Our Blog

More cloud. Less cost. With Spot by NetApp

Posted by Sara Jones on 30-Nov-2020 17:11:08

 

Spot | blog Post
Read More

Topics: workplace, Cloud, Compute, NetApp, Storage, Data, Digital Transformation, Optimizations, Virtualization, Hiperdist, Experts, Specialists

MicroFocus - Backing Up to Cloud Services with Data Protector

Posted by Nicole Moletsane on 11-Jun-2020 08:45:00
 
Read More

Topics: Distribution, Interdist Alliances, Cloud, Compute, MicroFocus

The Economic Impact of IBM SAP HANA

Posted by Nicole Moletsane on 30-Dec-2019 12:01:36
Thank you for all who attended our Webinar on THE ECONOMIC IMPACT OF SAP HANA. What an incredible session we had! 
An organization's data is like a treasure chest - once opened, riches are revealed. The challenge is unlocking the treasure chest. Organizations are deploying HANA to take advantage of their data to find new customer insights, streamline supply chains, process reporting faster and more. While HANA can unleash data, IBM®Power Systems™ unleashes HANA.
IBM commissioned Forrester Consulting for a quick summary of findings of the economic benefits customers will likely realize from these unique capabilities. Below is a quick summary of findings.
Contact us to continue the conversation on how smart organisations are deploying HANA on Power, simplifying their IT infrastructure at the same time they are simplifying their data management.
 
 
READ MORE>> on The total Economic Impact of IBM Power Systems.
 
Read More

Topics: IBM, Distribution, Interdist Alliances, Cloud, Compute

NetApp® AFF C190 and Interdist Alliances in Kenya!

Posted by Sara Jones on 28-Nov-2019 11:33:50

Interdist Alliances recently hosted a successful event in Kenya, focusing on the NetApp® AFF C190, which offers an enterprise-class flash system for an affordable price. The NetApp® AFF C190, only available through distributors and channel partners, has built-in data protection, synchronous replication, encryption, and more to ensure that company and customer data is safe and accessible. 

Read More

Topics: Events, collaboration, Distribution, Interdist Alliances, Cloud, Compute, Connecting, NetApp, Partner, Data Fabric, partner event, Relationships, NetApp® AFF C190

Our most recent NetApp in Addis Ababa, Ethiopia.

Posted by Sara Jones on 26-Nov-2019 11:45:48

Interdist Alliances and Symbol Technologies have recently hosted a successful event in Ethiopia, focusing on NetApp Cloud Computing, Virtualization and Data Fabric technology. Learning, how NetApp Solutions can support customers, with industry-leading IT infrastructure in a new era of digital consumption.

Read More

Topics: Events, collaboration, Distribution, Interdist Alliances, Cloud, Compute, Connecting, NetApp, Partner, Data Fabric, partner event, Virtualization, Relationships

Interdist Alliances, Ostec and IBM

Posted by Nicole Moletsane on 10-Oct-2019 15:56:24
 
 
Hiperdist Ghana, Ostec and IBM hosted an event on Security Intelligence and Digital Trust. The event was held at the Swiss Spirit Hotel & Suites Alisa in Accra, Ghana on the  09th October 2019.
 
Security Intelligence and Digital trust are at the heart of the digital evolution. The discussion addressed emerging challenges in business, compliance and risk management.The evolving cyberthreat landscape is a driving force behind these conversations in Ghana.
 
The Speakers were Viren Mathur, Director of Value from Interdist Alliances, Pelin Konakci and Olumuyiwa Arowosegbe.
 
We at Interdist Alliances pride ourselves in building solid relationships for lasting success! Contact us to continue the conversation.
 
Thank you again and we look forward to meeting you next time

 
 
Read More

Topics: Distribution, Interdist Alliances, Cloud, Compute

Alibaba Cloud- 2019 Apsara Conference

Posted by Nicole Moletsane on 01-Oct-2019 12:32:28

The impact of cloud services on businesses is revolutionary and immeasurable. Come join us in Hangzhou China as we explore the 2019 APSARA Conference.

The conference was from the 25th to the 27th September 2019. With three main halls and two main forums, more than 110 summits covering a range of topics from machine intelligence, Blockchain, 5G, cloud native database to biometrics, chip, self-driving, and heterogeneous computing.

Alibaba Group introduced its first AI inference chip during the Apsara Conference. The Hanguang 800's peak performance is 78,563 images per second in an inference image classification benchmark test on ResNet-50, four times higher than the current best AI microprocessors in the industry. The chip's peak efficiency is 500 IPS/W, 3.3 times better than the second-ranked one.

Don Omondi, NeXtGeN Solution Architect, Africa and Levant and Jessica Alabi Abimbola,NeXtGeN Platform Account Manager, West Africa had LIVE interviews during the conference. To get their view on the biggest Cloud Computing & AI conference, follow our YouTube Channel to watch the interviews.

 

 

We are committed to, and fully invested in driving change through the adoption of technology in Africa across all market segments. Our customer network is both broad and deep and something that we continuously seek to enhance.

Interdist Alliances is ‘Your Gateway into Africa’.

Read More

Topics: Distribution, Interdist Alliances, Cloud, Compute

Border Control and CyberSecurity in Malawi

Posted by Nicole Moletsane on 30-Sep-2019 23:01:21
 
Sparc Systems Limited together with IBM and Interdist Alliances held an event in Lilongwe, Malawi on the 25th September 2019 for a discussion on Border Control and Cybersecurity.

The event, held at the Sunbird Hotel was hosting the Malawian Police to reinforce the importance of CyberSecurity in todays business landscape and to drive the message forward of how IBM Security Systems can further support this very critical business need. These solutions can secure customers data infrastructure and Borderline, Immigration and fraud using i2 and Qradar plus so many more.

Speakers included

*Harry Kasandala, Technical Sales Manager from Sparc Systems,

*Andrew Muwanga, Software and Cloud Business Development Manager and

*Terence Tuwe from IBM 

Thank you IBM and Sparc Systems Malawi for the support.

 
 
Read More

Topics: Distribution, Interdist Alliances, Cloud, Compute

MicroFocus Identity and Access Management (IAM)

Posted by Nicole Moletsane on 25-Jul-2019 15:40:28
Identity and Access Management (IAM)

With the annual costs of damage associated with cybercrime expected to reach $6 trillion by 2021, businesses need to focus on improving security measures and controlling user access to information. Our Identity and Access Management (IAM) solution by Micro Focus is a critical component of a successful protocol that helps organizations consistently enforce access rights across protected information and help businesses meet regulatory mandates with its integrated policies across local, mobile, and cloud environments by solving the following needs for our customers.

  • Visibility - This is a big challenge for growing businesses. As more users join a network, more devices become active and new tools are added to support diverse workflows, it becomes difficult to get a handle on who has access to what resources and at what privilege levels throughout the user’s lifecycle. Our identity and access powered security management and sign-on procedures helps businesses achieve the dual goals of greater visibility and smoother user experiences.
  • Pinpoint and Eliminate High-Risk Systems - Many businesses are still clinging to legacy systems for which support has long since ceased. Unpatched systems can become sources of breaches and make sensitive information readily available to hackers. Businesses that rely on these systems out of habit or in an attempt to avoid the hassle of upgrading need to take a step back and assess which needs these legacy tools are addressing and how they’re being used in workflows so that suitable replacements can be found. It may be possible to safely continue using systems for which support is still available, but seeking a fresh solution is still preferable because legacy tools often lack the options required for seamless integration into modern systems with diverse access requirements.
  • Crack Down on Orphaned Accounts - Active user accounts contain all the information related to a user’s identity and his or her movement within a network, including access privileges. When a user is promoted to another position or leaves the company, these accounts should be removed. However, with the increasing burden on IT professionals and the lack of visibility in most business networks, this often doesn’t happen. Improper deprovisioning of users leads to an accumulation of accounts with no associated users. Known as orphaned accounts, these sets of credentials and provisions are easy targets for hackers inside and outside the network. Logging into an orphaned account makes it possible to launch phishing attacks using apparently legitimate email addresses, make unauthorized changes to the system and steal sensitive data. Fifty-five percent of enterprises fail to revoke the permissions for privileged accounts, which creates an even greater security threat due to the higher levels of access allowed by these accounts.
  • Implement of Zero-Trust Security - In most business networks, it is safe to assume no one is trustworthy until proven otherwise. Our “zero trust” model relies on continuous authentication methods in which user behaviors are monitored and risk levels assessed throughout the duration of each session. By taking a dynamic and sophisticated approach, zero trust equips a system to detect aberrant behaviors indicative of a breach. Instead of taking the average 197 days to discover an intrusion into a system, businesses can identify potential threats and launch a proactive response the moment behavioral discrepancies arise. This prevents hackers from gaining free reign once inside a system and can avert the serious consequences associated with extensive breaches. 
  • Find the Best Software Solution - Every business needs an IAM solution tailored to the specialized needs of its industry in general and its onsite systems in particular. Threats, risk levels and compliance regulations differ according to the unique combination of devices, user access requirements and tools needed to integrate applications with incompatible authentication protocols. The retention of legacy systems adds another element of complexity with its own related concerns. Streamlining workflows and optimizing productivity without sacrificing security are top priorities in our IAM platform, along with scalability to accept the introduction of new systems, applications and devices. IT professionals require an administrative dashboard with analytics tools, straightforward reporting and a high level of visibility to ensure all endpoints can be monitored continuously.

Key Benefits:

  • Give users quick and secure access to resources base on need to know basis
  • Secure and simple to remember passwords
  • Control and monitoring of privileged users
  • Strong authentication without restricting productivity
  • Access governance for regulatory compliance
  • Make it easy to gain access to IT resources
 
Read More

Topics: Distribution, Interdist Alliances, Cloud, Compute

Interdist Alliances, Jetlink and IBM

Posted by Nicole Moletsane on 18-Jul-2019 11:05:58
Interdist Alliances and Jetlink
 
Interdist Alliances, in partnership with Jetlink and IBM, hosted an event at the IBM Innovation Centre on Tuesday, 25th June 2019.

Markets experts at the event included Waheed Adeoye, Elochukwu Mofunanya and Chuks Obi discussing a range of subjects ranging from Power9 Accelerated Infrastructure Foundation, Data Driven by storage, IBM API Economy and IBM Cloud Private. IT influencers and decision makers from all over Nigeria attended this event. The impressive guest list made for an interactive and informative session. The sharp growth of the IT sector in this region is a testament of bigger expectation in the future.
 
For more information on how Interdist Alliances can assist deliver a seamless experience in your business, contact our office :  

3rd Floor,
Africa-Re Building,
Plot 1679 Karimu Kotun Street,
Victoria Island,
Lagos, Nigeria
Tel: +234 802 947 1822

 
 
Read More

Topics: Distribution, Interdist Alliances, Cloud, Compute

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all