Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

Industry-leading Linux-based OS and Universal Management Suite (UMS5) deliver efficiency, security and automated remote endpoint management for the Samsung TC222L and TC242L cloud displays


LONDONIGEL Technology, a world leader in the delivery of powerful workspace management software, software-defined thin clients, and thin and zero client solutions, announced that it recently formed an alliance with Samsung Electronics. As part of the agreement, IGEL Linux OS and IGEL Universal Management Suite (UMS) software is now being leveraged by Samsung Electronics to power its TC222L (21.5”) and TC242L (23.5”) thin client cloud displays.


“IGEL Technology is committed to delivering innovative and cost-effective software solutions that drive performance, increase efficiencies and support secure and stable end-user computing environments,” said Simon Richards, Managing Director for UK & Ireland at IGEL Technology. “Samsung Electronics’ selection of our powerful workspace management solutions, including the embedded Linux OS and IGEL Universal Management Suite, provides external validation of our position as a market leader. We are proud to be partnering with them in the delivery of their new TC-L Series all-in-one thin client displays, and look forward to expanding our reach into new market sectors and geographies through this alliance.”


IGEL’s Linux OS brings broad feature set to the Samsung TC-L Series thin client cloud displays that includes remote access and reliable multi-protocol connectivity to mainstream VDI environments and cloud resources such as Citrix, VMware and Microsoft. Leveraging any one of these protocols, end-users can securely consolidate their desktop applications and infrastructure into a series of cloud-based virtual applications and desktops.


Through the IGEL Universal Management Suite (UMS) software, users of the Samsung TC-L Series thin client cloud displays also benefit from a robust and secure standardized endpoint management system that enables the cost-effective management of any terminal device running the IGEL Linux OS. Additionally, with IGEL’s UMS, IT organizations gain added visibility into their clients’ configurations, and can automatically apply configuration adjustments to an entire deployment of thin client assets throughout the enterprise.


“Today’s enterprises need state-of-the-art, yet cost-effective end-user computing solutions that offer the flexibility to support remote operations, while safeguarding against evolving security threats,” said Greg Spence, Senior Business Development Manager, Samsung Electronics. “Our TC-L series thin client displays, powered by IGEL’s market-leading workspace management software, offer our enterprise customers a cost-efficient and secure all-in-one thin client design that is ideal for any business environment.”


About IGEL Technology

A world leader in the delivery of powerful remote management software, software-defined thin clients, and thin and zero client solutions, IGEL Technology helps organizations improve the agility, efficiency, and security of their virtual desktop and application delivery systems.

IGEL produces one of the industry's widest range of hardware thin and zero clients, based on Linux and Microsoft Windows, and leads the market in software based thin clients allowing customers to access a broad spectrum of server-based infrastructures and applications. IGEL also offers powerful and intuitive management software for easy deployment and administration of thin clients throughout any size organization. Partnerships with industry leaders including Citrix, VMware, Red Hat, Microsoft and Cisco, ensure that IGEL provides the most up-to-date technology and trustworthy security to clients in industries that include Healthcare, Education & Research, Public Sector, Financial, Insurance, Retail, Logistics, and Manufacturing.

IGEL has offices in the United Kingdom, Australia, France, the Netherlands, Austria, Belgium, Switzerland, Sweden, the United States and Germany and is represented by partners in over 50 countries worldwide. To learn more, visit www.igel.com/us or follow us on Twitter at www.twitter.com/IGEL_Technology.

Cyber Security Practice established at Zycko Benelux


LONDON – Zycko, part of the Nuvias Group, announces it has been appointed value-added distributor in Benelux for WatchGuard Technologies. Together with Arbor Networks, for whom Zycko is already a value-added distributor, these two companies make up the new Cyber Security Practice in Benelux, also being announced by Nuvias today. Another major security vendor signing is expected very shortly. Cyber Security is one of three current ‘Practices’ within Nuvias Group, which will form part of a complete solution for reseller partners and end users in the Benelux region.



WatchGuard, a provider of integrated security solutions, has been a long term partner of value-added distributor Wick Hill, also part of the Nuvias Group, in the UK and Germany. As WatchGuard was looking to expand further in the Benelux region, it took the opportunity to appoint Zycko, Wick Hill’s sister company under the Nuvias Group umbrella, as a Benelux distributor.


Jonathan Whitley, area sales director Northern Europe, for WatchGuard Technologies, commented: “The Benelux market is very important for us and we’re really keen to be working with Zycko to grow that market further. Zycko is forming a massive cornerstone of our expansion plans for the region and we anticipate major growth in our channel presence there. We’re impressed by the Nuvias concept of providing high value-add consistently across regions. With the Nuvias Group, we’re able to leverage the security expertise of Wick Hill, and combine it with the strong presence in Benelux of Zycko, for maximum effect.”


Arbor Networks

Since it launched Arbor Networks in Benelux in 2015, the Zycko team has been working with a handful of specialist local reseller partners and building its knowledge and experience of Arbor’s technology. The creation of the dedicated Cyber Security Practice in Benelux, with its greater focus on security, will accelerate the growth of Arbor in the region.


Paul Eccleston, head of Nuvias Group, commented: “We’re delighted to be launching our Cyber Security Practice today in Zycko Benelux, which draws on the in-depth experience and reputation of leading security VAD Wick Hill, Zycko’s sister company in the Nuvias Group. We now have two very important vendor security partners in the Cyber Security Practice - WatchGuard and Arbor - and will be announcing a third shortly. We’re very excited about the opportunity to help our vendor partners build and grow further in Benelux.”


About WatchGuard Technologies, Inc.

WatchGuard® Technologies, Inc. is a global leader in network security, providing best-in-class Unified Threat Management, Next Generation Firewall, secure Wi-Fi, and network intelligence products and services to more than 75,000 customers worldwide. The company’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for Distributed Enterprises and SMBs. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.


About Arbor Networks

Arbor Networks, the security division of NETSCOUT, helps secure the world’s largest enterprise and service provider networks from DDoS attacks and advanced threats. Arbor is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor’s advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market-leading analytics for dynamic incident response, historical analysis, visualization and forensics. Arbor strives to be a “force multiplier,” making network and security teams the experts. Arbor’s goal is to provide a richer picture into networks and more security context so customers can solve problems faster and reduce the risks to their business.


About Nuvias Group

Nuvias Group is the distribution business being built by Rigby Private Equity (RPE) to redefine specialist high value distribution across EMEA. The Group provides a common proposition and consistent delivery in the EMEA region, allowing channel and vendor communities to deliver exceptional business value to their customers, and enabling new standards of channel success.

The Group today consists of Wick Hill, an award-winning value-added distributor with a strong specialisation in security; and Zycko, an award-winning, specialist EMEA distributor, with a focus on advanced networking. Both companies have proven experience at providing innovative technology solutions from world-class vendors, and delivering market growth for vendor and reseller partners alike. The Nuvias product portfolio encompasses networking, infrastructure, security, communications, storage, continuity, recovery, access, performance, monitoring and management. The Group has thirteen regional offices across EMEA and a turnover in excess of US$ 350 million.

Although major hacks generate news headlines, most companies and institutions quietly contend ongoing web-based probes and attacks, with the average CISO at the largest businesses managing ecosystems of 50-75 vendors in hopes of catching security breeches.

Level 3, a leading telecom and Internet services provider (also one of the world’s dozen-plus tier one, or backbone networks), has innovated a different solution, one that uses predictive behavior mapping to help stop attacks before they can happen.



Tuesday, 26 July 2016 00:00

P&C Insurers Face Lower Profit Margins

High insured losses from natural catastrophes, challenges from the personal auto business and pricing competition will make it more difficult for the property and casualty industry to maintain the favorable underwriting results it has seen for the past three years, according to S&P Global Market Intelligence.

In its U.S. P&C Insurance Market Report, S&P predicts an increase in the industry’s statutory combined ratio to 99.5% in 2016 from 97.6% in 2015 and reduction of pretax returns on equity to 8.7% from 10.8%—or to 7.5% from 9.9% when adjusting for the impact of prior-year reserve development.

“Profit margins are projected to be much narrower than they have been in the last few years, unless something dramatic happens,” report authors Tim Zawacki, senior editor and Terry Leone, manager of insurance research at S&P Global Market Intelligence said in a statement. “While insurers have wisely accounted for the fact that they haven’t been able to depend on investment gains to subsidize underwriting losses, they still need to practice restraint as they seek growth.”



Business analysts or product owners developing software requirements in a regulated industry have surely encountered the challenges that come with defining and managing regulatory compliance requirements. And unfortunately, those requirements are among the most critical to get right. Faulty compliance requirements not only put your projects at risk, but they can put your organization itself in a dangerous position legally and financially.

Understanding the challenges associated with defining and managing high-quality regulatory compliance requirements is the first step to doing just that. Here are six challenges that top the list:



Cognitive computing is starting to impact the enterprise by changing the way data is analyzed and the manner in which employees and customers interact with computerized systems. This is happening across various industries, ranging from healthcare and retail to banking and financial services. Since I have been delving into the financial area of late, I wanted to provide a glimpse into how banks and other financial institutions are utilizing cognitive applications and commercial solutions within their organizations.



How mature is your organization when it comes to business continuity? Does your business continuity management (BCM) program crawl, walk or run? From self-governed to synergistic, we have identified six levels of BCM maturity that most companies fall into. What is your organization’s level? Here is our breakdown:



PwC analysis identifies the 'Essential Eight' technologies that businesses should consider
NEW YORK – With no shortage of technological breakthroughs affecting businesses today and many moe on the horizon, how can C-suites develop effective emerging technology strategies?
For its new report, Tech breakthroughs megatrend, PwC evaluated more than 150 technologies globally and developed a methodology for identifying those which are most pertinent to individual companies and whole industries. The result is a guide to the “Essential Eight” technologies PwC believes will be the most influential on businesses worldwide in the very near future:
  • Artificial intelligence
  • Internet of Things
  • Augmented reality
  • Robots
  • Blockchain
  • Virtual reality
  • Drones
  • 3D printing
The specific technologies that will have the biggest impact on each industry will vary, but PwC believes the list of eight comprises technologies with the most cross-industry and global impact over the coming years.
“Most companies have laid a foundation for emerging technology, investing in areas such as social, mobile, analytics and cloud,” said Vicki Huff Eckert, PwC’s Global New Business Leader. “Now it’s time for executives to take a broader view of more advanced technologies that will have a greater impact on the business.”
To arrive at the Essential Eight, PwC filtered technologies based on business impact and commercial viability over the next five to seven years (as little as three to five years in developed economies). The specific criteria included a technology’s relevance to companies and industries; global reach; technical viability, including the potential to become mainstream; market size and growth potential; and the pace of public and private investment.
What makes technological breakthroughs a megatrend? 
Companies continually wait for the “next big thing,” believing that a particular technology trend either won’t amount to much, or that it won’t affect their industries for years to come. But disruption is happening today at a faster rate and higher volume than ever before. Innovations throughout history have tipped the balance in favor of the innovators. In that sense, technological breakthroughs are the original megatrend. The ubiquity of technology, with increased accessibility, reach, depth, and impact are what will expedite adoption of the Essential Eight.
Key questions and actions for the C-suite
PwC believes the Essential Eight technologies will shake up companies’ business models in both beneficial and quite challenging ways. Across industries and regions, the emerging technology megatrend will influence strategy, customer engagement, operations and compliance. As a result, leadership teams should find effective answers to three fundamental questions:
  • Do we have a sustainable innovation strategy and process?
  • Have we quantified the impact of new technologies? If not, how can we do that—and how soon?
  • Do we have an emerging-technologies road map? If so, are we keeping it up to date?
According to PwC’s report, executives should not treat the Essential Eight technologies as a sort of checklist to delegate to the CIO or CTO. Rather, exploring and quantifying emerging technologies—and planning for them—should be a core part of a company’s corporate strategy.
Before developing an innovation strategy and exploring and quantifying emerging technologies, executives should educate (or re-familiarize) themselves with these technologies and what they can do. Explore PwC’s Tech Breakthroughs Megatrend site and download the new report at www.pwc.com/TechMegatrend.
About PwC
At PwC, our purpose is to build trust in society and solve important problems. We’re a network of firms in 157 countries with more than 208,000 people who are committed to delivering quality in assurance, advisory and tax services. Find out more and tell us what matters to you by visiting us at www.pwc.com​.
© 2016 PwC. All rights reserved. PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure​ for further details.

OpenStack, the open source project that allows enterprises to run an AWS-like cloud computing service in their own data centers, added support for containers over the course of its last few releases. Running OpenStack itself on top of containers is a different problem, though. Even though CoreOS has done some work on running OpenStack in containers thanks to its oddly named Stackanetes project, that project happened outside of the OpenStack community and the core OpenStack deployment and management tools.

Soon, however, thanks to the work of Mirantis, Google and Intel, the OpenStack Fuel deployment tool will be able to use Kubernetes as its orchestration engine, too. Ideally, this will make it easier to manage OpenStack deployments at scale.

“With the emergence of Docker as the standard container image format and Kubernetes as the standard for container orchestration, we are finally seeing continuity in how people approach operations of distributed applications,” said Mirantis CMO Boris Renski. “Combining Kubernetes and Fuel will open OpenStack up to a new delivery model that allows faster consumption of updates, helping customers get to outcomes faster.”



Stephen Cobb from ESET wrote a blog post last week discussing the security of today’s computer-driven vehicles and the threat of malware infection. Cobb specifically talks about what is called jackware, which he described as:

malicious software that seeks to take control of a device, the primary purpose of which is not data processing or digital communications. . . . So think of jackware as a specialized form of ransomware. With regular ransomware, such as Locky and CryptoLocker, the malicious code encrypts documents on your computer and demands a ransom to unlock them. The goal of jackware is to lock up a car or other device until you pay up.

Cobb made a point that I think we need to start talking about more often and that is the insecurity of the Internet of Things (IoT). Actually, Cobb called it the Internet of Insecure Things. It is clear to see why security of these devices has to become a higher priority: a Vodafone study found that more than 75 percent of businesses find IoT is a critical part of their tech infrastructure, but they recognize the risks involved:



Page 5 of 1041