ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

Data centres, cyber security and a stark warning for resellers

By Heather Wright
Tue 20 Jun 2017
FYI, this story is more than a year old

Building blocks for the new data center, cyber security and a stark warning for resellers were key at Exclusive Network’s Exclusively NZ event last week.

Alex Teh, Exclusive Networks New Zealand and Pacific Island’s country manager says he’s ‘really looking forward to bringing a new disruptive brand of distribution to the New Zealand market’.

The company’s brands include Exclusive Networks, which specialises in information security; BigTec which is focused on data center transformation technologies; Exclusive Capital on the financial side; and iTec for logistics and professional services.

So what were the key messages of the day?

Software defined

Nikhil Menon, southern region channel manager for Exclusive Networks’ BigTec division, outlined the company’s plan to help resellers transform their customers; data centers ‘one block at a time’.

Menon says there are three components that always need to be considered in a virtualised – or software defined – environment: Networking, infrastructure (server and storage) and backup and disaster recovery.

From a networking perspective, BigTec offers Mellanox, for infrastructure its going Nutanix, while for backup and disaster recovery, Menon highlighted Rubrik.

“Essentially what you’re trying to do is what Facebook and Google do these days: Have a single software layer and have assets underneath that keep changing. You’re bringing that now to your customers,” he says.

It’s small, it’s easy

“Mellanox fits two switches in one rack unit, Nutanix two rack units and Rubrik, again, two rack units,” Menon says.

“Put that together an in as small a footprint as five rack units you start creating a software defined data center. You can’t do that with your legacy three-tier architecture.

And here’s the kicker, one guy can manage that.”

The link opportunity

Gartner figures show three years from now 75% of resellers clients workloads will be in the cloud, says Menon. IDC says 70% of all internet traffic will be SaaS traffic.

“That means clients and end users are going to be looking to you to provide a more robust WAN link. That means better security, better access, better performance,” he says.

“The market opportunity: in the next three years it will expand to $6 billion,” Menon says. “More interesting, in the next three years according to Gartner, 50% of all your WAN edge infrastructure refreshes are going to be SD-Wan.”

Ongoing opportunities

Jeff Smith, Nutanix APJ  senior director SEs, says the software defined data center offers ongoing sale opportunities of the ecosystem.

“The software defined data center and the components in it are myriad and you as system integrators and MSPs have the opportunity to bring those additional tools to solve customer problems.

Key among those opportunities, Smith says, are APIs.

“More and more larger customers need to have self service portals, have to provide a lot of Amazon-like capabilities to their end users and that’s all about APIs.

“If a customer goes full barrel to Amazon there is probably some work for system integrators, but it becomes less and less over time, I think, whereas with Nutanix the more the customers get in that experience, that consumption model, but at the same time there is the opportunity for you to be adding  value and building solutions, working with ISVs  and alliance partners, building some of your own solutions on top to be able to differentiate and give customers the speed and agility they need and be a business partner for them not just a technology vendor transaction.


Tim Lloyd, operations and commercial manager for Agri Nutrients, which has gone with Nutanix, says he’s seeing savings of $1 million over five years from going Nutanix rather than public cloud.

The bad news

AgriNutrients Lloyd also had some bad news for resellers. When asked how AgriNutrients choses products and engages with the channel he was direct: “I don’t really trust any of you here, so I rely on the likes of Gartner and independent research to investigate what we require, who are the market leaders, what are the cautions, what the threats, then go straight to the horses mouth in terms of discovery.

“I have found of late that resellers are not necessarily having the value they possibly could and as a result going direct is providing me with far more insight, far more value and actually reducing a lot of time again.”

He warned resellers to up their game, providing ‘more options, more solutions – and business solutions as opposed to I’m pushing product x this month – because the market is changing’.

Getting intelligent with security

Chris Hawksworth, Fujitsu senior security analyst, notes that when it comes to security, business leaders are becoming more savvy.

“They’re looking at threat intelligence and not necessary going for a single point product, but they want to be able to start integrating their products, they want to start seeing the threat intelligence and they’re becoming more aware of where they’re looking at these things so they want visibility into their networks,” Hawksworth says.

“They’re now reallising it’s not just a case of playing whack a mole with vulnerability analysis, it’s a question of what have we already got inside our organisation because if our organisation is already compromised that completely changes the dynamics of how we are going to be looking at things.”

Billions of logs = lots of opportunity

Bill Taylor Montford, LogRhythm senior vice president and general manager, says the billions of logs being created daily open the door for more intelligent security via AI and machine learning.

“there are organisations in NZ who would have in excess of a billion logs per day and many many more with 100s of millions.

Human beings can’t deal with that. We can’t deal with the search and the requirement to analyse that for bad people trying to access our environment,” he says.

“AI is overtalked and underperformed at this stage. It’s a great tool, a great product, but it’s not there yet.

“Machine data learning is there. Machine learning in real time access ransomware attacks and various other attacks in real time and instantly stop them is is where it’s going.”

Related stories
Top stories
Story image
Tech job moves
Tech job moves - Adatree, Brother, Databricks, Nutanix & Rubrik
We round up all job appointments from May 20-26, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Could New Zealanders initiate a cyber attack from within?
The threat landscape is significantly increasing worldwide, and the opportunities it presents are a growing concern in Aotearoa.
Story image
The path to bolstering supply chain security in New Zealand
A significant amount of today's business and leisure activity relies on IT supply chains. From complex international freight trades to local small business distribution channels, any supply chain that involves IT infrastructure serves as a crucial tool in our daily lives. 
Story image
Ingram Micro
Ingram Micro NZ bolsters MSI product range with new offerings
The inclusion of MSI Mobile Workstation and Business & Productivity laptops rounds out the MSI product portfolio.
Story image
Hybrid Cloud
Barracuda expands cloud-native SASE platform
"The expansion of Barracuda's cloud-native SASE platform for hybrid deployment models and IIoT environments solves a number of challenges."
Story image
Digital Marketing
Similarweb acquires SEO and rank tracking company Rank Ranger
Digital intelligence company Similarweb, which specialises in analysing web traffic, has acquired Rank Ranger, a market leader in SEO and rank tracking.
Story image
Microsoft previews Power Platform website design offering
Microsoft has announced the preview of Power Pages, the fifth product in its Power Platform family, designed for low-code makers and professional developers.
Story image
Employees on the frontline of cyber defense - report
In the first quarter of 2022, employees found themselves more than ever at the frontline of cyber defense, according to a new report from Kroll. 
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Sony launches LinkBuds S - the latest model in the series
Sony says the LinkBuds S will give users a unique sound experience through sensor and spatial sound technology, even in AR games.
Story image
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
'Alarming' rise in ransomware threats - Verizon report
As criminals look to leverage increasingly sophisticated forms of malware, it is ransomware that continues to prove particularly successful.
Story image
Vectra AI
Vectra’s inaugural Partner of the Year Awards revealed
APAC companies Baidam, Firmus, ShellSoft and Macnica have been recognised in Vectra AI's inaugural Partner of the Year Awards.
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Infosec unveils role-guided cybersecurity training roadmaps
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.
Story image
Third-party automotive apps bear significant privacy risks
Mobile applications for connected cars provide various features to make life easier for motorists, but they can also be a source of risk.
Story image
Vishing attacks reach all time high - Agari and PhishLabs
"Hybrid vishing campaigns continue to generate stunning numbers, representing 26.1% of total share in volume so far in 2022."
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
Lexmark launches A/NZ first with retail publishing solution
Lexmark, a global imaging and IoT solutions leader, launched its Publishing Platform for Retail (PPR) in Australia and New Zealand.
Story image
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Informatica, Oracle enter strategic global cloud partnership
Oracle named Informatica as a preferred partner for enterprise cloud data integration and data governance for data warehouse and lakehouse solutions on OCI. 
Story image
Global cybersecurity insurance market worth $11.5b this year
Future Market Insights finds the cybersecurity insurance market is expected to reach USD$11.5 billion in 2022, growing to $61.2 billion in 10 years.
Story image
Microsoft NZ announces initiative for local SaaS businesses
Microsoft has announced a new initiative, bringing together all of its tools to help local SaaS businesses build, sell and grow their companies at scale.
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Story image
Elevation of Privilege the top 2021 Microsoft vulnerability
BeyondTrust has released its 2022 Microsoft Vulnerabilities Report, finding that Elevation of Privilege is the top vulnerability category for the second consecutive year.
Story image
The ups and downs and runarounds of catching cybercriminals in NZ
We're becoming more and more aware of cybercrimes but how many criminals actually get caught? The New Zealand police explain why the answer is complicated.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Chorus and Nokia launches first trial of 25G PON broadband
Chorus and Nokia have announced the successful demonstration of 25 gigabit per second fibre (Gbps) broadband technology at the Chorus Fibre Lab in Auckland. 
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Identity and Access Management
The post-pandemic workforce requires secure IAM capabilities
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Story image
Dynabook refreshes Portégé X30L series with the Portégé X30L-K
The new model contains hybrid-architecture Intel 12th Gen Core P-Series 28W processor options, Wi-Fi 6E, along with Intel Iris Xe graphics.
Story image
Fortinet introduces self-learning AI in latest offering
Fortinet is introducing self-learning AI capabilities in its new network detection and response offering, FortiNDR.
Story image
Delinea enhances partner experience with new training initiatives
Delinea has announced a range of training and certification initiatives to help scale the capacity of VARs, System Integrators, MSPs and MSSPs to meet the demand for PAM solutions.
Story image
Symbio consolidates TNZI business to support APAC expansion
Symbio has recently announced the consolidation of its international business (TNZI) under the Symbio brand to support its Asia Pacific expansion strategy.
Story image
APAC ranks third-highest region targeted by ransomware
Asia Pacific has ranked the third-highest region globally to be targeted by ransomware, according to cybersecurity firm Group-IB.
Story image
Asia Pacific plagued by sophisticated bad bots - report
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Story image
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
Cybersecurity prompts upgrade for 1.3 billion electricity meters
ABI Research finds Advanced Metering Infrastructure (AMI) and cybersecurity concerns are prompting the upgrade of 1.3 billion electricity meters by 2027.
Story image
What every CISO must answer to enable a best-in-class security operations program
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
WhatsApp and QR codes the next scam threat - report
KnowBe4 has warned it expects to see an increase in QR Codes and the WhatsApp chat platform being used for phishing and other scams. 
Story image
Digital Transformation
SAP partners with New Zealand Rugby for digital transformation
The multi-year partnership will see SAP advance NZR with its organisational operations, team performance, fan experience and sustainability goals.
Story image
Artificial Intelligence
Frost & Sullivan recognises Genesys as leader in new reports
Frost & Sullivan has recognised Genesys as a leader in the cloud contact centre market for its robust cloud and digital capabilities.
Story image
Hands-on review: HyperX Pulsefire Haste wireless mouse and HyperX Pulsefire XL Mat
With its lightweight Pulsefire Haste wireless mouse and RGB lit Pulsefire XL Mat, HyperX sets out to up your game and add a little colour to your desktop.