Archive for Lipiec, 2013

Pannar Seed brings production in-house with digital Xerox press

By admin, 30 lipca, 2013, No Comment

In a move away from outsourced litho printing, Pannar Seed’s in-house media and printing service department has bought a Xerox Colour X1000 digital press from Bytes Document Solutions (BDS), Africa’s leading document management technology and services company, and the largest Xerox distributor in the world.

Headquartered in Greytown, KwaZulu-Natal, Pannar Seed is one of South Africa’s top seed groups and the largest field crop seed producer and supplier in Africa. Pannar has been in the African seed business since its inception in Greytown, South Africa in 1958 and was the first private company to introduce its own maize hybrids in South Africa in the 1960s. Over the years it has expanded its research and commercial activities into various other crops and territories.

“In the past, we outsourced much of our printing and it became important for us to bring those jobs back in house. We wanted to regain control over the quantities and print materials as they were requested,” Andre Strydom, printing media manager, Pannar Seed adds. “Before we bought the X1000 we would have to overprint and keep a big inventory. If changes were made to the printed materials, we would have to write them off. Now we can print as and when needed.”

Because Strydom’s department relies on short runs and on-demand printing, going digital made sense. His department needed a press that would deliver sharp, rich, digitally mastered image quality at high speed, while reducing costs for his print shop.

The clear varnish option provided by the Xerox X1000 was used for printing moisture-proof labels for Pannar’s seed tins, to ensure that the labels are protected from condensation while the tins are kept in storage.

Strydom and his team can now also offer the company unique, spot-coated solutions in short runs, jobs which were previously prohibitive and required a much larger volume to justify the expense.
“The variable ‘varnish’ option, a clear dry ink, gives us print materials that stand out in the crowd. It really adds impact to documents,” he adds.

He says Pannar Seed has always received great service and support from Xerox and the Bytes Documents Solutions team. “We have been very impressed with BDS’s service. The staff from the Xerox dealer, XTEC, in Pietermaritzburg can also be relied on no matter what.”

Pannar Seed’s business is seasonal and the demand on the printing department fluctuates during the year according to planting and harvesting periods but Strydom says that, on average, the X1000 is used all day every day. “The press is so productive that it will also prompt us to get work from outside the company, which could be a good revenue booster for us.”

Paul Haglich, marketing manager for production systems at Bytes Document Solutions, says the investment in the Xerox X1000 was a far-sighted move for Pannar Seed. “This is the best short-run, high-volume digital colour press available today. The X1000 allows print shops and departments to produce more high-quality jobs and reduce costs.”


Cloud back-up and disaster recovery: You do need both

By admin, 30 lipca, 2013, No Comment

By Gareth Tudor, CEO of Altonet

As more organisations become comfortable with cloud-based back-up solutions, it is becoming increasingly important to understand exactly what level of recovery their solution provides. While backup is an important part of Disaster Recovery (DR), it is only one component of a full DR system. Just because you have a backup solution in place, does not necessarily mean that you have DR. For a DR plan to be successful, a number of other parameters and components need to be taken into consideration.

The goal of every DR plan is to get the organisation back up and running quickly in the event of a disaster. What, how and how often backups are scheduled is an important part of this equation: they will help determine how easily and comprehensively you can recover your operational systems in the event of a disaster and will also impact the rate of recovery, which can directly correlate to potential business loss.

The benefits of cloud-based backup
Cloud-based backup is appealing because it minimises the effort associated with traditional backup processes. Traditional backup typically involves the use of hard disks and/or tape storage, and the subsequent removal and storage of this media offsite. With a cloud-based backup solution, an onsite appliance performs an internal backup and then uses a Wide Area Network (WAN) connection to store the data offsite “in the cloud”. Once the first set of internal data is stored, only incremental backups are necessary, minimising the cost per gigabyte of sending that data to offsite storage. Backed up data may be replicated on a number of cloud servers, depending on the risk profile of the organisation.

There are a number of advantages to cloud-based backup. The backups are automated, so complexity and human error are eliminated as staff need not get involved. A central Web-based console provides status notification, management, and the ability to configure and schedule backups from anywhere. Data is propagated via the WAN, so is safely stored offsite without needing to add risk to the process through physical handling of storage media. There is also the elimination of effort and risk in terms of scheduled media delivery to or from physical offsite storage.

To maximise these benefits however, organisations need to understand how a disaster may impact their operations – and the role of backups. Data backups may allow the organisation to restore lost data, but this is not enough when disaster of any type occurs, be it a fire or other natural disaster, hardware failure, a virus, human error or a security breach. When this kind of disaster occurs, system state files are needed to restore the servers back to “current state”.

Prioritising, assessing, scheduling
In the event of a disaster, for the majority of businesses the priority is to keep revenues flowing and customers happy. To do this, key systems need to be made operational as soon as possible: communication and customer engagement channels need to be up, transactional systems need to be accessible, and customer databases and logistics and tracking systems need to be functional.

Determining this is the easy part. The not-so-easy part is knowing what kind of “hit” in terms of data loss the business can take on which systems, and putting in place a data backup and recovery solution to meet those needs.

Three key objectives can help organisations decide what will work for them:

  • Recovery Time Objective (RTO) defines how fast you need to find, access and retrieve information – that is, how fast does the organisation need to be up and running? A key challenge related to cloud-based backup and recovery is that recovery is dependent on the speed of the network. The capacity of last mile connectivity thus needs to be considered.
  • Recovery Point Objective (RPO) defines the point-in-time (PIT) that needs to be recovered and is a measure of tolerance for data loss.
  • Recovery Granularity Objective (RGO) defines how granular recovery needs to be: at a file level or at a transaction level (continuous data protection). A backup update can be made every 15 minutes on key systems or every eight hours on databases.

Cloud-based backup and recovery providers need to leverage best practice data recovery concepts like these to assess and deliver on the needs of clients who regularly backup and archive – from a few gigabytes to many terabytes of data – using different strategies. It is important to mitigate risk around data loss, not only for the business but also for clients and other stakeholders. As regulations around data usage, management and storage become stricter, the principles and practices of disaster recovery will become increasingly important to understand. Backup is a core component of disaster recovery, and as such, is a good place to start.


Make the most of collaboration and avoid common mistakes

By admin, 30 lipca, 2013, No Comment

By Frank Reinelt, Senior Director for Northern Europe & Emerging Markets at Mindjet

Collaboration is vital to an agile business, plus it is one of the best ways to be effectively creative. That is, by bringing together limited resources, people and great ideas, collaboration plays an important role in companies rising above the rest and remaining ahead of their game.

To help teams to capitalise on collaboration on their way to the top, the following four tips are offered:

1. Every cell needs a nucleus

Collaboration works because it makes the most of the resources at hand by aggregating them and abandoning traditional hierarchies — but that’s not to say that form and leadership should be tossed out the window. Think of collaborative teams as cells. Every part has a function, but none of the pieces can get much done without the nucleus. Team leaders matter, even if they’re more of a mediator than a commander. Putting someone at the core of the group doesn’t diminish collaborative efforts; instead, it focuses them and provides support for the team.

2. One bad apple

Because collaboration is such an interdependent activity, it doesn’t take much to trip it up. If a problem can be eradicated, it needs to be. Issues like unnecessary paperwork or a team member that’s not really invested in outcomes, can cause dissension and delays. Finding the weaknesses in a team or process and weeding them out as they’re discovered isn’t going to waste nearly as much time as re-doing work.

3. Not everyone is created equal

Another misconception about collaboration: everyone involved has to put forward the same time and effort, and produce a commensurate number of deliverables, as everyone else. Truth is, collaboration is more about balance and working in unity in order to achieve milestones.

4. Two heads at first might be better than 12 at once

Collaboration is more of an evolving process that starts with one or two people, eventually swelling out to include others or, when one person’s role is complete, releasing them. And that’s totally okay — in fact, it’s smart to utilise collaboration’s pliability. Reprioritisation, turnover and disruption become much less impactful when the structure of your partnership or team isn’t entirely dependent on a fixed foundation.

As you put these tips into play, it is also important to focus on the following four collaboration mistakes and how to avoid them.

1. Hearing what you want is not collaboration

All it takes to kill cohesion is willfully ignoring ideas that don’t precisely fit stakeholder agendas. Remember, there are no stupid ideas. Which means the team can’t shut down or shut out suggestions. Rather collect all information and prioritise it. This way it acknowledges everyone’s contribution to the effort.

2. We are not all on the same (web) page

Not everyone uses the same tools when they work together on a project. But often, people make the cavalier assumption that everyone they’re collaborating with is already making use of the same stuff. The immediate solution could be to lay down an edict about which devices or programs are “allowed,” and that might work for a minute. But beware — people generally work the way that they do because it’s the most effective way for them to get things done, and you could simply be asking them to disrupt their processes or duplicate them. That definitely doesn’t mean you shouldn’t encourage the team to at least perform project-specific tasks using one method, but be prepared to train individuals, answer questions, and most importantly, demonstrate the value of the tools you’ve chosen.

3. Don’t wash your hands of the project entirely until the deadline hits

People need motivation and reassurance, and in fact, recognition for a great idea or a job well done is often cited as the number one driver behind effective, passionate employees. Peer support is important, but endorsement from stakeholders is validating and fuels ambition.

4. Lastly, don’t be anti-social

The untapped possibilities are surprising. A 2012 McKinsey & Company report states, “The average interaction worker spends an estimated 28 percent of the workweek managing e-mail and nearly 20 percent looking for internal information or tracking down colleagues who can help with specific tasks. But when companies use social media internally, messages become content; a searchable record of knowledge can reduce, by as much as 35 percent, the time employees spend searching for company information.”

In terms of collaboration, that means more time spent doing and a lot less time figuring out what you should be doing.

Adapt IT honoured as SAP African Partner of the Year in the “Managed Cloud as a Service” category

By admin, 30 lipca, 2013, No Comment

Adapt IT, a dynamic growing company providing specialised business applications in the manufacturing, mining, higher education and financial services sectors has been honoured as the SAP Africa Partner of the Year in the “Managed Cloud as a Service” category at the recent SAP partner summit in Cape Town on July 18, 2013. Adapt IT has built a solid SAP ERP Human Capital Management (SAP ERP HCM) solution with Payroll functionality that has been localised to fit many of the countries’ needs on the African continent and is available to a variety of customers regardless of the size of their business.

“The introduction of the “Managed Cloud as a Service” category into our annual partner awards programme is recognition of the speed at which cloud services are maturing,” says Pankaj Bhula, head of strategic partners Africa, Ecosystems and Channel Division, SAP South Africa.

“Delivering SAP solutions via managed cloud as a service offering requires a combination of technological expertise and business acumen that places these providers at the forefront of where cloud is going within the SAP ecosystem,” adds Bhula. “We congratulate Adapt IT on its well-deserved receipt of this award and for its outstanding partnership with SAP. Partners like Adapt IT are our force multipliers and today, more than ever, they are essential to our customers’ success.”

Sbu Shabala, Adapt IT CEO, expresses his delight at the award, “We are a dynamic company with the energy and vision to deliver cutting-edge IT services. Managed cloud as a service offers clients a way to gain flexibility and scalability with minimal risk and maximum benefits. We are proud to be defining it in the SAP world.”

“Adapt IT cloud solutions obfuscates the complexity of delivering IT services to our customers. Customers need not worry about the underlying IT infrastructure and can focus on the use, development, or administration of the services themselves. This is a powerful paradigm shift as our cloud solutions are always on, infinitely elastic, highly reliable, secure, and return a solid Return On Investment (ROI),” says Shabalala.

Samsung Electronics announces earnings for Q2 in 2013

By admin, 30 lipca, 2013, No Comment

Q2 consolidated operating profit reaches 9.53 trillion won (R83 864 billion) on revenues of 57.46 trillion won (R505 648 billion)

Samsung Electronics Co., Ltd. today announced revenues of 57.46 trillion won (R505 648 billion) on a consolidated basis for the second quarter ended June 30, 2013, a 9% increase from the previous quarter. Consolidated operating profit for the quarter reached 9.53 trillion won (R83 864 billion), representing a 9% increase on quarter, while consolidated net profit for the same quarter was 7.77 trillion won (R68 376 billion).

In its earnings guidance disclosed on July 5, Samsung estimated second quarter consolidated revenues would reach approximately 57 trillion won (R501 600 billion) with consolidated operating profit of approximately 9.5 trillion won (R83 600 billion).

In contrast to the first half of last year, revenue was up 19% and operating profit increased 51% in the first half of 2013 as profitability in the components business improved. The profit ratio reached 16.6% in the first six months of the year compared with 13.1% recorded in the same period last year. Samsung expects to see solid growth and the components business’ contribution to profits will gradually increase.

Highlighting the quarterly performance, growth remained steady in high-end smartphone and premium television businesses. Most noticeably, a growth spurt in shipments for OLED panels for smartphones and high consumer demand for air conditioners spurred growth.

Led by the much-awaited launch of GALAXY S4, smartphone shipments and revenue increased from the March quarter. The strong growth streak for the smartphone market is expected to continue in the third quarter albeit at a slower pace.

The components business improved both in terms of revenue and operating profits from a quarter earlier due to a higher demand for mobile device-related parts. However, overall sales of logic chips declined due to lower mobile application processor shipments.

Escalated investments in R&D and in distribution channels, as well as expenses on new product launches have dampened wider gains for IT & Mobile Communications (IM) Division, which encompasses the Mobile Communications, Networks, and Digital Imaging businesses.

“Entering into a typically strong season for the IT industry, we expect earnings to continue to increase. However, we cannot overlook delayed economic recovery in Europe and risks from increased competition for smartphone and other set products,” said Robert Yi, Senior Vice President and Head of Investor Relations.

Mr. Yi added, “We expect to improve profit yields in the second half due to high-margin, differentiated components products, as well as gains stemming from increased smartphone and TV shipments.”

The Display Panel segment’s operating profit jumped 46% on quarter to 1.12 trillion won (R9 856 billion) thanks to strong demand for high value-added panels for IT and TV panels sized 60-inch and over. A mid- to low-end TV line-up targeting emerging markets and a range of premium TV offerings were credited for the Visual Display business’ earnings. As for the next quarter, uncertainties over Europe’s economy and Chinese subsidies for electronics goods could possibly hinder growth.

As for this year’s capital expenditure, Samsung Electronics plans to spend a record total of 24 trillion won (R210 216 billion) an increase of over 1 trillion won (R8 800 billion) from the previous year. This amount may increase depending on market conditions in the second half and the outlook for next year.

The Semiconductor business will invest 13 trillion won (R114 400 billion), while the Display Panel segment will inject 6.5 trillion (R57 200 billion) in capex. The increase in spending is aimed at enhancing Samsung’s competitive edge in growth-generating, high value-added DRAM, NAND and System LSI products. In the second quarter, capex amounted to 5.2 trillion won (R45 760 billion), in which the Semiconductor business was responsible for 2.2 trillion (R19 360 billion), and 1.3 trillion won (R11 440 billion), in spending was accredited to the Display Panel segment. All told, a total of 9 trillion won (R79 200 billion), or 38% of the planned capex investment was made in the first half of the year.

Unsecured virtualized and cloud environments can be a threat to business

By admin, 29 lipca, 2013, No Comment

Securing your virtual environment can cost you two thirds less with agentless security solutions

As virtualized and cloud infrastructure are changing the face of today’s datacentres so too are they changing the way in which we need to approach the security of our IT infrastructures.

According to Gregory Anderson, South African country manager at Trend Micro, throwing a mix of yesterday’s legacy security technologies at today’s IT landscape can open one’s business to serious threats. This can have disastrous effects, impacting performance, increasing complexity and opening gaping holes in one’s security policies.

“The reason organisations and IT professionals are still wary of investing into virtualization and the cloud is very much hinged around the security debate,” states Anderson. “Agentless solutions, such as our Deep Security 9 products, offer what we term “better-than-physical” protection, where a single platform integrates all security technologies and in turn is able to resolve any operational issues that may arise in the virtual environment.”

According to Anderson agent-based security solutions remain limited in what they are able to deliver, whereas agentless appliances can simplify your overall security landscape with particular relevance to accelerating the ROI of cloud-based and virtualized environments.

The agentless nature of Deep Security 9 provides its users with a lighter, more manageable way to secure VMs to help them make the most out of their virtualization and cloud investments. To this end it also strengthens security without additional footprint through agentless integrity monitoring, intrusion prevention, firewall and anti-malware and frees staff from continually configuring, updating, and patching agents. It also protects virtual servers and virtual desktops as they move between datacentre and public cloud.

“Our agentless Deep Security 9 solution is proven to cut the costs of securing your virtual environment by two thirds. So as an example if you were to hypothetically pay 100,000 on an agent, you would only require 30,000 to secure the same environment when using Trend Micro’s agentless technologies. This has been substantiated by recent research and testing performed by the Tolly Group,” adds Anderson.

A major benefit when applying the agentless power of Deep Security 9 in your environment is that you don’t have to rip out and replace your existing security environment. Additionally you can customise and tailor your security environment to include a combination of agentless and agent-based protection, including anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring, and log inspection.

The result is an adaptive and efficient server security platform that protects mission-critical enterprise applications and data from breaches and business disruptions without expensive emergency patching.

“Ultimately an agentless security solution within your virtualized, cloud-based and VM environment will enable you to maximise efficiency and reduce operational costs with lower overheads; it will also allow for greater machine consolidation in virtual environments; eliminates the cost of deploying multiple software clients; provide vulnerability protection and reduce security management costs. In short it’s a win-win solution, taking away the trepidation of moving into the cloud and paving the way for businesses to move into the future,” he ends.


The intracacies of filing an insurance claim

By admin, 29 lipca, 2013, No Comment

Short term insurance policies are guarantees against forking out hefty sums when the worst happens, be it a car accident, theft or damage to expensive possessions. However, simple mistakes on the part of the policyholder when filing a claim can sometimes leave them facing a financial loss if they do not follow the correct procedures.

Christelle Fourie, Managing Director of MUA Insurance Acceptances, says there are basic steps that consumers should consider when they file a claim with their insurance provider to ensure they are aware of what is expected from them and how the claims process will be handled.

Know what your are covered for
Consumers should read their insurance policies to understand what they are covered for, as the policy and type of claim may have a big impact on the outcome. It is also important to speak to a broker, who can explain what stipulations the policy may contain prior to filing a claim. The more you know ahead of the claim, the better.

Act quickly
File your claim immediately, while the incident is still fresh in your memory. The claims process can sometimes become lengthy so consumers need to realise that the sooner they get started, the sooner the process of receiving financial settlement can commence. Most insurance policies also require a claim is reported within a certain time period. If you miss this deadline your claim may not be covered.

Pay attention to detail
Take note of everything that happened before and during the incident. It is also advisable to take photographs if applicable, as well as writing down the details to ensure that you are able to provide all of the information needed to your insurance provider. If a third party is involved, make sure you also take down all of their personal information to ensure they can be reached for further discussions.

Don’t admit liability
When you are involved in an accident with another party, don’t admit liability even if you believe you were at fault. Rather take down all the other party’s insurance details, provide them with yours and submit your claim to your own insurance company as quickly as possible.

Involve the police in the event of a traffic accident
Whenever motorists are involved in traffic accidents it is important to phone the nearest police station to report the accident, even if no one was injured in the incident.

Be honest
When determining which party may have been liable for an accident, it is vital for consumers to be completely honest about how it occurred and who they believe is in the wrong. When not at fault, consumers must also remember not to say anything that can be interpreted as an admission of fault, but when you are at fault it is extremely important to be honest.

Whether you have a car accident, your possessions are hit by hail storms or you damage your plasma TV, filing an insurance claim is something most people have to do at some point in their lives. By following the above tips, filing a claim can be a far smoother process and ensures you get the maximum benefit from your insurance policy.

Woolworths unveils revamped online shopping experience

By admin, 29 lipca, 2013, No Comment

Woolworths has revamped its website with a fresh look and a number of new features to offer its customers an enhanced online shopping experience. Woolworths was recently lauded as one of the top online retail brands of 2013 and is regularly recognized as leading the retail sector in advances in digital and social media.

The new-look online shopping site now offers the full range of Woolworths products. “It features almost everything our customers would find in-store,” says Nikki Cockcroft, Head of Online at Woolworths. “From groceries to clothing, home, beauty and financial services, we’ve integrated all our services into one easy-to-navigate destination.”

“We’ve listened to thousands of Woolworths customers who wanted a simpler, more seamless integration between online and in-store shopping, with the added convenience of being able to access all their Woolies favourites no matter the time, place or device,” explains Cockcroft. “By using responsive design, their shopping experience remains exactly the same regardless of their device of choice – whether it’s a desktop computer, tablet or smartphone.”

More than 2,000 respondents were interviewed during focus group sessions to establish what customers would most like to see from a new Woolworths online shopping experience. The results, which came from both in-store and online shoppers, formed the foundation of the development planning for the revamped site.

Cockcroft adds that Woolworths aimed to create a more enriching user journey through a stronger focus on unique content, more targeted product searches and a smarter shopping experience: “We have used integrated content to enrich the Woolworths online user experience. This means that customers can now shop by recipe, and even by trend which allows for a more personal and rewarding experience.”

Cockcroft says: “The type of content we will be sharing is practical information that our customers can use in their daily lives. It’s like having a really savvy and on-trend personal shopping assistant sharing the best tips on everything from easy-to-follow food recipes, how to care for certain fabrics and dressing for your body shape, to the latest trends, décor make-overs, beauty tips and how-to guides for parents.”

The content has strong social integration, and the site has been purposefully designed to be visually appealing with magazine-style photography and an array of beautifully shot how-to videos.

Although online sales have accounted for a relatively small percentage of Woolworths business to date, the company believes that South Africans will become more enthusiastic online shoppers as bandwidth connections become cheaper and faster, and customers become more comfortable with online and mobile shopping.

Woolworths reports that its number of online shoppers have doubled year on year. Traffic from smartphones increased by 38%, while 8% of traffic came from tablets. At the moment the majority of Woolworths online purchases are for food and household goods, and nearly half of online shoppers shop more than once a month. Although the majority of Woolworths online shoppers are women, the company is seeing more men joining the online shopping world, especially for special occasion gift buying. Most of Woolies online shoppers are based in the major metropolitan areas, with Johannesburg, Cape Town and then Durban leading the charge.

In a report released by World Wide Worx in May last year, it was found that e-commerce in the retail sector in South Africa has seen a 30% consecutive year on year growth since 2009. In 2011 alone, online retail sales figures in South Africa were recorded at R2 636 000 000 and it is expected that the contribution of e-commerce to the country’s Gross Domestic Product (GDP) would increase to 2.5% by 2016.

E-commerce is growing with the advancements in technology and retail is catching up. South African consumers are steadily moving towards online and mobile shopping.

“Digital innovation and integration remains a strong focus for Woolworths and is an integral part of our strategy to meet customers’ expectations for convenient shopping. With all the digital advances our online offering will be an ongoing process of looking at how we conduct business online and ensuring an enriched, seamless customer experience,” concluded Cockcroft.

Woolworths has also managed to empower a business through its growing online customer base. Deliveries for Woolworths online shopping clients are done by Niche Logistics, a business benefitting from the Woolworths Enterprise Development programme.

Absa launches interest-free banking with more savings

By admin, 29 lipca, 2013, No Comment

Absa Islamic Banking has launched the world’s first Islamic Cheque Value Bundle which is a Shari’ah compliant banking solution that presents customers with a bundle of transactions and other services included in a competitive single monthly fee and further cash back on their banking as they add further products to the bundle.

This follows a year after Absa Bank introduced the conventional Value Bundles account which was recognised by 2012’s Finweek Survey of bank fees as the best value transactional option from South African banks.

“Absa’s Islamic Cheque Value Bundle offering will be the first Shari’ah compliant product of its kind to be marketed in the world. With the Value Bundles rebate customers can enjoy monthly savings of up to 70% of their monthly fees depending on the type of account they hold and the number of eligible products they have with us,” said Arrie Rautenbach, Absa Head of Retail Banking.

He adds: “Absa Rewards members could build up even more uncapped cash rewards on Debit, Credit and Cheque card spend with the Value Bundles offering, where customers can earn up to 1% of their spend on any card, regardless of how much they spend.”

The bank said customers with the new Absa Islamic Cheque Value Bundle will receive free Absa Rewards subscription for one year, free bank switching assistance, cash rebates for taking up several other eligible products, discount on the monthly fee for keeping a set positive balance and unique to Absa – the rollover of free unused transactions for one month, among other benefits.

Rautenbach further described the undertaking as truly consumer led based not only on need but also social preference. “We understand that customers who seek Shar’iah-compliant banking solutions have essentially the same banking requirements as other customers, and our solutions are developed to ensure they are able to manage their personal finances with ease, freedom and flexibility.”

“By allowing us the ability to offer these great savings to an interest free banking model, this offering ensures that Absa Islamic Banking customer’s needs are put first. This is in line with our focus on the customer that seeks to make banking easier and more affordable for our customers,” concludes Rautenbach.

Dell offers the world’s most secure commercial PCs with new encryption, advanced authentication, and malware protection solutions

By admin, 29 lipca, 2013, No Comment
  • Dell Data Protection | Encryption now available factory-installed on Dell’s trusted commercial PC lines delivering value for IT with automated deployment & provisioning capabilities
  • Dell Data Protection| Protected Workspace powered by  Invincea delivers leading edge anti-malware protection to help businesses detect and block malicious behaviour that traditional anti-malware solutions could miss
  • New Dell Data Protection | Security Tools enables advanced authentication and integrated management with encryption policies

Dell has announced additional security capabilities for its commercial PC portfolio and now offers the most secure commercial PCs on the market. Only Dell offers comprehensive encryption, advanced authentication, and leading-edge malware prevention from a single source with Dell Data Protection (DDP) solutions. DDP | Encryption provides the most comprehensive data protection in a single solution suite—now with Microsoft Windows 8 support and auto deployment and provisioning of users when purchased factory-installed on Dell Precision workstations, OptiPlex desktops, and Latitude laptops and tablets. Additionally, Dell unveiled DDP | Protected Workspace, a sophisticated new tool powered by Invincea to protect employees and their data from the latest malware attacks in real time.

It’s critical for organisations of all sizes to safeguard intellectual property, customer data and employee information. The theft of a laptop or loss of a USB key can result in thousands of dollars in lost revenue and compliance fines. With a growing number of endpoints to protect, the exponential growth of data, and the rise of more sophisticated threats, endpoint security can be difficult to manage. To address these issues, DDP | Encryption protects data at the file level and safeguard data everywhere it goes: on any device, external media and in the cloud. And it’s designed to provide this protection without disrupting end user productivity or collaboration.

“Dell understands the demand for end-to-end security solutions and services, especially IT challenges at the endpoint,” said Chris Christiansen, IDC program vice president, security products & services. “Despite worldwide economic pressures, a recent IDC study forecasts 2013 worldwide security product revenues to grow 7.8%. Given the demand, Dell is focused protecting information, streamlining administration, guarding against advanced threats, and ensuring proper access.”

“IT decision makers are facing the increasingly difficult challenge of balancing protecting company data and ensuring compliance while enabling end-user productivity, ” said Boitumelo Kgnore, Dell South Africa, client product marketing manager. “To address this challenge Dell is providing the most secure–and with unique Intel v-Pro technology–the most manageable commercial PCs that enable deep hardware protection and authentication, a unique file-level encryption solution that protects data on the client, on remote media, on mobile devices and in the cloud and virtualised container that protects against zero-day threats.”

DDP | E simplifies the management of endpoint security with a centralised remote management console and encryption that won’t interfere with existing IT processes, such as patch management. And now, with Dell’s new authentication software – Dell Data Protection| Security Tools – IT managers can centrally manage both their encryption and authentication policies using the same DDP console. Dell offers the broadest range of fully-integrated advanced authentication options, including fingerprint, smart card and contactless smart card readers and Dell ControlVault for secure hardware credential processing. DDP | Security Tools ships on every Dell commercial endpoint to enable these authentication options.

Dell Data Protection |Protected Workspace

DDP| Protected Workspace, the newest addition to the DDP solutions portfolio, utilises a sophisticated new approach to malware prevention to protect data and users from targeted attacks. Powered by Invincea, the technology was born out of a DARPA funded project for advanced endpoint protection and addresses cyber-attacks such as spear-phishing, watering hole attacks, drive-by downloads, poisoned search engine results and more threats that target end users.

“Each time an employee accesses the Internet or opens an e-mail attachment, they run the risk of becoming the unwitting accomplice to a data breach,” said Anup Ghosh, CEO and founder, Invincea. “We are pleased to partner with Dell to deliver DDP|Protected Workspace and offer a proactive approach to protect against the aggressive attacks every user faces on a daily basis. This agreement puts Invincea’s unique capability to contain, capture and analyse zero-day attacks into the hands of global enterprises, small and medium businesses and individuals – giving them the ability to defend against targeted attacks at the point of attack, and restoring confidence that their organisations are protected.”

DDP | Protected Workspace helps protect users against all types of cyber-attacks – even Advanced Persistent Threats (APTs) and zero-day exploits – by placing them in a protected environment any time they go to the Internet or encounter untrusted files within email. As an added benefit, DDP | Protected Workspace is completely unobtrusive to users so their everyday workflow is uninterrupted.

A one-year subscription to DDP | Protected Workspace software is included on Dell Precision, Latitude and OptiPlex PCs. Once the application is activated, it begins moving users’ browsers, PDF readers and Office suite into a contained, virtual environment where it automatically identifies malware attacks in real-time based on behaviors and actions inside the environment and away from the host operating system.


wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin kopiowanie drukowanie z PDF serwis niszczarek lublin niszczarki lublin naprawa niszczarek lublin wizytówki w godzinę wizytówki Lublin wizytówki od ręki