Application Delivery Controllers (ADC).

“We believe that Radware’s continued recognition in Gartner’s Magic Quadrant for Application Delivery Controllers is proof-positive of our commitment to the ADC category, especially in the face of rapidly changing needs in IT Infrastructure,” said Sharon Trachtman, Chief Marketing Officer for Radware.  “Companies turn to Radware because they require their mission critical business applications to be available and performing optimally at all times. The combination of Radware’s strong architectural approach, the powerful security integrations, and the advanced customization, automation and programmability of Radware’s offerings are what keep our customers up and running.”

Radware’s comprehensive technology portfolio includes a full suite of appliances, software solutions, virtual licensing, cloud and OTT cloud services that ensure businesses see an optimal application service level delivery and receive a fast return on their investment in any network configuration.

Radware’s next generation application delivery controller (ADC) is the only ADC that guarantees application service levels with the ability to assign a fully isolated vADC per application or service. Alteon NG offers high vADC density and has a deep set of integrated security capabilities, including DDoS, SSL inspection, WAF, device/user fingerprinting, and defense messaging capabilities.

Radware’s unified management and orchestration framework for ADC and security technologies provides customers with a full array of models from production level testing/evaluation software versions on up to carrier-grade platforms.

Radware includes application performance monitoring (APM), single sign-on (SSO), web application firewall (WAF), advanced Denial of Service (ADoS), multi-homing/enterprise gateway, and web performance optimization (WPO) capabilities as advanced services within their ADC technology. Radware application delivery architecture supports SDN and NFV environments to meet the evolving data center environment requirements. Radware also integrates with industry-leading infrastructures, including Cisco’s ACI, VMware NSX, OpenStack, Ansible, Chef and Puppet.

The company has also offered for more than half a decade a ‘pay-as-you-grow’ software upgrade model for its platforms, which has extended over the years to other products in its portfolio to ensure customers enjoy the best price-to-performance solutions to meet growing and not stagnant or locked-in bandwidth needs.

Trachtman added, “We are dedicated to delivering the most advanced, agile and powerful solutions in the industry no matter how standard, hybrid or cloud-based an infrastructure may be.”

The description for the leaders quadrant according to Gartner is as follows: “a Leader exhibits the ability to shape the market by introducing capabilities in its product offerings and by raising awareness of the importance of these features. Key capabilities for a Leader in this market revolve around enterprise application functionality. We expect a Leader to have strong or growing market share and to have solutions that resonate with an increasing number of enterprises. We expect Leaders to release ADC capabilities (deployment models, features, pricing models and so on) well in advance of mainstream enterprise demand. A Leader must exhibit expertise in complex enterprise application environments and offer a range of deployment models.”

RAH Infotech recently added another feature in its cap of strong business partners. The company has tied up with Data Resolve, an emerging player in the area of Cyber Security and Intelligence for Enterprises.

Dhruv Khanna, CEO & Director, Data Resolve Technologies shared “ We are focused on addressing issues related to corporate fraud, data leak and employee productivity with security analytics via end points, from in-premise and on-cloud platforms, with products christened as “inDefend – Solution for Insider Threat Management for Desktop and Laptops” and “MobSec – Solution for Mobile Workforce Management for Smart Devices”.

“We are excited to take our business to newer heights with this association with RAH Infotech. They clearly are leaders in value added distribution and solutions provider in the Network and Security domain”, added Mr. Khanna.

The constant barrage of cyber-attacks and threats has created a need to prevent data leak attempts from inside and outside the organization. Although many solutions are available in the market today that focus on preventing data leakage but they fail to launch attempts to inhibit internal digital impendence before it consumes the entire organizations’ resource.

Mr Ashok Kumar, chief executive officer at RAH Infotech said, “Data Resolve Technologies is in the prime business of providing detailed real-time information on data leakage reducing the business risks and protecting data from insider threats throughout its lifecycle. The core concept behind their technology is to help organizations detect human behaviour well before incidents occur including time spent by end users in productive and unproductive work, sensitive online searches and chats among the peers. We are delighted to be associated with Data Resolve and are looking forward taking their solutions to our customers” he added.

Rad

Radware 2016 Executive Application & Network Security Survey Also Finds Telecommuting, Internet of Things, and Wearables Are Among Rising Security Concerns.

How many businesses will pay a ransom if attacked? It might depend on if they have already been a victim of ransomware. Some 84 percent of U.S. and U.K. information technology executives at firms that had not faced ransom attacks said they would never pay a ransom. But among firms that had been attacked, 43 percent paid, according to Radware’s 2016 Executive Application & Network Security Survey.

Radware, a leading provider of cybersecurity and application delivery solutions ensuring optimal service level for applications in virtual, cloud, and software-defined data centers, polled more than 200 IT executives across the U.S. and U.K. The study found that U.S. companies were far more willing to admit that they would pay a ransom. Among U.S. firms who had not been attacked, 23 percent indicated they were prepared to pay a ransom, in contrast to the 9 percent in the U.K.

Companies that paid ransoms reported an average of $7,500 in the U.S. and £22,000 in the U.K.

“This is a harbinger of the challenging decisions IT executives will face in the security arena,” said Carl Herberger, Radware’s Vice President of Security Solutions. “It’s easy to say you won’t pay a ransom until your system is actually locked down and inaccessible. Organizations that take proactive security measures, however, reduce the chance that they’ll have to make that choice.”

In addition to the responses to ransom attacks, Radware’s 2016 Executive Application & Network Security Survey found which security threats most weigh on the minds of the C-suite and senior executives.

Former hackers are seen as reliable watchdogs: Senior executives see former bad guys as the best way to test their systems. Some 59 percent of respondents said they either had hired ex-hackers to help with security or were willing to do so, with one respondent saying, “Nothing beats a poacher turned gamekeeper.”

Firms see telecommuting as security risk: Work-from-home arrangements are seen as an increasing risk. The survey found a big jump in changes to telecommuting policies, with 41 percent of respondents saying they have tightened work-from-home security policies in the last two years.

Wearables require more than a dress code: While about one in three companies implemented security policies around wearables in the last two years, 41 percent said they still have no rules in place, leaving a growing number of end points potentially vulnerable. Perhaps this is because wearables aren’t seen as a major target—only 18 percent pointed to wearables when asked what hackers would most likely go after in the next three to five years.

New connected devices will be the next security frontier: While wearables were less of a concern, many executives surveyed think the Internet of Things (IoT) could become a bona fide security problem. Some 29 percent said IoT devices were extremely likely to be top avenues for attacks, similar to the percentage of nods received for network infrastructure, which received 31 percent.

Cleaning up after a cyberattack can be expensive: More than a third of respondents in the U.S. said an attack had cost them more than $1 million, and 5 percent said they spent more than $10 million. Costs in the U.K. were generally lower, with 63 percent saying an attack had cost less than £351,245 or about $500,000, though 6 percent claimed costs above £7 million.

Security risk is business risk: Whether motivated by ransomware or another factor, attacks impose significant reputational and operational costs on victims. When executives named the top two risks they face from cyberattacks, brand reputation loss led the pack, with 34 percent of respondents choosing that as a big fear. Operational loss (31 percent), revenue loss (30 percent), productivity loss (24 percent), and share price value (18 percent) were also included in the top concerns.

Methodology:

On behalf of Radware, Merrill Research surveyed 205 IT executives (104 in the U.S. and 101 in the U.K.) in April and May 2016. To participate in the 2016 Executive Application & Network Security respondents were required to be at a company with at least $50 million (or equivalent) in revenue and hold a title of senior vice president level or higher. By design, the survey’s respondents were equally split between C-level executives and senior vice presidents. About half of the companies in the survey have 1,000 to 9,999 employees, averaging about 3,800.

THIS PRESS RELEASE AND THE SURVEY ARE PROVIDED FOR INFORMATIONAL PURPOSES ONLY. THESE MATERIALS ARE NOT INTENDED TO BE AN INDICATOR OF RADWARE’S BUSINESS PERFORMANCE OR OPERATING RESULTS FOR ANY PRIOR, CURRENT OR FUTURE PERIOD.

Posted by: RAH Infotech | June 28, 2016

Next-Gen NAC: A Game Changer in Network Security Solutions

Authored By Ashok Kumar, MD & CEO, RAH Infotech Pvt. Ltd.
NAC’s incarnation, next-gen NAC, offers tremendous value and advantages that can be applied across a variety of security requirements, policies, and controls

Not a day passes without the news of a major data breach. Although enterprises are spending billions on network defences, they are constantly being subjected to attacks that seem to confound all. According to the 2015 Cyber Threat Defense Report, more than 71% of respondents’ networks were breached and nearly 60% have reported an increase in mobile threats.

Cyber threats are constantly evolving and becoming more sophisticated than ever. The attackers are organized, skilled, and highly motivated. They know that it’s easier to compromise vulnerable endpoints than to directly target servers and databases. On their part, companies too make their vulnerabilities evident when they fall behind in undertaking patching efforts, have inactive host defences, and lack BYOD controls. They find it difficult to secure their weakest links: mobile phones, social media, and laptops and tablets. With most of the users having active social accounts on their mobiles and tablets, attackers indulge in tactics such as spear phishing and waterholing to trick unsuspecting users into sharing access credentials or downloading malware-infected files. Once the users have fallen to the ruse, it takes only a moment for hackers to breach the security and exploit other less secure systems.

The Second Coming of a New, Powerful NAC

Capture1

Network access control (NAC) has always been the talk of IT security professionals for well over a decade since it first made its appearance. NAC is a network security solution designed to grant, limit, or deny access to network resources through policies defining acceptable or unacceptable users, devices, and application properties. It provided them with a means to limit access to healthy devices. But device authentication came at a cost: it was cumbersome, costly to implement, and often disrupting users. As organizations begin to tolerate wireless, mobile devices and institute bring-your-own-device (BYOD) polices, the chorus grew for a new, powerful network defense system: the next-gen NAC. The need was very specific: a real-time network visibility, a flexible architecture, limitless policy options, and automated endpoint remediation. Organizations were no longer taking lightly for defense solutions that were limited to managed devices and ‘grant or entry’ network access policies.

There are three primary reasons why many companies are adopting NAC at a furious pace: a complex network infrastructure with inherent control and endpoint visibility gaps; the unfettered practice of BYOD polices; and the need to mitigate advanced threat.

Mitigating Threats with Next-Gen NAC

As attackers are easily able to spot and compromise vulnerable endpoints, it is necessary to prepare the defenses using next generation network access control (NAC) implementations. NAC is particularly effective at addressing security gaps introduced by transient network devices. When a threat is evident, it performs the following functions:

  • Alerting you to compliance violations
  • Keeping noncompliant, vulnerable endpoints off the network
  • Remediating vulnerabilities and security misconfigurations directly or via third-party systems
  • Ensuring that host defenses are installed, up-to-date, properly configured, and enabled

Capture2

When configured optimally, the next-gen NAC will provide you with more endpoint intelligence than you ever dreamt possible. It will give you a bird’s eye-view of the entire network ecosystem in real-time: devices and their types, operating systems, applications, virtual machines, security risks, network locations and a lot more.

Leveraging Next-Gen NAC

Research studies indicate that companies know approximately 80 percent of what is on their network, and at any given time, as many as 50 percent of those devices have a security or configuration issue. A full-fledged next-gen NAC can see and control—in real time—including visible and nonvisible endpoints, network devices, applications, and users. Well-equipped with passive and active network discovery techniques, today’s next-gen NAC solutions provide unprecedented, real-time network visibility to security professionals. However, a lot of misconceptions about NAC continue to dominate industry professionals, and this is fueled by the restrictions of legacy NAC offerings. At any rate, the next-gen NAC is widely gaining recognition as a core security platform and is poised to help organizations address challenging IT security issues.

Posted by: RAH Infotech | June 21, 2016

RAH Infotech Appointed National VAD by ContentKeeper

The tie-up will further strengthen RAH Infotech’s network security portfolio with proven web security solutions to secure today’s Web 2.0 and mobile centric business environments.

RAH Infotech appointed as the National Value Added Distributor (VAD) by Contentkeeper. The offerings will include providing solutions that enable organizations to protect and control gateway Internet access and to embrace mobile technology, social media and cloud-based services without compromising security.

Ashok Kumar, chief executive officer at RAH Infotech said, “ContentKeeper’s advanced, multi-layered behavioral analysis technology with high speed SSL (decrypted) packet inspection ensures mission critical Internet resources and services are protected – regardless of the device being used or where employees are. We are happy to bring their state of the art solutions to customers in India.”

“RAH Infotech has always served their customers with the best-of-breed solutions from top technology players and they continuously make efforts to enrich their portfolio and align with the customer’s evolving requirements”, further added Kumar.

“RAH is a fast growing value added distributor in India and this partnership is surely a win win for both. We look forward to working with RAH Infotech and am sure this association would lead to greater growth and a strong foundation that would help expand our business in the country,” said Pankaj Saroha, Country Manager, ContentKeeper Technologies.

Older Posts »

Categories