EC-MEA June 2023

Page 1

INSIDE

| 7th edition of GCC Security Symposium

PA G E S 8 0 VOLUME 10 JUNE 2023

|

ISSUE 11

W W W. E C - M E A . C O M

UNLOCKING THE

DIGITAL VAULT TRENDS AND TECHNOLOGIES IN

DATA STORAGE-2023 THE WORLD IS GOING THROUGH A PERIOD OF RAPID CHANGE TO INNOVATE AND SET UP NEW BUSINESSES AND TECHNOLOGIES. DATA-DRIVEN ORGANIZATIONS ARE FOCUSING ON TRANSACTIONAL DATABASES TODAY.

EC JUNE_2023.indd 1

6/16/2023 5:26:04 PM


DRIVING OPERATIONS AND PERFORMANCE EXCELLENCE YOUR PARTNER FOR

Cloud & Digital Transformation

Enterprise Applications

Analytics & Automation AI & ML as a Service

Cyber Security Solutions

Management Consulting, Advisory and Quality Assurance

An unit of

“Delivery centres in US, Middle East and India”

Phone: +971528732716 | Email: hello@opx america.com | www.opxtechnology.com

EC JUNE_2023.indd 2

6/16/2023 5:26:05 PM


PUBLISHER TUSHAR SAHOO TUSHAR@GECMEDIAGROUP.COM

Embracing Limitless Possibilities

CO-FOUNDER & CEO RONAK SAMANTARAY RONAK@GECMEDIAGROUP.COM GLOBAL HEAD, CONTENT AND STRATEGIC ALLIANCES ANUSHREE DIXIT ANUSHREE@GECMEDIAGROUP.COM ASSISTANT EDITOR REHISHA PE REHISHA@GECMEDIAGROUP.COM

Dear Industry associates,

I

am delighted to welcome you to the June edition of Enterprise Channels MEA, where we delve into the exciting world of digital transformation and explore the theme of “Unlocking the Digital Vault.” In today’s rapidly evolving business landscape, the importance of leveraging digital technologies to drive growth and innovation cannot be overstated. This edition aims to provide you with valuable insights and strategies to unlock the full potential of your organization’s digital assets. Before we delve into the theme, I would like to highlight the recent events that have taken place across the Middle East and North Africa, where we have witnessed a series of industry gatherings, conferences, and seminars that have brought together key stakeholders, thought leaders, and innovators from various sectors. From Dubai to Riyadh, Qatar to Oman, Cairo to Morocco, Jordan to Kenya –these events have served as platforms for knowledge exchange, collaboration, and networking. They have provided an opportunity for industry professionals to gain valuable insights into the latest trends and technologies, while also fostering partnerships and business opportunities. Our coverage of these events in this edition aims to capture the essence of the dynamic and ever-evolving channel and end-customer ecosystem in the Middle East and North Africa. In line with our commitment to promoting knowledge sharing and industry collaboration, I am thrilled to announce the upcoming World CIO 200 2023 - 50 country tour. This prestigious event brings together the brightest minds in technology leadership from across the globe. It is a unique opportunity for networking, sharing best practices, and gaining insights into the latest trends shaping the future of technology. The tour will culminate in a grand finale in Baku, Azerbaijan, in September, where thought leaders and innovators will come together to celebrate the achievements and discuss the challenges ahead. I encourage you to seize this opportunity to engage with industry leaders, expand your professional network, and gain valuable knowledge that can propel your organization’s digital journey forward. Stay tuned for more updates on this exciting event in the upcoming editions of Enterprise Channels MEA. Thank you for your continued support, and I hope you find this edition insightful and inspiring. Together, let us unlock the digital vault and embrace the limitless possibilities it holds for our organizations and the region.

R O N A K S A M A N TA R AY R O N A K @ G E C M E D I A G R O U P. C O M

GROUP SALES HEAD RICHA S RICHA@GECMEDIAGROUP.COM PROJECT LEAD JENNEFER LORRAINE MENDOZA JENNEFER@GECMEDIAGROUP.COM SALES AND ADVERTISING RONAK SAMANTARAY RONAK@GECMEDIAGROUP.COM PH: + 971 555 120 490 DIGITAL TEAM IT MANAGER VIJAY BAKSHI PRODUCTION, CIRCULATION, SUBSCRIPTIONS INFO@GECMEDIAGROUP.COM CREATIVE LEAD AJAY ARYA GRAPHIC DESIGNER RAHUL ARYA DESIGNED BY

SUBSCRIPTIONS INFO@GECMEDIAGROUP.COM PRINTED BY Al Ghurair Printing & Publishing LLC. Masafi Compound, Satwa, P.O.Box: 5613, Dubai, UAE Office No #115 First Floor , G2 Building Dubai Production City Dubai United Arab Emirates Phone : +971 4 564 8684 31 FOXTAIL LAN, MONMOUTH JUNCTION, NJ - 08852 UNITED STATES OF AMERICA PHONE NO: + 1 732 794 5918 A PUBLICATION LICENSED BY International Media Production Zone, Dubai, UAE @copyright 2013 Accent Infomedia. All rights reserved. while the publishers have made every effort to ensure the accuracyof all information in this magazine, they will not be held responsible for any errors therein.

EC JUNE_2023.indd 3

6/16/2023 5:26:07 PM


LOOKING FOR A SMARTER WAY TO WORK? Introducing Fusion Cloud.

.

Consolidate Consolidate Streamline Streamline

. Optimise Optimise

With dynamic scalling, minimal CapEx, and predictable OpEx, You can open up additional resources for your IT team to focus on With dynamic scalling, minimal CapEx, and predictable OpEx, You can open up additional resources for your IT team to focus on more straregic projects. Experience the benifits of an inteligent, more e eficient cloud management solution with Fusion Cloud. more straregic projects. Experience the benifits of an inteligent, more e eficient cloud management solution with Fusion Cloud.

TO TO KNOW KNOW MORE MORE DATA DATA CENTERS CENTERS OFFICES OFFICES EC JUNE_2023.indd 4

info@cloudhosintl.com info@cloudhosintl.com

www.cloudhostintl.com www.cloudhostintl.com

UAE - Saudia Arabia - Bahrain UAE - Saudia Arabia - Bahrain UAE - Saudia - India UAE - Saudia - India

+971 4 4425343 +971 4 4425343

6/16/2023 5:26:09 PM


JUNE 2023

VOLUME 10

ISSUE 11

CONTENTS 48-52

COVER STORY

UNLOCKING THE

DIGITAL VAULT TRENDS AND TECHNOLOGIES IN

DATA STORAGE-2023

03

EDITORIAL 06-09

VIEWPOINT

36-41

CHANNEL 42-44

REAL LIFE

EVENTS

64-77

32-33

Kissflow awards Middle East Business Partners with Tesla Model 3

How Redington is playing a crucial part in Africa’s transformative process as a technology aggregator and ecosystem provider

FEATURE

7th edition of GCC Security Symposium

34-35

INTERVIEW

56-61

10-31

GITEX Africa, the most influential tech event

54-55

46-47

GUEST COLUMN

CHANNEL WATCH Business growth, sustainability insights: a road to success

78

EXECUTIVE MOVEMENTS

J U N E 2023

EC JUNE_2023.indd 5

MEA

05

6/16/2023 5:26:14 PM


VIEWPOINT

Innovation that’s accessible, sustainable, and affordable to all Simplicity and innovation are the foundations on which John ‘Coz’ Colgrove started Pure Storage in 2009. He wanted to keep these principles while achieving a vision to take flash storage mainstream and create an all-flash data centre.

Patrick Smith, CTO EMEA, Pure Storage

The path to all-flash every bit of their data — now that’s nirvana. Unstructured data is expected to grow by 10x before 2030, continuing its existing exponential growth. Organisations are going to have to consider how they make use of it all and flash changes the dynamic for big data analytics, data lakes, content repositories, and even backup & recovery.

Innovative vision Today there are well-known advantages of Flash over legacy disk-based storage. However, back then, the main barriers to implementing were the purchase cost, the cost of operating it, and working out how to integrate it into the data lifecycle. Fast Forward a few years and Flash has become the obvious choice for any performance- or latency-sensitive workload. Since flash memory was introduced to enterprise storage, it’s been taking on and replacing hard disk tiers one by one. The market conditions mean that the move to an all-flash data centre has now changed from vision to reality. There are many reasons why the time for allflash is today, from dealing with data growth and the cross-over between the cost of flash and disk to the clear sustainability savings to be made. These are some reasons why Flash will wipe out disks for good:

Growth in unstructured data Running out of capacity or having no additional resources is a nightmare for every IT manager. Getting value and insight from

06

EC JUNE_2023.indd 6

MEA

Cost of NAND The price-per-bit for NAND flash is declining at a rate much faster than nearline hard drives. While today the cost-per-bit of a hard drive is still lower than the densest flash, there are several key trends to pay attention to in 2023. First, all the major tier 1 flash manufacturers are demonstrating significant density increases this year; with over 200 layers of stacked 3D NAND in some cases. This increase in density will translate into better cost efficiency, as well as further improvements in data centre power and space savings. Second, if analyst predictions hold, NAND prices overall are expected to decline through most of 2023, continuing a trend that began in late 2022.

Flash as an environmental choice Datacentre infrastructure represents over 1% of global energy consumption, and this share is growing. Organisations are examining their carbon emissions much more closely and many need to look at ways to reduce their carbon footprint. Flash has a vital contribution to this reduction in energy use.

Many organisations are already well on the journey to all-flash; they have deployed flashbased storage platforms for their performancesensitive workloads where speed delivers business value; these use cases include databases, private cloud deployments, and, increasingly, modern analytics environments. Those organisations that have deployed modern all-flash platforms are reaping the benefits of performance, server efficiency, massively simplified operations, and also energy efficiency, and associated greenhouse gas reductions. The ability to consume all-flash for petabytescale unstructured workloads through a subscription model allows users to grow as business needs demand. A flexible cloud-like Storage-as-a-Service (STaaS) model should include stringent Service Level Agreements on everything from administrative support to dayto-day management, and energy consumption. This brings even more operational efficiency — further widening the gap to legacy platforms.

A vision realised: flash is the choice for environmental, workload, and cost reasons The simple truth is that no one today continues to buy spinning drives because they’re better, but only because they’re cheaper. In almost every way, flash memory is superior to spinning magnetic rust, and while the flash is already better, those advantages are increasing. Flash has become a viable option for everyday workloads, offering enterprises a better way to manage data growth efficiently, reliably, and sustainably. ë

J U N E 2023

6/16/2023 5:26:16 PM


VIEWPOINT

Acronis provides comprehensive cyber protection solutions Acronis unifies data protection and cybersecurity, delivering cyber protection that solves safety, accessibility, privacy, authenticity, and security (SAPAS) challenges.

Islam Shaker, Distributor Manager – Middle East, Acronis

A

t Acronis, the core business is to provide comprehensive cyber protection solutions that safeguard the data, applications, systems, and productivity of organizations of all sizes. Their solutions offer protection against a wide range of threats, including cyberattacks, hardware failures, natural disasters, and human errors. In addition, they empower service providers to protect their own infrastructure as well as that of their clients. Their mission is to provide the most innovative and effective cyber protection solutions to their customers, helping them to ensure the availability, security, and integrity of their critical data and systems.

Identifying the trends and innovations Channel partners in large and medium-sized businesses face several challenges, including intense competition from other partners and vendors. In addition, they must ensure they offer the right technology solutions that meet their end-users needs at competitive prices. This requires them to stay up-to-date with the

latest technology trends and innovations and to constantly evaluate and improve their offerings in line with the emerging needs of the market. Channel partners must also have the technical expertise and knowledge to provide effective support and services to their clients, which can be a challenge in a constantly evolving technology landscape. In today’s business landscape, data is king. As companies generate increasingly large amounts of data, it’s essential to efficiently collect, analyze, and store it to gain valuable insights that can improve their overall business performance. Digital transformation is a key enabler of this process, providing companies with the necessary tools and technologies to enable them to manage their data effectively and derive meaningful insights from it. By embracing digital transformation, companies can streamline their operations, enhance their decision-making capabilities, and ultimately achieve their business objectives in an increasingly data-driven world.

Transforming the global market Digital transformation is having a significant impact on job roles and department responsibilities, as companies increasingly seek to leverage technology to drive innovation and growth. With the rapid development of new technologies, there is a growing demand for specialized skills and expertise in areas such as data analytics, cyber protection, and cloud computing. This has ultimately led to the creation of new job roles and departments that are focused on specific tasks or processes, while also requiring collaboration and cross-functional expertise. Technology is constantly evolving, and while

this comes with its own set of challenges, the benefits clearly outweigh the drawbacks. The current and future technological landscapes offer a range of advantages, from increased protection and security to improved performance and efficiency. New technologies also create opportunities for innovation and growth, enabling organizations to stay ahead of the curve and remain competitive in their respective industries. There are also potential disadvantages to consider, such as the risk of cyber-attacks and the need to constantly adapt to new technologies.

Towards a strong digital culture As digital culture continues to grow among the next generation of workers and potential customers, it’s important to stay ahead of the curve in terms of their brand’s look, feel, and social appeal. This means keeping up with the latest trends in marketing, such as social media, digital outreach, and event sponsorships. By leveraging these channels, brands can effectively engage with their customers on their terms and deliver the personalized experiences they expect. Additionally, they are constantly looking for new ways to innovate and differentiate themselves in a crowded marketplace, whether that means exploring new technologies or rethinking their marketing strategies. Ultimately, their goal is to create a brand that resonates with customers and drives long-term loyalty and growth. Acronis offers antivirus, backup, disaster recovery, endpoint protection management solutions, award-winning AI-based antimalware, and blockchain-based data authentication technologies through a service provider and IT professional deployment models. These solutions protect data, applications, and systems in any environment. ë

J U N E 2023

EC JUNE_2023.indd 7

MEA

07

6/16/2023 5:26:16 PM


VIEWPOINT

Treasury Transformation: the trendsetting force Kyriba TMS is a leading cloud-based TMS platform that is used by more than 2,000 global organizations. They have an effective innovative solution and the ways it transforms treasury management.

Manoj Panicker AVP, Treasury Transformation

What is Kyriba TMS?

T

he treasury operations of a company are crucial, specifically with regard to cash liquidity, which is the most critical aspect. CFOs understand that their treasury teams must manage critical tasks such as accurate forecasting of cash flows, operational efficiency, fraud prevention, compliance, optimizing working capital, and FX risk management to maintain their organisation’s health. The performance of the treasury team directly impacts the bottom line.

Challenges in Manual Process: As per the survey taken by Kyriba – the leading Treasury Management Solution and later got published in Global Treasurer, they observed that global treasury teams are wasting an average of 4,812 hours per year using traditional spreadsheets to manage their cash, payments and accounting operations.

Treasury Transformation Automating corporate treasury is becoming increasingly important as businesses look to streamline their operations and reduce costs. Automation can help improve efficiency, reduce risk, and increase visibility into financial operations. The Wall Street Journal published a seemingly innocuous article entitled, “Stop Using Excel, Finance Chiefs Tell Staffs,” in which CFOs lamented the time their teams waste on spreadsheets, including pulling data from disparate systems, instead of engaging in more strategic initiatives.

08

EC JUNE_2023.indd 8

MEA

Kyriba TMS is an all-in-one, cloud-based platform that helps organizations optimize their cash and liquidity management, manage financial risk, and automate their financial operations. It provides a suite of modules that support treasury management, payments, risk management, supply chain finance, and working capital optimization. Kyriba TMS integrates with a wide range of systems, including banks, ERPs, and trading platforms.

Features and Benefits of Kyriba TMS:

1. Cash and Liquidity Management Kyriba TMS provides real-time visibility into an organization’s cash positions across all bank accounts and currencies. The platform’s robust cash forecasting capabilities help businesses make more informed decisions about funding, investment, and liquidity management. Additionally, Kyriba TMS enables organizations to automate their cash management processes, including payments and bank account reconciliation. 2. Risk Management Kyriba TMS provides robust risk management capabilities to help businesses mitigate financial risk. Its treasury risk management module enables organizations to monitor and manage market, liquidity, and credit risk in real time. It also provides tools for creating and managing financial hedging strategies. 3. Payments Kyriba TMS streamlines the payments process by providing a single platform to initiate, approve, and track payments. The platform supports a wide range of payment types,

including bank transfers, cheques, ACH, and wire transfers. Businesses can also take advantage of the platform’s built-in fraud detection and prevention tools. 4. Supply Chain Finance Kyriba TMS provides supply chain finance capabilities that allow businesses to extend payment terms to suppliers while improving their working capital. The platform enables organizations to provide early payment options to their suppliers in exchange for discounts. 5. Working Capital Optimization Kyriba TMS provides a range of tools to help businesses optimize their working capital. The platform’s cash visibility and forecasting capabilities enable organizations to identify opportunities to improve cash flow. 6. Enhanced Security Kyriba TMS offers enhanced security features to protect businesses’ financial data. Kyriba TMS (Treasury Management System) offers a range of enhanced security features to protect sensitive financial data and prevent unauthorized access. 7. Kyriba Connectivity service Kyriba’s Connectivity as a Service gives our customers a complete connectivity solution encompassing ERPs, internal financial systems, third-party providers, and over 1,000 ‘out-of-the-box,’ pre-configured, pre-tested connections with financial institutions across the globe. Kyriba’s solution includes application processing interfaces (APIs) delivering realtime integration, payments and reporting. As Treasury Automation helps treasury teams to harness more data and employ more analytics, those teams will become more strategic and capable of meeting their CFOs’ expectations. And companies will enjoy improvements in free cash flow, cash usage for working capital, productivity and efficiency, investing and borrowing performance, and reduced risk exposures. ë

J U N E 2023

6/16/2023 5:26:17 PM


VIEWPOINT

CloudHost presents Fusion Cloud - Bringing unity in diversity Every cloud provider has a slightly different set of cloud services and specialties. CloudHost promotes unity in diversity with the introduction of Fusion Cloud which will take away the challenges of managing multiple Cloud applications.

Nikhil Katara Co-founder and Director of Operations CloudHost

F

or CloudHost Technology, innovation stems from the inevitability to transform, and not perish, by being blind to the evolving enterprise-technology nexus scenarios for competitive and efficient bottom-line growth. Over the years, this strategic foresight has helped CloudHost launch pioneering initiatives, and the latest from its innovation portfolio is Fusion Cloud. They started addressing the needs of enterprises at a multicloud level right from the day they started. No enterprise can run a business with a single cloud as there are multiple applications for diverse enterprise silos, all of which need to be orchestrated in alignment with a single mission focus through a single-window strategy, by managing varied cloud partners on a single dashboard. A unified and end-to-end view of cloud resources on the Fusion platform will take away the challenges of managing multiple Cloud applications, and in turn, help reduce costs as well, adding that it helps a CIO’s perspective of making systems available in a secured and unified environment, while being able to support

business from a CEO’s vision and mission. Fusion Cloud serves that need exactly on a hybrid platform bringing private and public clouds to work in tandem bringing seamless functionality in a fragmented landscape. Any enterprise typically will have multiple cloud partners with varied capabilities for a range of different business functions, and Fusion Cloud will act as a command centre platform to manage all of it from one nerve centre dashboard. Designed to catalyze agility, scalability and innovation, and will support an enterprise’s driving need these days to be relevant to their customers even while wading through the challenges of growth KPIs, cost pressures, unpredictable competition and myriad other issues CEOs are wont to grapple with. Fusion Cloud works to the advantage of an enterprise in two ways – one, it frees up strategic space for the honchos from not worrying about technology drag downs, managing different cloud partners individually and huge IT costs, and second, it empowers the IT team to graduate their role to business enablers from their typical mundane every-day job functions. In fact, CloudHost stepped into the business with an offering to convert legacy applications to be accessed on browsers within a time span of four hours, which was a trailblazing digital transformation project at that time. That was one of the biggest challenges then, and it also marked the debut of per-user cost for Cloud services, creating a bespoke offering for

enterprises, including for Small and Medium Enterprises (SMBs), with scale-in and scale-out options. Innovations such as Fusion Cloud, a fast and secure platform where different private and public cloud applications can be managed with automated orchestration across management, computer systems, applications and services, is an extended and enhanced value-added product from CloudHost to help manage multiple complex tasks and workflows easily, with scalability. With their innovative services, they have developed accessing Cloud services simple like a utility, and which they believe will help increase Cloud adoption on a mass scale across the geographies they work. With in-build advantages of SoftwareDefined Networking (SDN) that allows network virtualization, managed orchestration and integrated security. According to CloudHost, the platform will help enterprises reduce Cloud costs by 30%, identify security gaps and deploy and manage hybrid Cloud infrastructure in record time. Fusion Cloud allows the consolidation of functions of multiple Cloud partners through a single centralized management that helps faster provisioning, foolproof compliance, optimized access controls, and security architecture, among others, through a single support window. Added to the advantages are dynamic scaling, minimal CapEx, and predictable OpEx, which will in line open up additional resource’s capacity for bolstering IT teams to focus on more strategic projects. ë

J U N E 2023

EC JUNE_2023.indd 9

MEA

09

6/16/2023 5:43:49 PM


EVENTS

7th edition of GCC Security Symposium Qatar edition On May 11, Dust Doha witnessed an overwhelming response as more than 120 CISOs, BCM heads, Risk and Resilience officers, and technology heads gathered for an unforgettable event. With a packed house, the atmosphere was charged with anticipation and eagerness to explore the latest trends and insights in cybersecurity. The event showcased the remarkable commitment and dedication of Qatar’s cybersecurity community, highlighting the vital role they play in protecting businesses, infrastructure, and individuals from cyber risks. As the symposium drew to a close, attendees left with renewed motivation, armed with fresh insights and actionable strategies to enhance security and resilience within their respective organizations. Attendees and keynote speakers were welcomed by Anushree Dixit, Global Head – Content & Strategic Alliance, GEC Media Group. She shared the vision and aim of the GCC Security Symposium which is an

10

EC JUNE_2023.indd 10

MEA

ideal platform to gain exceptional knowledge on how an agile BCM plan will bring increased flexibility and agility to every organization. Arnab K. Mukherjee, Business Continuity Crisis Manager, Vodafone, kicked off the event with his opening keynote on FIFA 2022 WAR Room – Resilience Approach. The event had a closer look into how leaders in BCM and Risk management are helping companies to build a strong business case for business continuity and crisis\risk management. The event was joined by some expert speakers like Muzammil Riyaz, Founder, BlueFinn GRC, who speaks about ‘Pathbreaking GRC Solution for Middle East’, Tamer Odeh, Regional Director, SentinelOne, who shared his knowledge on the topic ‘The Importance of Identity Security Modernization’, Kamal Zian, CISO of Huawei Gulf North, who speaks about ‘Standardization In Service Of Cyber Assurance’, and Niraj Mathur, Managing Director,

J U N E 2023

6/16/2023 5:26:19 PM


EVENTS

Protiviti Middle East Member Firm, who shared his views on the topic ‘Navigating Data Privacy in the Middle East’. The event was made a thought-provoking one by some inspirational Panel discussions and Fireside Chats. The Panel discussion and Fireside Chat were held on the following topics by the following expert leaders: Fireside Chat – What is the ROI of investing in a BCM Plan? l Samir Pawaskar – Cyber Security Governance & Business Continuity Expert – Government l Abdus Salam – Head Business Continuity Management – Qatar Islamic Bank l Adnan Abu AlHajia-Group Head of Risk-Qatar General Insurance & Reinsurance Co l Moderator: Adnan Ahmed, Lead Specialist – Business Continuity & Risk, Ma’aden (Saudi Arabian Mining Company) Panel Discussion: State of Cloud Security in Modern Enterprises – 2023 & Beyond l Dr. Muhammad Malik – Manager Information Security – Media Industry l Varun Vij – Cybersecurity Manager – Mitsubishi l Nikunj Dilip Desai – Head, Cyber Security – Commercial Bank of Qatar l Moderator: Chander Mohan Raina, Head of Information Technology & Telecommunications, Grand Regency Doha Hotel

Panel Discussion: The State of BFSI Security & Risk Management in 2023 l Jamsheed P. Chithari-Manager Infrastructure and Security – Qatar Insurance Group l Faizal Babu, Head of Enterprise & Risk Management – Gulf Drilling International Q.S.C. l Moderator: Chander Mohan Raina, Head of Information Technology & Telecommunications, Grand Regency Doha Hotel Panel Discussion: State of Security & Risk Management in Government Organizations – 2023 & Beyond l Mohammad Saquib – Sr. Network & Security Consultant – Government Entity, Qatar l Nazia Sharieff – Information Security Officer | International Speaker – Government l Ozel Hurmuzlu – Senior Enterprise Risk Management Analyst | Business Continuity – Qatar University l Moderator: Chander Mohan Raina, Head of Information Technology & Telecommunications, Grand Regency Doha Hotel The partners for the GCC Security Symposium Qatar edition include BlueFinn (Platinum Partner), Amiviz, Protiviti, Cloudflare, OPX Technology (Gold Partners), Eviden, SentinelOne, Huawei, Barracuda (Silver partners), and CAAS (Strategic Partner). BCM & Risk Champions Awards, CISO Awards, and Future Security Leaders Awards identified the top security leaders and the hard taskmasters in the industry and recognized their excellent contributions to their major sectors. The event was closed by Anushree Dixit, Global Head – Content & Strategic Alliance, GEC Media Group with her closing note.

J U N E 2023

EC JUNE_2023.indd 11

MEA

11

6/16/2023 5:26:21 PM


C YBER SENTINAL CIS

12

EC JUNE_2023.indd 12

MEA

J U N E 2023

6/16/2023 5:26:43 PM


C I SO AWARD | QATAR

J U N E 2023

EC JUNE_2023.indd 13

MEA

13

6/16/2023 5:27:05 PM


B CM & R I S K M AN AGE M E NT

14

EC JUNE_2023.indd 14

MEA

J U N E 2023

6/16/2023 5:27:36 PM


F U T U R E SEC U RIT Y AWA R D

O U R SP ON SORS P L AT I N U M PA R T N E R

G O L D PA R T N E R S

S I LV E R PA R T N E R S

S T R AT E G I C PA R T N E R

BROUGHT TO YOU BY

M E D I A PA R T N E R S

J U N E 2023

EC JUNE_2023.indd 15

MEA

15

6/16/2023 5:28:17 PM


EVENTS

7th edition of GCC Security Symposium Saudi Arabia After the successful event in Qatar, Security Symposium held in Saudi Arabia witnessed an overwhelming response from CISOs, BCM heads, Risk and Resilience officers, and technology heads gathered for an unforgettable event. Security Symposium set its sights firmly on demonstrating the latest trends and concerns on cybersecurity. The event showcased the remarkable commitment and dedication of Saudi Arabia’s cybersecurity community, highlighting the vital role they play in protecting businesses, infrastructure, and individuals from cyber risks. Attendees and keynote speakers were welcomed by Anushree Dixit, Global Head - Content & Strategic Alliance, GEC Media Group. She shared the vision and aim of the GCC Security Symposium which is an ideal platform to gain exceptional knowledge on how an agile BCM plan will bring increased flexibility and agility to every organization. Adnan Ahmed, Lead Specialist - Business Continuity & Risk, Maaden - Saudi

16

EC JUNE_2023.indd 16

MEA

Arabian Mining Company, kicked off the event with his opening keynote on Business Continuity Implementation Challenges in the Kingdom. The event had a closer look into how leaders in BCM and Risk management are helping companies to build a strong business case for business continuity and crisis\risk management. The event was joined by some expert speakers like Muzammil Riyaz, Founder, BlueFinn GRC, who speaks about ‘Pathbreaking GRC Solution for Middle East’, Bader Ramadan Ismail Shaath, Senior Solutions Engineer, Enterprise, Cloudflare, who shared his knowledge on the topic ‘Everywhere Security for the New Digital Era’, Mustafa Farag, Presales Engineer - EMEA, Paessler AG who speaks on the topic ‘Keep an Eye On Your IT With Paessler PRTG’ and Niraj Mathur, Managing Director, Protiviti Middle East Member Firm who shared his views on the topic “Navigating Data Privacy in the Middle East”

J U N E 2023

6/16/2023 5:28:19 PM


EVENTS

l

The event was made a thought-provoking one by some inspirational Panel discussions and Fireside Chats. The Panel discussion and Fireside Chat were held on the following topics by the following expert leaders: Fireside Chat - What is the ROI of investing in a BCM Plan? Mohammad Hassan Abdullah, Business Continuity, IT Disaster Recovery, Crisis Management, Technology Risk and IT Governance, Johns Hopkins Aramco Healthcare l Riyaz Feroze, Security Strategy & Leadership, Program Delivery & IT Governance, BCM/ DR Delivery, IT services l Saghir Ahmad Khan, Technical Program Manager, Saudi Business Machines l Rajeesh Kumar, CTO, Mindifre Technologies l Moderated by: Adnan Ahmed, Lead Specialist - Business Continuity & Risk, Ma’aden (Saudi Arabian Mining Company) l

Panel Discussion: State of Cloud Security in Modern Enterprises - 2023 & Beyond l Dr. Srijith Nair, CISO, Careem l Moayad Al Ghanmi, Director of Information & Cyber Security, King Abdullah Economic City l Vikram Verma, Head of IT Governance, Security, and Project Delivery, Roshn l Charbel Ghostine, Regional Cloud Alliance Manager (META), Barracuda l Mohammad Ahmad Alomari, Director, Cyber Security & Privacy Management, Solutions by stc

Moderated by: Saghir Ahmad Khan, Technical Program Manager, Saudi Business Machines

Panel Discussion: The State of BFSI Security & Risk Management in 2023 l Zidan Attia, Associate Manager Operational Risk & Risk Management, Islamic Development Bank l Hatem Fallatah, Senior Risk Management Specialist, Center for National Health Insurance l Abdelmajed A Saeed, Cyber Security GRC Manager, Insurance Sector l Arsalan Yousuf, Director – Resilience & Crisis Management, Deloitte Middle East l Moderated by: Eng. Mohammed Mahnashi, Information Technology Advisor, Government The partners for the GCC Security Symposium KSA edition include BlueFinn (Platinum Partner), Amiviz, Protiviti, Cloudflare, OPX Technology (Gold Partners), Paessler PRTG, Mindfire Technologies, Finesse, Barracuda (Silver partners), and CAAS (Strategic Partner). BCM & Risk Champions Awards, CISO Awards, and Future Security Leaders Awards identified the top security leaders and the hard taskmasters in the industry and recognized their excellent contributions to their major sectors. The event was closed by Anushree Dixit, Global Head - Content & Strategic Alliance, GEC Media Group with her closing note.

J U N E 2023

EC JUNE_2023.indd 17

MEA

17

6/16/2023 5:28:22 PM


C YBER SENTINAL CI

18

EC JUNE_2023.indd 18

MEA

J U N E 2023

6/16/2023 5:29:40 PM


C IS O AWARD | KSA

J U N E 2023

EC JUNE_2023.indd 19

MEA

19

6/16/2023 5:31:00 PM


B CM & R I S K M AN AGE M E NT

20

EC JUNE_2023.indd 20

MEA

J U N E 2023

6/16/2023 5:32:06 PM


F U T U R E SEC U RIT Y AWA R D

O U R SP ON SORS P L AT I N U M PA R T N E R

G O L D PA R T N E R S

S I LV E R PA R T N E R S mindfire

technologies

S T R AT E G I C PA R T N E R

BROUGHT TO YOU BY

M E D I A PA R T N E R S

J U N E 2023

EC JUNE_2023.indd 21

MEA

21

6/16/2023 5:32:28 PM


EVENTS

Security Symposium UAE partners with UAE Cyber Security Council After the successful edition of Security Symposium in Qatar and Saudi Arabia, Security Symposium held in UAE on 25th May 2023 at Address Dubai Mall, witnessed the talented CISOs, BCM heads, Risk and Resilience officers, and technology heads who all gathered to recognise the latest trends and concerns on cybersecurity. The Security Symposium UAE proudly announces its partnership with UAE Cyber Security Council. Attendees and keynote speakers were welcomed by Ronak Samantaray, Co-Founder & CEO, GEC Media Group. He shared the vision and aim of the GCC Security Symposium which is an ideal platform to gain exceptional knowledge on how an agile BCM plan will bring increased flexibility and agility to every organization. His Excellency Dr. Mohamed Al Kuwaiti, Head of Cyber Security, Cyber Security Council, UAE Government, kicked off the event with his opening keynote. He shared his insights and experience in the field of cybersecurity and provided valuable perspectives on the current state of cybersecurity in the UAE. The event had a closer look into how leaders in BCM and Risk management are helping companies to build a strong business case for business continuity and crisis\risk management. The event was joined by some expert speakers like Muzammil Riyaz, Founder, BlueFinn GRC, who shared his views on ‘Pathbreaking GRC Solution for Middle

22

EC JUNE_2023.indd 22

MEA

East’, Amit Roy, General Manager-Head of Cybersecurity (META), EVIDEN who shared his views on the topic ‘Future of Threat Detection and Response’, Niraj Mathur, Managing Director, Protiviti Middle East Member Firm who speaks about ‘Navigating Data Privacy in the Middle East’, and Ahmad Badawi Abou Zaher, Senior Solutions Engineer, Enterprise, Cloudflare who shared his views on ‘Everywhere Security for the New Digital Era’. The event was made a thought-provoking one by some inspirational Panel discussions and Fireside Chats. The Panel discussion and Fireside Chat were held on the following topics by the following expert leaders: l Fireside Chat - What is the ROI of investing in a BCM Plan? Bilal Ahmad-Information Security & Business Continuity ManagerUnion Coop, Srihari Upadhya, CISSP, CISA, CCSK IT Security, Risk, Audit and Compliance Leader, Aster DM Healthcare, Suzan Al GhanemSection Manager, Business Continuity Environment Agency - Abu Dhabi, Evita Francis M.IOD MBCI CBCP, Business Resilience Practice Leader - MENA-Marsh Moderated by Adnan Ahmed, Lead Specialist Business Continuity, Ma’aden

J U N E 2023

6/16/2023 5:32:31 PM


EVENTS

Panel Discussion: State of Security and Risk Management in Government Organizations- 2023 and Beyond Saqar Al Ali, Director Information Security-Sharjah Finance Department, Zaheer Kazi- Enterprise Messaging & Security Specialist - Ministry of Interior, UAE, Noaman Saleem ul Hasan, Head ERM, BCM & Policies, Khalifa University Moderated by Jacob Mathew, Head of IT | IT Governance, Architecture, Services, Cybersecurity, Infrastructure & Operations, Abu Dhabi Government Entity The partners for the GCC Security Symposium UAE edition include BlueFinn (Platinum Partner), Amiviz, Protiviti, Cloudflare, OPX Technology, Help AG (Gold Partners), Cloud Box, Accops, Eviden, Seclore, Paessler PRTG, Mindfire Technologies, Finesse, Barracuda (Silver partners), and CAAS (Strategic Partner). BCM & Risk Champions Awards, CISO Awards, and Future Security Leaders Awards identified the top security leaders and the hard taskmasters in the industry and recognized their excellent contributions to their major sectors. The event was closed by Anushree Dixit, Global Head - Content & Strategic Alliance, GEC Media Group with her closing note. GCC Security Symposium will be back in coming years with innovative ideas and overarching themes.

l Panel Discussion: State of Cloud Security in Modern Enterprises - 2023 & Beyond Mohammad Faheem, Cyber Security Lead - CHALHOUB GROUP, Marzouq A., IT Services, Director of Cloud Security - G42, Rejeesh Kumar, CTO, Mindfire Technologies, Hirdejit Singh, Head of Sales & Presales (APAC & EMEA) – Seclore Moderated by Akshay Lamba, Chief Digital Officer, Kalaam Telecom l

Panel Discussion: Building Emotional Resilience & Creating Effective Human Recovery Processes for Crisis Situations Vidya V. -Head of Cyber Strategy and Cyber Risk & GovernanceCareem, Carlo Loveri - Risk and Business Continuity ManagerEmirates Steel, Rebecca Carr, Risk Advisory, Crisis and Resilience Director, Deloitte Middle East, Vikalp Shrivastava, Vice President Information Security & Technology, Kerzner International Moderated by Ing. Adam El Adama, Sr. Manager for Digital Governance, Risk & Information Security, Abu Dhabi Ports Digital Cluster l

Panel Discussion: State of BFSI Security and Risk Management in 2023 Flavio Carvalho, CISSP, CISO, Sofinco Espana, Waqas Haider, Chief Information Security Officer, HBL Microfinance Bank, Neha Yadav, CISO, RAIN, Ahmed Nabil Mahmoud, MVP, CCISO, CISSP, CISM - Head of Cyber Defense and Security Operations, Banking Industry Moderated by Bharat Raigangar, Group CISO & Board Advisor, Finesse

l

J U N E 2023

EC JUNE_2023.indd 23

MEA

23

6/16/2023 5:32:33 PM


BCM & RISK MANA

24

EC JUNE_2023.indd 24

MEA

J U N E 2023

6/16/2023 5:32:55 PM


NAG EMENT | UAE

J U N E 2023

EC JUNE_2023.indd 25

MEA

25

6/16/2023 5:33:30 PM


CYBER SENTINAL CI

26

EC JUNE_2023.indd 26

MEA

J U N E 2023

6/16/2023 5:34:04 PM


C IS O AWARD | UAE

J U N E 2023

EC JUNE_2023.indd 27

MEA

27

6/16/2023 5:34:46 PM


CYBER SENTINAL CI

28

EC JUNE_2023.indd 28

MEA

J U N E 2023

6/16/2023 5:35:21 PM


C IS O AWARD | UAE

J U N E 2023

EC JUNE_2023.indd 29

MEA

29

6/16/2023 5:35:39 PM


FUTURE SECURIT

30

EC JUNE_2023.indd 30

MEA

J U N E 2023

6/16/2023 5:36:00 PM


RI T Y AWARD | UAE

O U R SP ON SORS P L AT I N U M PA R T N E R

G O L D PA R T N E R S

S I LV E R PA R T N E R S mindfire

technologies

AQUILA I

S U P P O R T I N G PA R T N E R

S T R AT E G I C PA R T N E R

BROUGHT TO YOU BY

M E D I A PA R T N E R S

J U N E 2023

EC JUNE_2023.indd 31

MEA

31

6/16/2023 5:36:23 PM


EVENTS

GITEX Africa, the most inf luential tech event

32

EC JUNE_2023.indd 32

MEA

J U N E 2023

6/16/2023 5:36:24 PM


EVENTS

The first African edition of GITEX, the world’s largest connector event for startups and investors, was successfully held from 31 May to 2 June 2023 in Marrakech, Morocco. GITEX Africa was the largest and most influential technology event in the African continent. This year, it attracted over 20,000 trade buyers, 900 exhibitors and start-ups, and 125 government delegations. GITEX AFRICA was hosted by the Digital Development Agency (ADD) under the High Patronage of His Majesty King Mohammed VI and under the supervision of the Moroccan Ministry of Digital Transformation and Administrative Reform. More than 100 government agencies from 80 countries participated in GITEX Africa 2023 and has sparked investment commitments and public-private partnership announcements that lead the Africa’s digital transformation initiatives. GITEX Africa explored Africa’s digital agenda, from generative AI and digital cities, fintech and agritech to healthcare, energy, innovation, sustainable development goals and a focus on the world’s most exciting startup ecosystems. Many exhibitors showed how AI is driving a wave of innovation in everything from education and agriculture to transportation, retail, energy and logistics. GITEX Africa was an opportunity for everyone to highlight their commitment to the continent, expand presence and market reach through their ecosystem of partners as well as showcase the latest technological innovations that are helping the customers to

increase productivity, reduce costs and fuel growth. GITEX Africa 2023 has also partnered with North Star, the world’s largest start-up event, connecting more than 400 start-ups, including 100 Moroccan start-ups from across the globe to extend engagements, build connections, and scale imaginations in an African tech ecosystem. The event was a great platform for many companies to showcase their products and solutions. Aruba, a Hewlett Packard Enterprise company influenced other major organizations with their innovative business outcomes. Ingram Micro showcased its portfolio of leading products and solutions to the global audience and got a chance to meet the business partners, suppliers, and customers. Barracuda, a trusted partner and leading provider of cloud-enabled security solutions showcased its latest email, cloud and network security solutions. Redington’s mission of GITEX Africa, that is, “Accelerating Transformation” includes fast-tracking cloud and digital technology adoption, designing security-first strategies and integrating cybersecurity solutions and services right from the beginning of an organization’s digital transformation journey. HP showcased how the company is working to shape the continent’s future through sustainable, inclusive, and tech driven solutions. Mindware’s objective was ‘Cloud Distributor of Choice’ in Morocco, aggregating multiple Cloud solutions and helping partners create and commercialize subscription-based Cloud and Anything-as-a-Service (XaaS) solutions.

J U N E 2023

EC JUNE_2023.indd 33

MEA

33

6/16/2023 5:36:25 PM


EVENTS

Kissf low awards Middle East Business Partners with Tesla Model 3 34

EC JUNE_2023.indd 34

MEA

J U N E 2023

6/16/2023 5:36:32 PM


EVENTS

Kissflow awards Middle East Business Partners with Tesla Model 3 to help Middle East sales organizations tap into the $50 billion low-code market, Kissflow has announced an innovative new partner program. The program offers unrivaled commission and rebate potential, unlimited access to world-class training programs, and the flexibility to support the go-to-market model the partners prefer. The company made the announcement at its first annual Partners Summit held at Dubai’s iconic Burj Al Arab hotel, organized by GEC Media Group, UAE, was attended by 65 channel executives. The company also announced that it will award the iconic Tesla Model 3 to sales organizations that meet their 12-month sales targets. Kissflow CEO Suresh Sambandam, who made headlines last year by presenting senior executives with new BMW 5 Series cars to mark the company’s 10th anniversary, said, ““At Kissflow, we have an unparalleled appreciation for our employees and partners and have therefore shattered the restrictive structure of traditional partner programs. Following meticulous market research, we have designed our new program to maximise partner

profitability by offering the region’s most lucrative rewards. Backed by our powerful and intuitive Low-code Platform, this enables partners to rapidly cater to the region’s growing demand for digital transformation, customised enterprise app development and process automation – all while reaping the highest margins.” While other providers tie rewards and benefits into a rigid tier system that requires significant time and capital investment from partners, Kissflow instead tailors the program to each partner’s unique needs and ambitions. Kissflow is the only provider that offers commissions not only on the initial sale, but also on annual renewals. Partners who register with Kissflow have unlimited, free access to the provider’s world-class training resources, helping them quickly build their skill set. At the request of partners, the company also organizes special personal training courses. “The benefits of our program aren’t in any way tied to the number of trained resources a partner has. In fact, we have intentionally avoided creating certifications while still investing heavily to provide our partners with all the resources they need to develop the highest levels of technical competency in the area of Low-code,” said Sambandam.

J U N E 2023

EC JUNE_2023.indd 35

MEA

35

6/16/2023 5:36:48 PM


CHANNEL

Cloudflare equips organizations with the Zero Trust security Cloudflare, the security, performance, and reliability company helping to build a better Internet, extended its single-vendor SASE platform, Cloudflare One, to generative artificial intelligence (AI) services. Cloudflare One for AI, a suite of Zero Trust security controls, will enable enterprises to safely and securely use the latest generative AI tools without putting intellectual property and customer data at risk. With every transformative step forward in technology, from mobile phones to cloud computing, there are new security threats that rise to the surface. Major companies have banned the use of popular generative AI chat apps because of sensitive data leaks, and Italy instituted a temporary ban on generative AI tools for inadequate user data protection. According to a KPMG survey on generative AI, AI is expected to have an enormous impact on business, but the majority of US executives surveyed are years away from implementing it; cyber security (81%) and data privacy (78%)

are the most top of mind concerns for leaders. CISOs and CIOs need to strike a balance between enabling transformative innovation through AI and still maintaining compliance with data privacy regulations. Whether it’s an employee experimenting with AI, or a company initiative, once proprietary data is exposed to AI, there is no way to reverse it. Cloudflare One for AI provides a simple, fast, and secure way for companies to safely build using the latest generative AI technologies, without compromising security or performance. Generative AI is an exciting technology with the promise to transform how we work. As this technology evolves and new tools and plugins are developed, Cloudflare’s platform approach to security will ensure that enterprises everywhere can embrace these productivity enhancements without creating bottlenecks and ensure compliance with the latest regulations.

Matthew Prince, co-founder and CEO of Cloudflare

BeyondTrust global survey provides insights on identity issues BeyondTrust, the worldwide leader in intelligent identity and access security, has announced the release of a new global survey, “Identity Issues Impact Zero Trust Effectiveness.” The survey’s research focused on understanding current identity and zero trust trends, adoption rates, incidents, solutions, challenges, and new areas of focus. The research also investigated the integration requirements and techniques for zero trust solutions and how they interact with other key business applications and systems. The report reviewed key findings from a research survey interviewing more than 300 participants across five continents and included security teams, IT professionals, and executives. The research found that almost all respondents had an identity-related incident in the last eighteen months, with 81% indicating two or more incidents. A significant number of these incidents were related to privileged accounts. Over

36

EC JUNE_2023.indd 36

MEA

70% of companies are still in the process of implementing a zero trust approach needed to secure an expanding security perimeter due to increased cloud utilization and remote workers. Nearly all companies indicated they were using multiple vendors and solutions for their zero trust strategy, with most using four or more solutions. Of the companies interviewed, 70% rely on custom coding for integration, often provided by costly third-party services. Eighty-four percent needed several different integration approaches for their zero trust defense, complicating the deployment process. Integration has become a critical issue for many companies, as over 70% of those surveyed removed a security solution simply because it didn’t integrate effectively. Those surveyed reported that gaps in their zero trust approach resulted in slower issue resolution, poorer user experiences, incorrect access privileges, manual intervention, compliance issues, and more.

Morey Haber, Chief Security Officer at BeyondTrust

J U N E 2023

6/16/2023 5:36:48 PM


CHANNEL

Salesforce drives customer transformation in the Middle East with latest AI, Data and CRM tools Salesforce, the global leader in customer relationship management (CRM), is experiencing strong growth in the Middle East and enabling customer-focused transformation across the region, with new Artificial Intelligence-powered solutions helping organizations to boost productivity and improve customer service and personalization, according to Thierry Nicault, Area Vice President – Middle East and North Africa, Salesforce, speaking at the company’s Salesforce World Tour Essentials Dubai event today. Salesforce brought together more than 3,000 delegates in person, including customers and partners, to the event, which was held at the Madinat Jumeirah Conference Centre, Dubai. The event saw keynote speakers including Thierry Nicault, Area Vice President and General Manager, Salesforce Middle East, share insights about Salesforce’s Middle East strategy and how its latest innovations across Artificial Intelligence, data and CRM are helping customers

transform, while providing Salesforce partners with opportunities for growth. Fifteen Salesforce customers from various sectors including real estate, energy, banking, and telecoms joined the sessions, offering attendees key insights into how Salesforce Customer360 is helping them deliver success and transform their operations in the field. The event was Salesforce’s first opportunity to present its newest innovations in the Middle East. Among the solutions it demonstrated were Einstein GPT, which creates personalized content across every Salesforce cloud with generative AI to make employees more productive and customer experience better; and Data Cloud, which aggregates and harmonizes data from multiple sources to provide a single profile of the customer. Data Cloud, which is essentially the intelligent heart of Customer360, transforms the ability of organizations to understand their customers, deliver personalized activations, and raise efficiency.

Thierry Nicault, Area Vice President Middle East and North Africa, Salesforce

Gartner survey finds CEOs cite AI as the top disruptive technology impacting industries A recent survey of CEOs and senior executives by Gartner, Inc. revealed that artificial intelligence (AI) was the top technology that CEOs believe will significantly impact their industry over the next three years, cited by 21% of survey respondents. The 2023 Gartner CEO and Senior Business Executive Survey was conducted from July through December 2022 among over 400 CEOs and other senior business executives in North America, Europe, Asia/Pacific, Latin America, the Middle East and South Africa, across different industries, revenue and company sizes. Despite the impact of these economic headwinds, half of CEOs cited growth as the top strategic business priority for the next two years. Technology also remains a top focus area for CEOs, closely followed by workforce issues. In fact, mentions of environmental sustainability rose 25% over the previous year’s survey, which was the first time sustainability ranked

among CEOs’ top 10 priorities. Gartner predicts that by 2026, environmental sustainability will be a higher CEO strategic business priority than the technology-related category. Inflation was ranked as the most damaging business risk by 22% of CEOs, and nearly a quarter cited greater price sensitivity as the biggest shift in customer expectations they anticipate this year. However, increasing prices is still the top action that CEOs are taking in response to inflation (44%), followed by cost optimization (36%) and productivity, efficiency and automation (21%). When asked about the impact of various risks on the business, 26% of CEOs cited the talent shortage as the most damaging risk for their organization. Attracting and retaining talent is, by far, CEOs’ top workforce priority. Concerns about compensation are the biggest shift in employee and prospective employee behavior that CEOs anticipate, followed by a desire for greater flexibility and remote or hybrid work.

Mark Raskino, VP Analyst at Gartner

J U N E 2023

EC JUNE_2023.indd 37

MEA

37

6/16/2023 5:36:50 PM


CHANNEL

Nozomi Networks delivers industry’s first AI-powered cybersecurity analysis and response engine Nozomi Networks, the leader in OT and IoT security, introduced Vantage IQ, the industry’s first AI-based analysis and response engine designed to quickly address security gaps and resource limitations in mission-critical operational infrastructure. Available as an add-on to Vantage, Nozomi Networks’ SaaS-based security management platform, Vantage IQ uses artificial intelligence (AI) and Machine Learning (ML) to help security teams do more with less, by automating the time-consuming tasks associated with reviewing, correlating and prioritizing network, asset and alert data. Teams using Vantage IQ gain fast, accurate and in-depth cybersecurity analysis that is not possible with human analysis alone. This advanced human-machine collaboration strengthens cybersecurity and resilience for critical infrastructure organizations while helping security administrators gain workload

efficiencies. Increased complexity in security is challenging security practitioners to decide where to focus their efforts. The volume of threats and the disruption they cause will drive interest toward security solutions that help identify and prioritize the most-critical risks and exposures. Artificial intelligence has always been part of their DNA. While ChatGPT has sparked the world’s imagination around the potential of AI, it’s really just one example of the emerging use case for advancing neural network technologies. In the case of critical infrastructure security, Vantage IQ is a game changer, leveraging artificial intelligence to fundamentally change the way security professionals understand and respond to operational risk. They believe it’s the way cybersecurity data will be queried, analyzed and acted on going forward. Vantage

Andrea Carcano, Co-Founder and Chief Product Officer at Nozomi Networks. IQ is an optional add-on to Nozomi Networks’ Vantage SaaS platform. It is available in the third quarter from Nozomi Networks and its extensive global network of channel partners.

NetApp delivers simplicity and savings to block storage with new All-Flash SAN Array NetApp, a global, cloud-led, data-centric software company, announced several innovative products and programs including a new modern block storage offering and a guarantee highlighting NetApp’s best-in-class ability to recover from ransomware attacks. This announcement addresses critical customer challenges including increasing IT complexity, restricted IT budgets, increased urgency around sustainability, and the continued exponential growth of cyberthreats. NetApp’s new ASA (All-Flash SAN Array) A-Series family simplifies the deployment of modern SAN infrastructure while providing guaranteed availability and guaranteed efficiency with accompanying cost savings and leading sustainability. NetApp is also announcing a Ransomware Recovery Guarantee at a time when ransomware costs to global organizations are expected to rise from $20 billion in 2021 to $265 billion by 2031.

38

EC JUNE_2023.indd 38

MEA

Leveraging more than two decades of data storage expertise and more than 20,000 SAN workload customers, NetApp is extending its leadership in NAS and Unified storage with a dedicated block storage line of products, enabling customers to collapse infrastructure silos and simplify their structured and unstructured data environments on-prem and in the cloud. The NetApp Ransomware Recovery Guarantee

leverages ONTAP’s unique combination of key built-in security and ransomware protection features. ONTAP can automatically block known malicious file types, block rogue admins and malicious users with multi-admin verification, and provide tamper-proof snapshots that can’t be deleted – even by the storage administrator. With ONTAP’s industry-leading autonomous ransomware protection, attacks can be detected, additional snapshots are taken immediately, and recovery can occur in a matter of minutes. Given this unparalleled combination of technologies, NetApp will now warrant snapshot data recovery in the event of a ransomware attack. In the event that data copies can’t be recovered with help from NetApp or partner assistance, NetApp will offer compensation.

J U N E 2023

6/16/2023 5:36:50 PM


CHANNEL

Mindware expands distribution agreement with Trellix

(Left to right) Nicholas Argyrides, General Manager Gulf at Mindware and Luca Brandi, EMEA Channel Director at Trellix. Mindware has announced that it has expanded its long-standing distribution agreement with Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), to now include all Trellix branded products and services across United Arab Emirates, Saudi Arabia, Qatar, Bahrain, Oman, Pakistan, Kuwait, Lebanon, Jordan, Iraq, Yemen, and Afghanistan. With the increased frequency, sophistication, and dynamism of cyber threats today, the integration of artificial intelligence and machine learning into security

solutions is of paramount importance to help prevent and mitigate security incidents. It is imperative that cybersecurity evolves at the same pace as threats. Trellix is delivering outstanding protection, resilience, and agility to enterprises through its ‘living security’ approach that learns, adapts, and grows stronger, smarter, and more agile every day. Expanding their partnership with Trellix is a natural progression. With Mindware’s extensive reach in the Middle East market as the leading distributor and Trellix’s industry-leading security solutions, the partnership is set to deliver comprehensive cybersecurity solutions that meet the unique needs of businesses in the region. The Middle East cybersecurity market has witnessed significant growth in recent years, and this trend is expected to continue in the near future. According to research from Frost & Sullivan, the cybersecurity market in the region valued at about $7.5 billion in 2022, will grow at a compound annual growth rate of nearly 20% over the next seven years and is projected to be worth $31 billion by 2030. The launch of the Trellix Xtend program comes at a crucial time for organizations, as an evolving security landscape continues to give rise to new threats to their data, finances, and reputations. Their partnership with Mindware is focused on supporting the needs of their channel ecosystem with the right elements to drive growth and build their own customised services.

New Pure Storage survey underscores importance of IT modernization Pure Storage, the IT pioneer that delivers the world’s most advanced data storage technology and services, in partnership with Wakefield Research, released a new report identifying the obstacles organizations across industries face in today’s digital economy while on the path to modernization, and the investment priorities they are focused on to support business growth. The new report, “IT Leader Insights: The State of IT Modernization Priorities and Challenges Amid Economic Headwinds,” reveals the need to evolve from legacy infrastructure in order to reap the full benefits of emerging technologies investments. Digital transformation has accelerated at lightning speed, bringing an unprecedented need for IT modernization. In the face of economic headwinds, IT teams are still focused on operationalizing and supporting new digital initiatives, but with the added pressure of tighter budgets and lower

staffing levels. Amidst current inflation and recessionary concerns, IT teams must strike a complex balance between supporting critical IT services for their organization and setting up a foundation on which future initiatives can thrive. With thoughtful investments, organizations can keep vital systems running efficiently while accelerating their ability to keep pace with digital transformation. Investments in emerging technology such as AI and Machine Learning are exciting ventures for organizations interested in gaining a competitive edge, but without a modern IT infrastructure foundation the long-term success of these investments is at critical risk. The findings in their report show how agile IT leadership will need to continue to challenge legacy infrastructure solutions in order to simplify their core structure, in turn driving significant efficiency and flexibility to fuel their future.

Shawn Rosemarin, Vice President, R&D and Customer Engineering, Pure Storage

J U N E 2023

EC JUNE_2023.indd 39

MEA

39

6/16/2023 5:36:50 PM


CHANNEL

Proofpoint’s 2023 Voice of the CISO report revelations Proofpoint, Inc., a leading cybersecurity and compliance company, today released its annual Voice of the CISO report, which explores key challenges, expectations, and priorities of chief information security officers. The findings reveal that most CISOs have returned to the elevated concerns they experienced early in the pandemic. Fifty-five percent of CISOs in Saudi Arabia surveyed feel at risk of a material cyberattack, compared to 27% the year before, when they may have felt a brief sense of calm after adapting to the chaos of the pandemic. This year’s data is a shift back to 2021 when 58% of CISOs in the Kingdom believed a material attack was imminent. Likewise, sentiments about preparedness levels have reversed: 49% feel unprepared to cope with a targeted cyber-attack, showing a significant increase over last year’s 28% and a decrease from 2021’s 66%. While organizations have largely over-

come the disruptions of the last two years, the effects of the Great Resignation and employee turnover continue to linger, exacerbated by the recent wave of mass layoffs—90% of CISOs in Saudi Arabia say that employees leaving the organization played a role in a data loss event. Even though 65% of security leaders had to deal with the loss of sensitive information in the past 12 months, 50% believe they have adequate data protection in place. The 2023 Voice of the CISO report examines global third-party survey responses from more than 1,600 CISOs at mid-to-large size organizations across different industries. Throughout the course of Q1 2023, 100 CISOs were interviewed in each market across 16 countries: the U.S., Canada, the UK, France, Germany, Italy, Spain, Sweden, the Netherlands, UAE, KSA, Australia, Japan, Singapore, South Korea, and Brazil.

Emile Abou Saleh, Regional Director, Middle East & Africa at Proofpoint

Veritas simplifies FY24 channel program to help partners drive growth

Yudum Yonak, Channel Director of International Emerging Region at Veritas.

40

EC JUNE_2023.indd 40

MEA

Veritas Technologies, the leader in secure multicloud data management, unveiled substantial updates to its Veritas Partner Force program for the company’s fiscal year 2024 (FY24). The updated program, launched to channel partners in April, helps accelerate their transition to the cloud with enhanced rewards for cloud-based deals and a simplified transaction process, in addition to new training and accreditation programs. As a global hub for digital transformation, it’s no surprise that recent Veritas international cloud research found the UAE is ranked in the top two globally for public cloud adoption. With more businesses migrating to the cloud, they want to empower their partners to deliver a seamless transition by making it easy for them and their customers to do business with us. By

streamlining their channel platform processes they are delivering on this mission of making it easier for their partners to focus on what they do best—providing exceptional service to customers. That’s why they are focused this year on streamlining their processes, rewards, and pricing, all while supporting their partners with additional enablement packages and more flexible development funding. Veritas will launch new initiatives in FY24 to improve the resources available to both the twotier channel and managed service providers that will simplify engagement. This news coincides with the recent appointment of Oliver Norman, Vice President of Channel & Alliances EMEAI at Veritas, who manages and supports Yudum in her role across the International Emerging Market.

J U N E 2023

6/16/2023 5:36:53 PM


CHANNEL

AVEVA recognized as a leader in the IDC market scape AVEVA, a global leader in industrial software, driving digital transformation and sustainability, announced that it has been positioned in the Leaders Category in the IDC MarketScape: Worldwide Process Manufacturing Execution System 2023 Vendor Assessment. AVEVA MES is a model-driven solution that supports the modelling of operational workflows, production processes, and equipment. This configurable business process management approach enables standardization of operational processes across multisite operations and provides a centralized management platform for data analysis with visualization. The model-driven and process-based approach have been some of AVEVA’s core strengths for a long time now. This is a differentiator for the company, aligning with the needs of core industries served by AVEVA. Over time, the com-

pany also built a comprehensive core domain knowledge in process manufacturing both through the manufacturing execution side and the plant design optimization. These capabilities are essential to drive digital transformation (DX) across the asset and operational life cycle for capital-intensive industries. These features, together with a strong momentum in innovation toward a new cloud architecture, will contribute toward AVEVA’s long-term success in process manufacturing. AVEVA has a significant presence in process manufacturing, food and beverage and consumer packaged goods sectors, with key references cited in the report including Danone, Henkel, Valmet Automotive, Barry Callebaut, and Borg Manufacturing. In February, AVEVA launched its AVEVA Manufacturing Execution System 2023, which

Keith Chambers, Vice-President, Operations Management Software, AVEVA helps standardize and introduce best practice more quickly and at scale, to improve operational and cost efficiency and promote sustainability. The new product also promotes increased supply chain resilience and agility with unified visibility, reporting and KPIs across multi-site operations.

BenQ with instant products and solutions BenQ, the Taiwan based company and the leader in display solutions showcased their products and solutions in the Integrate Middle East event. BenQ markets and promotes three kinds of product lines in their company in the Middle East region which are projectors, monitors, and professional display products. At any given point in time, BenQ has more than 70 models to offer to the partners and to the end users. They are showing the scenarios in real estate, museums, control rooms, exhibitions, art, projection mapping, and in simulation. The solutions that they adopt have been practically executed and implemented in various countries in a real-time way. Such solutions BenQ has done in UAE, and Saudi Arabia and there is an abundance of end users who are using it as well. Dr. Sulaiman Al Habib Hospital is using their solutions in their MRI rooms and in their cancer rooms. Sidra real estate in Saudi Arabia is using its real estate solutions. They introduced for the first time their latest LED based technology, SSI technology or Solid State Illumination technology which is an instant On and Off. Generally, there is a small-time lag when one switches on the projector. But in the SSI based projector, it’s an instant on and instant off. It has got a power saving module integrated. Another one is the Interactivity which is a smart projector and these are Android based on and have got various technologies infused to it. They have integrated an Artificial Intelligence concept that tracks the people which is a face recognition camera. It will recognize people sitting in the corporate and in the meeting room and it focuses on them.

Manish Bakshi, Managing Director, BenQ ME

J U N E 2023

EC JUNE_2023.indd 41

MEA

41

6/16/2023 5:36:54 PM


REAL LIFE

IFZA joins forces with ZOHO to help businesses improve efficiency IFZA Dubai, the UAE’s most dynamic and truly international Free Zone, has signed a collaboration agreement with Zoho, a global technology company that offers award-winning online productivity, collaboration, and business applications, to provide the members of the IFZA Free Zone community with leading-edge digital tools that will help increase efficiency and ensure compliance.

This move is part of IFZA’s commitment to support its Free Zone community in their compliance to the upcoming implementation of the Corporate Tax which requires all UAE-registered businesses to set up government-compliant accounting and financial bookkeeping systems as part of the process of filing of Corporate Tax Returns. This will have an impact on all businesses, regardless of whether they are

required to pay a corporate tax or only submit annual tax returns. Zoho One – a cloud-based platform that enables businesses to perform all their functions on a single interface, accessible from anywhere – includes access to FTA accredited tax accounting software, Zoho Books. This facilitates business transactions, manages customers and vendors, issues tax-compliant documents, generates reports, and files tax returns effortlessly. This agreement offers members of the IFZA Free Zone community, a Zoho starter package which includes a dedicated portal and customer support and training that enables them to quickly adopt technological solutions for their business. Both IFZA and Zoho share a common belief of putting People First through products, processes and knowledge that are developed in a constant state of improvement for the benefit of their customers. They look forward to providing their global network of Partners and Licensees an easy-to-use platform that would help them to build not only their business but, more importantly, strong relationships with their customers.

Porter announces first-ever international expansion with its foray into UAE Porter, India’s leading tech-based, on-demand logistics company has announced its first overseas expansion with entry to UAE offering intra-city logistics services in Dubai. The expansion comes under the company’s current plan to explore the GCC regions, and the Indian subcontinents. The logistics start-up, which is backed by some of the most renowned and active venture capital investors including Tiger Global, Sequoia and Lightrock India had earlier raised USD 100 Million in Series E funding for expanding operations. The company will provide a tech-enabled platform to ensure hassle-free deliveries through its LCVs and 2-wheelers addressing the gap in intracity logistics requirements in the region for small package delivery requirements of both personal and businesses. Presently with more than 20,000 + customers onboard, Porter plans to make an investment of $6 million in UAE for the next 3 years. Additionally,

42

EC JUNE_2023.indd 42

MEA

(Left to right) Pranav Goel, CEO & Co-Founder, Porter and Ankit Dwivedi, AVP - International Business, Porter.

the company is looking to bolster operations in these cities and further increase their customer acquisition by 2x to 40,000+ and vehicle base by 3.2x to 800+ by March 2024. Porter offers cost-effective solutions that can

help in improving lower vehicle utilisation, increasing the competence of the system, and ensuring the availability of appropriate vehicles for customer requirements. This will also result in efficient intracity logistics, lesser rates for customers and more earnings for driverpartners. The company currently has 300+ LCVs on the platform and recently introduced 15 two-wheelers to expand its operations in the region. In April, during the holy month of Ramadan, Porter pledged to make a positive impact on the community by contributing iftar meals and clothes with every delivery. With this, Porter aimed at helping those in need by providing a healthy and fulfilling meal at the end of a long day of fasting. The company looks forward to tapping more potential opportunities in the intra-city logistics segment in the future for scaling its business.

J U N E 2023

6/16/2023 5:36:55 PM


REAL LIFE

SAS commits $1B to AI-powered industry solutions SAS, the leader in analytics, will invest $1 billion over the next three years to further develop advanced analytics solutions targeted at the unique needs of specific industries. In banking, government, insurance, health care, retail, manufacturing, energy and more, SAS will build upon its decadeslong focus on providing tailored solutions to industry challenges. This industry commitment and the rapid time-to-value these solutions deliver are key SAS differentiators. All industry solutions will run on SAS Viya, SAS’ cloud-native, massively parallel AI and analytics platform. The billion-dollar investment includes direct research and development, industry-focused line-of-business teams, and industry marketing efforts. It will fund the innovative work of SAS data scientists, statisticians and software developers working with consultants, systems engineers and marketers with specific industry experience. The investment is in line with the trend toward democratizing data analytics. By putting the power of advanced analytics in the hands of more people with varied experience and job roles, organizations and society will benefit. It’s what SAS calls analytics for everyone, everywhere.

As organizations continue to embrace AI, machine learning, computer vision and Internet of Things (IoT) analytics to gain valuable insights, people of all skill levels can participate in the analytics process through low- or no-code options like those delivered by solutions running on SAS Viya. Last year’s economic headwinds roiled global markets, reversing post-pandemic rebounds and forging an increasingly precarious risk landscape. To help banking and insurance customers meet the challenges ahead, SAS acquired Kamakura Corp., a financial risk firm revered for its rigor, particularly in integrated balance sheet management. The acquisition, the largest in SAS history, added some of the most renowned names in quantitative risk management to SAS’ roster. It’s also accelerating advances in SAS’ suite of integrated risk solutions.

Fake ChatGPT apps scam users out of thousands of dollars, Sophos reports Sophos, a global leader in innovating and delivering cybersecurity as a service, announced that it had uncovered multiple apps masquerading as legitimate, ChatGPT-based chatbots to overcharge users and bring in thousands of dollars a month. As detailed in Sophos X-Ops’ latest report, “’FleeceGPT’ Mobile Apps Target AI-Curious to Rake in Cash,” these apps have popped up in both the Google Play and Apple App Store, and, because the free versions have near-zero functionality and constant ads, they coerce unsuspecting users into signing up for a subscription that can cost hundreds of dollars a year. In total, Sophos X-Ops investigated five of these ChatGPT fleeceware apps, all of which claimed to be based on ChatGPT’s algorithm. In some cases, as with the app “Chat GBT,” the developers played off the ChatGPT name to improve their app’s ranking in the Google Play

or App Store. While OpenAI offers the basic functionality of ChatGPT to users for free online, these apps were charging anything from $10 a month to $70.00 a year. The iOS version of “Chat GBT,” called Ask AI Assistant, charges $6 a week—or $312 a year—after the three-day free trial; it netted the developers $10,000 in March alone. Another fleeceware-like app, called Genie, which encourages users to sign up for a $7 weekly or $70 annual subscription, brought in $1 million over the past month. The key characteristics of so-called fleeceware apps, first discovered by Sophos in 2019, are overcharging users for functionality that is already free elsewhere, as well as using social engineering and coercive tactics to convince users to sign up for a recurring subscription payment. Usually, the apps offer a free trial but with so many ads and restrictions, they’re barely useable until a subscription is paid.

Sean Gallagher, principal threat researcher, Sophos

J U N E 2023

EC JUNE_2023.indd 43

MEA

43

6/16/2023 5:36:55 PM


REAL LIFE

SunMoney Solar Group invests in a revolutionary tyre recycling technology SunMoney Solar Group, which runs the largest community solar program in the world and has its own asset-backed clean energy token, the SDBN2, recently invested in a revolutionary tyre-recycling technology. The futuristic technology’s efficient system, whose solution SunMoney Solar invested in, has a zero carbon footprint of its own, along with a minimal energy requirement during the recycling process, thus drastically reducing its environmental impact. The tyre recycling technology is part of SunMoney Solar’s larger effort to create a more sustainable future for all of its stakeholders. As part of its commitment to sustainability and corporate responsibility, SunMoney Solar is working hard to develop cleaner energy sources and investments. The all-new tyre recycling technology has been developed by a cooperation between an Austrian and a Swiss company and uses advanced machinery and processes to break down used tyres into their component materials without releasing any harmful emissions into the atmosphere i.e. zero carbon footprint. The material produced can then be reused to create new products such as insulation foam, playground surfaces, rubber mats or even artificial turf for sports fields. Tires, when burnt as a source of fuel instead of recycling them

(Left to right) Zoltan Rendes, Gabor Eisenbart, Peter Bahorecz, SunMoney Solar Group properly, emit a lot of harmful chemicals in the environment. They also throw off tiny plastic polymers into their surroundings that more often than not end up as pollutants in waterways. The groundbreaking technology is set to have a major impact on global waste management practices. By utilizing this advanced recycling process, companies can reduce their environmental footprint while still producing high quality products without any additional cost or effort. Not only does this process help reduce waste by diverting it from landfill sites; it also helps save money on purchasing new materials for manufacturing purposes.

SolarWinds adds transformative AI features to IT service management solutions SolarWinds, a leading provider of simple, powerful, and secure observability and IT management software, announces it is adding transformative artificial intelligence (AI) and machine learning (ML) capabilities to its IT service management (ITSM) solutions. The new AI features include a virtual agent to help users solve everyday IT problems and guided incident resolution to empower agents with the information they need to effectively resolve complex issues. The new SolarWinds Service Desk additions are designed to reduce ticket volume by enabling users to remediate easier-to-solve issues so IT practitioners can focus on the complex issues requiring their expertise. The Service Desk AI virtual agent can answer user questions and support troubleshooting. By constantly learning based on interactions with users, the virtual agent adapts over time to provide the most helpful and relevant information and help solve issues based on each customer’s

44

EC JUNE_2023.indd 44

MEA

specific needs. The cloud-native SolarWinds Service Desk solution is highly regarded in the industry for being easy to use and effective for users and agents while providing quick time to value. Automated ticket routing, AI-powered smart suggestions, and the new virtual agent within Service Desk all help ensure agents can efficiently deliver services across the organization. Customers can also enhance and personalize Service Desk through integrations with over 200 popular cloud applications. SolarWinds solutions are rooted in the company’s deep connection with tech professionals. The company engaged directly with customers through THWACK, its community of over 180,000 users, to develop and test the new AI capabilities and ensure they make it easier for IT pros to do their jobs. A recent survey of SolarWinds customers found the new Service Desk AI features enabled IT teams to reduce ticket resolution time by 24% and save an aver-

Cullen Childress, GVP of product management at SolarWinds. age of 23 hours per week. Surveyed Service Desk customers have also reported a reduction in downtime of 21% on average and a 24% average increase in progress toward achieving service-level agreements (SLAs).

J U N E 2023

6/16/2023 5:36:59 PM


Enterprise Marketplace

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors

10 Years

50+

500+

Industry Experience

Vendors

Resellers

UAE

KSA

AFRICA

EGYPT

QATAR

www.amiviz.com EC JUNE_2023.indd 45

6/16/2023 5:36:59 PM


CHANNEL WATCH

Business growth, sustainability insights: a road to success AmiViz offers one of its kind consumer-style e-commerce platforms with a fusion of human touch, offering products and services catering to localized market conditions and regulations across the MEA region.

A

miViz specializes in providing businesses with comprehensive Cyber Security solutions and professional services. AmiViz is committed to ensuring the safety and security of customer’s digital assets by offering top-notch technologies and expert guidance. The team of skilled professionals works closely with customers to understand their unique needs and provide tailored solutions that help them achieve their goals while maintaining the highest level of security. Key enablers that positively influence the business in the regional environment include adopting cybersecurity measures, compliance with regulations, board-level requirements, and national cybersecurity compliance mandates implemented by various countries.

Companies also need to adopt circular economy practices that prioritize recycling and reducing waste.

Equity and diversity in workplace There has been a noticeable rise in diversity awareness, and the region has experienced a blend of cultures and global perspectives. However, organizations can further emphasize the positive impact of diversity in the workplace to foster a more inclusive environment. Business growth is a key goal for any company, and customer satisfaction plays a critical role in achieving this objective. To foster customer gratification, businesses must prioritize providing quick responses to customer queries and concerns, offering the right solutions to their problems, and providing exceptional support. In addition to increasing a company’s productivity and efficiency, technology also plays a strategic role in improving customer interaction and making them feel appreciated and respected. Businesses must invest in cybersecurity not only to protect themselves from online attacks but also to safeguard customer data and privacy. In the end, a dedication to a commitment to a customer is essential for any business to flourish in today’s competitive marketplace.

The rising role of technology

46

EC JUNE_2023.indd 46

MEA

Digital technologies can play a significant role in strengthening urban resilience and mitigating the impacts of severe weather conditions. New sensors and data analysis techniques can help in monitoring changes in climate patterns and predicting extreme weather events. Geographic information systems (GIS) and other mapping tools can simplify urban planning and management by providing detailed information on community assets and infrastructure. Advanced computing technologies such as machine learning and artificial intelligence can be employed to analyze vast amounts of data and generate insights into how to strengthen urban resilience. By leveraging these technologies, cities can better prepare for and respond to extreme weather events, and improve the overall quality of urban living for their inhabitants.

J U N E 2023

6/16/2023 5:37:01 PM


CHANNEL WATCH

Creative vision To tackle urban carbon emissions, companies should focus on implementing sustainable practices such as reducing energy consumption, promoting green transportation, and utilizing renewable energy sources. Companies also need to adopt circular economy practices that prioritize recycling and reducing waste. And, they must recognize the urgency of reducing their carbon emissions and take active steps toward achieving a sustainable future for urban areas.

A journey of business, culture and organization As a company, AmiViz recognize the importance of staying at the forefront of technological innovation to drive business forward. That’s why AmiViz have developed the platform to suit a unique business model, which will provide AmiViz’s partners and vendors with quick access to relevant information and streamline their workflows. The platform is designed to provide tips and resources that AmiViz’s partners and vendors can use to improve their operations and drive success. It also features tools to help speed up the process, allowing partners and vendors to access the information they need quickly and easily. In addition, AmiViz’s platform offers tremendous development possibilities. AmiViz is constantly updating and improving the platform to ensure that it stays ahead of the curve and meets the evolving needs of AmiViz partners and vendors. By leveraging cutting-edge technology and innovative features, AmiViz believes the platform will help drive growth and success for business and partners for years to come. AmiViz initiated a comprehensive digital transformation with the launch of our B2B marketplace, serving as a central hub connecting partner vendors and customers. Emphasizing digitalization and cloud adoption, the focus for the coming decade is to facilitate seamless cloud-based service consumption and delivery, ensuring streamlined operations and efficient collaboration within the ecosystem.

Unlocking an advanced future

Ilyas Mohammed COO AmiViz

Last year, it was instrumental in introducing a special program to focus on identifying and nurturing the talent inside the company. With this program, AmiViz can empower the young members of the team to take charge and spearhead initiatives at various levels in the organization. This new approach not only drove business growth but also cultivated a strong, self-sufficient workforce culture with a positive impact on the company’s overall success. AmiViz’s goal is to generate US$100 million in revenue by leveraging the agility and efficiency of our marketplace. AmiViz online platform and mobile app are powered by the latest technologies that boost many business tools, which can help partners accelerate their growth strategy by simply collaborating with AmiViz. Some of these tools are the CEC Lab, white labeling opportunity, credit support, online ordering, presales, inside sales, and marketing support. This enables to enhance transactional efficiency and establishes long-lasting relationships with partners for service delivery and consumption.

J U N E 2023

EC JUNE_2023.indd 47

MEA

47

6/16/2023 5:37:03 PM


COVER STORY

Tech trends, reshaping data storage The demand for data storage will keep growing in the coming years. NetApp is embracing various innovative trends in data storage, including artificial intelligence (AI) and machine learning (ML) to enhance data management and analytics.

W

hat are some of the biggest challenges facing companies when it comes to data storage, and how do you address them?

NetApp recognizes that companies face challenges such as limited IT resources and expertise, challenging internal processes, and case management/support when it comes to data storage. To address these issues, NetApp offers a dedicated Support Account Manager (SAM) who partners with customers to navigate these challenges, minimize TCO, and achieve business objectives.

How do you balance the need for data security with the need for accessibility and ease of use? NetApp ensures data security without compromising on accessibility and ease of use through its comprehensive approach, which includes robust data protection features, encryption, secure authentication, and access controls. Its solutions enable centralized management, making it easier for administrators to manage and secure data while providing users with a seamless and secure experience.

Can you talk about some of the trends and innovations in data storage that you are currently following or implementing? NetApp is embracing various innovative trends in data storage,

48

EC JUNE_2023.indd 48

MEA

including artificial intelligence (AI) and machine learning (ML) to enhance data management and analytics. It is also implementing cloud-based solutions for hybrid and multicloud environments, and software-defined storage, for more scalable and cost-effective storage options. Furthermore, NetApp is integrating data management and protection capabilities to improve data governance and compliance with industry standards. The company’s primary focus is on leveraging new technologies to enable efficient and effective data storage, management, and analysis, delivering value to its customers.

How do you ensure that your data storage solutions are scalable and can accommodate future growth? NetApp ensures that its data storage solutions are scalable and can accommodate future growth through its newest program, NetApp Advance. This program offers customers the options and flexibility they need to simplify their future with NetApp. With NetApp Storage Lifecycle Program, our customers can streamline their refresh cycles; they buy once and enjoy non-disruptive refreshes of their storage controllers every 3 years at no additional cost or upgrade to a new controller anytime for increased capacity and performance as needs arise.

What role do cloud-based storage solutions play in your overall data storage strategy? Cloud-based storage solutions are an integral part of NetApp’s data storage strategy, offering flexibility, scalability, and cost-effectiveness for customers to store and manage their data securely in the cloud. NetApp’s cloud solutions, such as NetApp Cloud Volumes, also offer hybrid cloud support, allowing data to move seamlessly between on-premises infrastructure and the cloud.

J U N E 2023

6/16/2023 5:37:03 PM


COVER STORY

and independent audits by accredited third parties. Their commitment is validated by adhering to standards such as ISO/IEC 27001, GDPR, NIST SP 800171, and Common Criteria. NetApp’s integration of international best practices enables customers to use their products and services regardless of compliance needs, with a list of in-scope software/hardware and relevant certificates/auditor’s reports available for each compliance offering.

How do you manage and maintain data backups, and what steps do you take to ensure data recovery in the event of a disaster?

Walid Issa, Senior Manager, Solutions Engineering MEA NetApp

How do you manage and store data from different sources, such as social media, IoT devices, and other non-traditional sources? NetApp manages and stores data from different sources, including social media and IoT devices, by providing scalable and flexible solutions. NetApp’s data management platform, ONTAP, enables customers to consolidate data from multiple sources into a single storage infrastructure, ensuring that data is easily accessible, secure, and manageable. NetApp also offers Hybrid and Multi cloud-based solutions like Cloud Volumes that can store and manage data from non-traditional sources like social media and IoT devices.

How do you ensure that your data storage solutions are compliant with local and international regulations? NetApp ensures compliance with global, regional, data security, and privacy regulations through self-assessments

NetApp provides comprehensive data backup and recovery solutions that enable customers to protect their data from disasters and ensure rapid recovery. NetApp’s solutions leverage cutting-edge technologies such as SnapCenter and Cloud Backup with BlueXP to provide fast and reliable backup and recovery. Additionally, NetApp’s ONTAP software provides advanced data protection capabilities such as pointin-time recovery, storage efficiency, and encryption. NetApp also offers disaster recovery solutions, such as the NetApp Disaster Recovery-as-a-Service (DRaaS), which enables customers to replicate data to multiple locations for faster recovery in the event of a disaster. NetApp’s backup and recovery solutions provide customers with peace of mind that their data is protected and recoverable.

9. How do you address the issue of data silos, and what steps do you take to ensure that data is easily accessible across the organization? NetApp provides unified data management solutions that allow organizations to easily manage, access and share data across their environment. With a unified approach, data silos are eliminated, and data can be accessed across various platforms and locations. NetApp’s solutions include advanced data management features, such as intelligent data tiering, policy-based data movement, and data replication, which simplify data access and management while ensuring data is available when and where it is needed.

Finally, what advice would you give to other companies looking to improve their data storage solutions and strategies? NetApp advises companies to embrace a data-driven culture, invest in technologies that enable flexibility and scalability, prioritize data security and compliance, and leverage Hybrid and Multi-cloud-based storage solutions. NetApp also recommends working with a trusted partner who can provide expert guidance and support throughout the process. ë

J U N E 2023

EC JUNE_2023.indd 49

MEA

49

6/16/2023 5:37:04 PM


COVER STORY

Safeguarding data across borders With the increasing reliance on technology for storing and circulating important and personal information, the threat of data breaches and theft has become a major issue. Organizations are embracing privacy by design principles and enhancing transparency in their data handling practices.

How do you balance the need for data security with the need for accessibility and ease of use?

A

s data has taken precedence and gained utmost importance for security, what are some of the challenges that organizations facing today and how do you address them? Organizations in the Middle East are facing significant challenges in effectively managing and safeguarding vast amounts of data, complying with data privacy regulations, addressing increasing cyber threats, and ensuring data protection across various platforms. To tackle these challenges, we recommend organizations to develop a data privacy and data security program which is a phased approach towards achieving their goals. This involves developing their strategy, developing and implementing best practices for data discovery, data classification, implementation of technology controls and monitor them 24x7. One of the fundamentals is to plan the journey in a logical manner rather than investing in technologies without meeting the pre-requisites for a successful implementation.

50

EC JUNE_2023.indd 50

MEA

To achieve a harmonious balance, it is crucial to initially align the security program with the organizational business functions and clearly define expectations while safeguarding the customer experience. Subsequently, creating and executing a customized security and privacy-centric program that is intuitively designed and seamlessly integrated for end users is necessary.

With data so diversified today in storage and movement, what are some of the trends you see in the market that organizations are implementing to increase data security? Organizations are exploring various avenues to enhance data security. Firstly, the adoption of cloud technology has resulted in the implementation and expansion of cloudbased security solutions. These solutions seamlessly utilize advanced encryption and authentication mechanisms, offering precise controls for privileged users. This significantly contributes to securing data stored and processed in the cloud. Secondly, there is a growing emphasis on data-centric security approaches within data centers, such as masking, tokenization, and classification. These measures significantly

J U N E 2023

6/16/2023 5:37:04 PM


COVER STORY

l l

l l l l l l l l

Default assumption of data security responsibility lying with the tenant Carefully define and establish a responsibility segregation matrix when entering into contracts with service providers Implement robust access control mechanisms Utilize encryption for data at rest and in transit Monitor and log activities taking place in the cloud Design, implement, and establish security configurations as a baseline Conduct regular assessments and audits of the environment Periodically review the independent security reports published by the cloud provider Assess the security measures of your third-party vendors Conduct comprehensive risk assessments regularly to identify, track, and mitigate risks specific to the cloud environment

How does data security controls identification and implementation differentiate between on premise infrastructure and on cloud infrastructure?

Niraj Mathur, Managing Director, Security and Privacy Practice, Protiviti Member Firm for the Middle East

improve the overall security maturity. Lastly, the Middle East region has witnessed the release or ongoing development of privacy regulations. As a result, organizations are embracing privacy by design principles and enhancing transparency in their data handling practices.

What can organizations do to ensure that their data is secured in a cloud environment spanning across IaaS, PaaS and SaaS solutions available today in the market? When designing security measures for a multi-tenant or service environment, it is crucial to consider the following essential aspects:

These two distinct technology delivery models necessitate identifying and delineating different levels of responsibility. In an on-premise infrastructure model, the organization retains complete control over security controls, while in cloud environments, security and other responsibilities are often shared with the cloud provider. Cloud environments require a comprehensive approach to identifying and implementing security controls that can be applied within this shared responsibility framework. The extent of shared responsibilities varies based on the service model adopted by the organization, with responsibilities decreasing as the model transitions from IaaS (Infrastructure as a Service) with the most responsibilities, to SaaS (Software as a Service) with the least responsibilities.

How do organizations plan to manage and secure data from different sources such as Social Media, IoT devices and more modern data oriented technologies? Robust data governance, security, and privacy strategies are essential for effectively managing and safeguarding data from diverse sources. A key consideration is to conduct thorough risk assessments before adopting modern data-centric technologies, as they can highlight potential issues that need to be addressed. In addition to establishing baseline security controls, organizations are embracing advanced analytics and AI-driven technologies to detect anomalies in real time, enabling proactive response and immediate action.

J U N E 2023

EC JUNE_2023.indd 51

MEA

51

6/16/2023 5:37:06 PM


COVER STORY

with privacy and security regulations, organizations can mitigate risks and ensure proper adherence to privacy requirements.

How relevant are data backups and data recovery in a cloud environment? Ans: Data backups and data recovery play a vital role in cloud environments, ensuring the availability of data, mitigating the risk of data loss or corruption, and supporting business continuity. This significance is particularly notable in service models such as IaaS, where organizations have control over data backups and restoration. However, in the case of SaaS, data backups become the responsibility of the cloud provider. Therefore, it is crucial to thoroughly review the contractual agreement regarding data availability while also ensuring that the platform remains resilient to cyber-attacks. Organizations can safeguard their data and maintain operational continuity in the cloud environment despite rampant ransomware attacks.

What would be an ideal journey for an organization embarking on the data security? Organizations must start by conducting a comprehensive assessment of existing data security measures and identify areas of improvement. The next critical step is to define clear and measurable goals while also aligning with any local regulation that may apply to the organizations’ environment. The identified controls need to be then integrated with the overall security management framework of the organization in order to ensure that the framework remains holistic and compliments the data security centric technologies that the organizations implement. It is also imperative to design and implement the right operating model for data security to ensure continuous improvements.

Finally, what advice would you give to organizations looking to strategize and mature their data security practices?

Varun Kukreja, Director, Protiviti Member Firm for the Middle East

What are some of the regulatory requirements organizations should be aware of w.r.t data security and privacy of data? The applicability of privacy regulations largely depends on the industry and the country in which an organization operates. Some countries within the Gulf Cooperation Council (GCC) region have already enacted privacy laws e.g. UAE, KSA, while others are in the process of doing so. It is crucial for organizations to closely monitor the release of these laws and regulations to avoid penalties, litigation, and ensure effective implementation of privacy laws. By staying updated and compliant

52

EC JUNE_2023.indd 52

MEA

The following recommendations are suggested to enhance the maturity of data security practices within organizations. Organizations can proactively strengthen their data security practices by following these recommendations and effectively mitigate risks, 1. Develop a data security strategy and roadmap aligned to organization and regulatory needs 2. Conduct Data Discovery to gain visibility for structured and unstructured data 3. Establish comprehensive security policies that outline guidelines and procedures for data security 4. Classify your data and enforce classification through technology controls 5. Implement technologies to protect data transfer securely within the organization and outside the organization 6. Regularly assess and update security measures to adapt to evolving threats and technologies 7. Stay informed about emerging threats, industry best practices, and advancements in data security technologies 8. Operationalize your processes to ensure continuous improvements ë

J U N E 2023

6/16/2023 5:37:07 PM


2023

www.btxshow.com

15 J U N E SOF I T E L A B U D H A B I C O R N I C H E - U A E

TRANSFORMATION IN

SECURITY NETWORKING BUSINESS APPLICATIONS IT & COMPUTING TRANSFORMATION IN

TRANSFORMATION IN

TRANSFORMATION IN

D RIV ING BUS INES S E XCE L L E NCE & TO TAL EXP ER IENC E T RANF ORM AT I ON

J U N E 2023

EC JUNE_2023.indd 53

MEA

53

6/16/2023 5:37:07 PM


INTERVIEW

How Redington is playing a crucial part in Africa’s transformative process as a technology aggregator and ecosystem provider

Viswanath Pallasena, CEO, Redington

54

EC JUNE_2023.indd 54

MEA

J U N E 2023

6/16/2023 5:37:07 PM


INTERVIEW

EC MEA: Africa is always known to have leapfrogged technologies. How do you see the region achieving newer strides in technology with GITEX now?

EXCERPTS FROM THE INTERVIEW OF VISWANATH PALLASENA, CEO, REDINGTON AT GITEX AFRICA

VP: The true impact of our efforts can be seen in how technology improves the lives of ordinary people. To remain relevant in any market, technology must address real needs. In Africa, technology has played a significant role in areas such as food and supply, pharmaceuticals, healthcare, and accessible financial services. Numerous microfinancing and fintech platforms have emerged successfully across many African countries, all powered by technology, security measures, and the devices that facilitate access to these services. Redington is pleased to be part of this transformative process as a technology aggregator and ecosystem provider. From distributing mobile phones to cloud solutions and everything in between, we offer the necessary infrastructure, security solutions, and consulting practices to support our customers’ digital transformation.

EC MEA: What are you showcasing in GITEX Africa? EC MEA: It is the inaugural edition of GITEX Africa, how do you see this as a great step towards Africa’s tech competitiveness?

VP: GITEX is a significant technology showcase that Redington has been actively participating in for a long time. It’s particularly exciting that GITEX is taking place in Africa because Africa holds tremendous potential for technology to make a meaningful difference in people’s lives across various aspects. Technology is crucial for achieving equality, ensuring rights, and improving overall quality of life. Therefore, Africa greatly needs and benefits from events like GITEX, and I am delighted to be involved in this inaugural edition.

EC MEA: Tell us about your presence and reach in the Africa

VP: Africa has been a market where Redington has had a presence for over 14 to 15 years. Initially, our approach involved establishing service centers to directly serve customers and then expanding through distribution. However, as technology advances, we see innovations like cloud computing and digital solutions breaking down boundaries and becoming universally accessible. In response, our approach to Africa has shifted to focus more on digitalization rather than just physical infrastructure. We have launched a digital twin of Redington, a platform that caters to the businesses and technologies we manage. Through this digital portal, we have onboarded partners from across Africa and conduct business digitally. Additionally, we offer cloud solutions through our portal called Cloud Quarks, enabling us to provide a wide range of cloud services directly to customers in Africa through our channel partners.

VP: At GITEX, we are showcasing a combination of services provided by Redington and its subsidiaries, including Ensure and DigiGlass. Ensure focuses on delivering excellent customer experiences through its service centers located across 25 African countries. Meanwhile, Citrus Consulting assists our customers in their digital and technological transformations. Additionally, DigiGlass, our managed security services business, addresses the increasing importance of security for customers in Africa, particularly through our channel partners. DigiGlass has already amassed nearly 100 customers who benefit from our managed security services. In addition to DigiGlass, we are highlighting the best cloud solutions and security-related protocols and platforms we offer. Our goal is to create a digital replica of our work in Africa, just as we do elsewhere, to expand our digital e-commerce capabilities through a B2B website and make our cloud services and solutions widely available in multiple countries. These priorities demonstrate our commitment to Africa and our determination to provide relevant solutions tailored to the region’s specific needs.

EC MEA: How are you expanding your reach in Africa?

VP: Our team in Africa is substantial, and while we have been primarily driven by expatriate employees in the past, we are actively transitioning to a more countrydriven approach. We are dedicated to promoting and nurturing local talent in every location we operate. ë

J U N E 2023

EC JUNE_2023.indd 55

MEA

55

6/16/2023 5:37:07 PM


FEATURE

Supply chain and digital transformation Dell Technologies provides leading digital technology solutions, products, and services to drive business success in the digital age through our integrated solutions portfolio, from edge-to-core-to-cloud. Some of the key technology sub-segments that Dell caters to include Data Protection, Data Storage, Servers and Networking, Hyperconverged Infrastructure, Laptops, PCs, Monitors, and more. Customers look to Dell Technologies for its market-leading Cloud, Edge, Infrastructure, Security APEX, and Workforce Solutions.

N

ext-generation technology shifts such as multi-cloud, edge computing, and AI/ML are prompting new business models and ways of working. We can see that business and customer requirements are changing at a fast pace in both large and medium-sized businesses, and the channel is being challenged to adapt business models and routes to market accordingly. Thus, we are seeing partners’ own IP and consultative skills driving their differentiation and profitability. We are also seeing a trend where partners are shifting to servicing, with the “As-a-Service” market projected to grow. End-to-end supply chain visibility allows organizations to track products and their components, from the raw materials and assembly stage to their final destination. However, supply chain visibility isn’t just about tracking products, it is a more holistic view and approach that can provide critical data from every standpoint. For business, this access to data in real-time

56

EC JUNE_2023.indd 56

MEA

J U N E 2023

6/16/2023 5:37:08 PM


FEATURE

Charbel Zreiby, Director, Channel Presales META, Dell Technologies

is essential in planning, as well as identifying the sources of supply chain disruptions, to better manage responses to incidents. Ultimately, this leads to enhance customer experience and satisfaction across various aspects. Digital transformation has a significant impact on a company’s brand name. Companies that successfully implement digital transformation initiatives can enhance their brand reputation by delivering exceptional customer experiences, improving operational efficiency, and demonstrating their innovation capabilities. On the other hand, companies that fail to embrace digital transformation may struggle to remain relevant and may experience a decline in their brand value. It is therefore critical for companies to adapt to the changing digital landscape to maintain their competitive edge and ensure their brand stays relevant. Digital transformation is revolutionizing the way companies operate, and so various organizational departments

are having to evolve accordingly. As companies adopt new technologies, new roles are also emerging. At Dell Technologies, we understand the importance of supporting employees as they adapt to the evolving digital landscape. Providing employees with ongoing training and development opportunities is necessary to ensure they are up-to-date with the latest technologies and tools. It is also essential to foster a culture of collaboration and innovation to drive cross-functional teams and assume diverse perspectives. The recent rapid developments in technologies offer tremendous opportunities and challenges for businesses. Companies that embrace digital transformation can unlock significant value and gain a competitive edge. By leveraging advanced technologies such as IoT, AI, and cloud computing, companies can improve efficiency, streamline operations, and enhance customer experiences. However, these technologies also pose risks, such as cyber threats and data breaches. To mitigate these risks, companies must prioritize data privacy and security, adopt a proactive approach to risk management, and establish robust security frameworks. Companies must seek out ways to continuously evolve their brand to remain relevant and engage with customers effectively. It has never been more important to build a strong online presence and leverage social media to connect with customers and stakeholders. We prioritize fostering diversity, inclusion, and innovation at all levels of our organization to attract customers and retain top talent. Our commitment to these values drives innovation and enhances the overall brand by bringing different perspectives to ensure the relevance and appeal of the solutions we provide. ë

J U N E 2023

EC JUNE_2023.indd 57

MEA

57

6/16/2023 5:37:10 PM


FEATURE

Mouna Essa, Vice President Schneider Electric, Secure Power

Supply chain: Automation plays a key role in promoting sustainability The core business of Schneider Electric’s Secure Power Division is to provide power management and protection solutions for critical infrastructure applications, including data centers, hospitals, and industrial facilities. We offer a range of products and services, including uninterruptible power supplies, surge protection devices, power distribution units, and software for monitoring and managing power usage.

58

EC JUNE_2023.indd 58

MEA

J U N E 2023

6/16/2023 5:37:10 PM


FEATURE

C

hannel partners in large and medium-sized businesses often face challenges such as limited resources, intense competition, and the need to adapt to changing customer needs and dynamic market trends. In addition, they must keep up with technological advancements and stay abreast of industry regulations to remain relevant in their respective markets. End-to-end supply chain visibility refers to the ability of businesses to track and monitor their products or services at every stage of the supply chain, from the raw materials to the end customer. Achieving end-to-end supply chain visibility is essential for businesses to enhance their efficiency, responsiveness, and overall customer satisfaction. Supply chain automation plays a key role in promoting sustainability by reducing waste, optimizing transportation, and enhancing energy efficiency. By automating processes such as inventory management, order fulfillment, and transportation routing, companies can reduce their carbon footprint, minimize resource consumption, and improve overall supply chain performance. Digital transformation can impact a company’s brand name positively by improving visibility, reputation, and customer experience through technology. However, it may also pose challenges such as adapting to changing customer preferences and cybersecurity risks. Ultimately, its impact depends on how well a company navigates these opportunities and challenges. Globally we have seen digital transformation bring in the automation of repetitive tasks, job creation, and changes in existing roles. Employees may need to acquire new skills to adapt to new technologies and processes, and departments may need to redefine their responsibilities to incorporate digital tools and strategies. The integration of technology can streamline workflows, improve productivity, and enhance communication and collaboration. Organizations need to identify areas where digital transformation can bring the most significant benefits and invest in the necessary training and resources to ensure a smooth transition. Current and future technological landscapes bring with them their own unique advantages and challenges for individuals and businesses alike. Technology has led to unprecedented improvements in efficiency, productivity, and convenience. Automation has increased the speed and accuracy of many tasks, and artificial intelligence has enhanced decision-making and customer service. However, there are concerns about privacy, secu-

rity, and job displacement. There are also worries that technology may worsen inequality and increase unemployment. As technology continues to advance, it is crucial to acknowledge both its potential advantages and disadvantages and take measures to minimize any negative consequences. Globally, the growth in technology is revolutionizing sectors such as healthcare and finance through advancements such as telemedicine, digital health records, and medical research to improve health outcomes, while fintech innovations like mobile payments, blockchain, and AI are transforming the financial industry. As digital culture continues to expand, we’re constantly adapting brand and user interface experiences to meet changing expectations. We’re also using technology to enhance the customer experience, such as offering digital tools for monitoring and managing critical power and cooling solutions. Most recently we announced the launch of our DCIM ‘TradeOff Tool’ that allows CIOs and teams to calculate the expected ROI for what-if scenarios on various monitoring solutions – enabling AI-driven, intelligent decision-making in an increasingly competitive and transparent market. And most importantly, we stand firm on our commitment to sustainability and social responsibility, values that resonate deeply with the younger generation and amplify our reputation as a conscientious industry leader and partner of choice. Modernizing and automating the supply chain is a vital step toward achieving a futureproof global supply chain. As part of our commitment to modernizing and automating the supply chain, we’re implementing various initiatives to address this need. Our solutions leverage cutting-edge technology such as automation, machine learning, and predictive analytics to optimize supply chain processes and enhance visibility. For instance, our SmartUPS with EcoStruxure technology enables remote monitoring and management of critical power infrastructure. These solutions help our customers achieve greater supply chain efficiency, sustainability, and resilience while also reducing costs and mitigating risks. Our current expectations from vendors, stakeholders, and consultants are focused on collaboration, innovation, and sustainability. We believe that working together with our partners can drive meaningful change and accelerate progress toward a more sustainable future. ë

J U N E 2023

EC JUNE_2023.indd 59

MEA

59

6/16/2023 5:37:11 PM


FEATURE

AI, and blockchain to streamline processes, reduce costs, and increase transparency Our primary focus is to provide clients with advanced digital transformation solutions. Our expertise lies in digital transformation, advanced techs such as digital twins and metaverse, as well as event and MICE services. Our mission is to revolutionise how brands connect with their audiences by offering inventive, personalised, experiential tech that achieves client objectives.

C

hannel partners serve as intermediaries between businesses and their customers, helping expand reach and increase sales. Some typical challenges channel partners face include managing the sales cycle and customer expectations, inventory, logistics, and relationships, as well as meeting sales targets and ensuring compliance. To succeed, customers must work closely with businesses that provide support and resources, including training, marketing support, and ongoing communications and collaboration. End-to-end supply chain visibility is the ability to track and monitor products and materials as they move through the supply chain. It provides real-time information about the location, status, and condition of products, as well as shipment progress, enabling businesses to mitigate delays, disruptions, and quality issues, as well as proactively improve efficiency. Also helps businesses meet regulatory and compliance requirements.

60

EC JUNE_2023.indd 60

MEA

Supply chain automation can help businesses promote sustainability by reducing waste and emissions, enhancing transparency and traceability, increasing efficiency and productivity, and enabling data-driven decision-making. By adopting sustainable practices throughout the supply chain, businesses can not only reduce their environmental impact but also improve their reputation, attract customers, and drive long-term growth. Digital transformation can help businesses improve customer experience by providing personalised, seamless, and convenient interactions across all touchpoints. It can also improve its reputation as innovative, socially responsible, and customer-focused, helping them stay competitive in a rapidly evolving market by providing faster, more efficient, and more cost-effective processes. This all helps create loyal customers by providing personalised experiences, enhanced services, and reliable products. It is important to note though that digital transformation can also have a negative impact if not executed properly or not aligned with the company’s values or customer needs. It is, therefore, crucial to approach digital transformation strategically, keeping in mind brand identity, customer preferences, and long-term goals. As companies adopt new technologies and processes, employees must learn new skills and adapt to new ways of working. Departments may need to work closely together to share data and ensure a seamless customer experience. Overall, it requires a holistic approach to workforce management,

J U N E 2023

6/16/2023 5:37:11 PM


FEATURE

Siddhant Sharma, Co-Founder & COO, RAYQUBE.

including upskilling and reskilling employees. Digital transformation can affect different roles and departments, including IT, operations, sales and marketing, and customer service. For example, it can streamline operations, automate processes, and reduce manual labor, as well as create new opportunities in social media and content marketing, chatbot development, and data analysis. Both landscapes offer several advantages and disadvantages for businesses and society. Increased efficiency, productivity, and innovation are all the result of technology enabling businesses to auto-

mate processes, improve decision-making, and reach new markets. In addition, tech can enhance communication, education, and healthcare, leading to better outcomes for individuals and society. Disadvantages associated with technology include job displacement, social isolation, and privacy concerns. Tech can contribute to environmental degradation, if not used responsibly, and while it continues to evolve, it is important to always consider the impact and work carefully towards minimising any negatives and maximizing benefits. This requires responsible innovation, ethical considerations, and ongoing collaboration between stakeholders. As digital culture continues to grow, businesses are adapting to meet the changing needs and preferences of their customers and employees. To appeal to the next generation of workers and customers, businesses are changing the look and feel of their brand and their products’ social appeal. This may include developing digital marketing strategies, creating engaging social content, and enhancing the user experience of products and services. Businesses are also embracing digital platforms to engage with customers and employees, including chatbots, social media, and online communities. By staying attuned to the evolving digital landscape, businesses can better connect with their target audience and build stronger relationships. I completely agree, especially considering recent disruptions to the global supply chain. To futureproof the supply chain, businesses must adopt a more agile and resilient approach that leverages technology to improve efficiency, visibility, and collaboration. This may include the use of automation, AI, and blockchain to streamline processes, reduce costs, and increase transparency. By rethinking the supply chain network and embracing new technologies, businesses can better adapt to changing market conditions, mitigate risks, and meet the evolving needs of customers. This requires a long-term commitment to digital transformation and a willingness to continuously innovate and improve. ë

J U N E 2023

EC JUNE_2023.indd 61

MEA

61

6/16/2023 5:37:11 PM


PRODUCTS

HP releases Z by HP workstations using HP Anyware Remote System Controller HP announced its new Z by HP high-performance workstation desktop lineup, engineered to change what is possible within complex, data rich workflows. HP is advancing hybrid workforce management with the HP Anyware Remote System Controller, a device that gives IT departments the management capabilities to support high performance devices from

anywhere. The complex workflows in industries spanning media and entertainment, data science, and engineering mean increased time pressure and the need for more compute power to deliver faster results. They also highlight a need to iterate with remote teams and push creative boundaries to deliver more accurate results.

The new Z by HP Z4, Z6, Z8, and Z8 Fury desktops, powered by Intel®, deliver the scalable balance of CPU and GPU compute needed to fuel new levels of speed, accuracy, and creativity. Z by HP innovations start with the customer to deliver the performance benefits needed whether it’s importing and working with large models and assemblies, running complex simulations, or training complex deep learning and machine learning models faster. The latest Z workstation desktops include up to 56 CPU cores and four high-end GPUs in the Z8 Fury G5. The Z4, Z6, Z8, and their all-new Z8 Fury, provide a variety of configurations to meet every workflow challenge for each of these segments. Full suite of hardware alerts available with select Z desktop workstations. See datasheet for details. HP Anyware Remote System Management required to view consolidated reports from all devices paired with HP Anyware Remote System Controller or HP Anyware Integrated Remote System Controller. HP Anyware Integrated Remote System Controller not compatible with Z2 Mini platforms and not recommended for non-Z devices. HP service and support not available for non-Z devices

AVEVA announces launch of AVEVA Predictive Analytics software The new release features automated model building. This new capability enables users to autonomously deploy new predictive models in a single action. This greatly reduces the time required to deploy and scale the predictive maintenance solution while reducing errors and ensuring consistency in model development. With rising market pressures industrial organizations must find ways to facilitate agile, resilient, and profitable operations. The predictive analytics market continues to evolve as the technology has advanced to a point where the data can be leveraged in such a way that asset stakeholders can easily operationalize predictive monitoring of their assets at scale enabling rapid improvements in asset reliability and performance. Key for success is connecting data, systems and processes, enabling people throughout operations and maintenance to make, and act upon, decisions confidently. Scalability of predictive maintenance efforts for maximum return on investment will definitely be seen as a must have for many industries going forward. AVEVA continues to deliver on market and customer requirements with a bring your own algorithm capability. This enables data science teams to add their own artificial intelligence algorithms and intellectual property to the solution. Furthermore, deep integration with the AVEVA PI System ensures AVEVA’s customers are continuing to capture increased value from their existing industrial software investments.

62

EC JUNE_2023.indd 62

MEA

David Bleackley, Value Chain Optimization Lead at AVEVA

J U N E 2023

6/16/2023 5:37:12 PM


PRODUCTS

Infopercept launches Invinsense 4.0 Intercept, a global cybersecurity solutions, and services company announced today that it has launched Invinsense 4.0., a cybersecurity platform that covers offensive, defensive, and security compliance. The platform is now available in Software as a Service (SaaS) form. In addition to traditional IT and Cloud setups, Invinsense 4.0 now covers security in Operational Technology (OT) and Internet of Things (IoT) setups. Since the launch of the first version, Invinsense was designed to cover all three pillars: offensive, defensive, and compliance. With the exponential digital transformation happening in the entire world, all organizations have either started or matured their cloud journey. Infopercept

has been supporting born-in-the-cloud organizations by providing security in the cloud. Making Invinsense 4.0 available in Software as a Service (SaaS) mode was a step further to help organizations in their secured cloud journey. With the launch of Invinsense 4.0, they have further consolidated their IP-led services model by adding more intellectual properties to their service offerings. They have expanded Invinsense 4.0 on three fronts: Covered more landscapes, it now supports IT, cloud, OT, and IoT landscapes; improved user interface and experience, with only three consoles covering offensive (attacker’s mind) and defensive (defender’s brain) security and security compliance; changed mode of offering

Jaydeep Ruparelia, CEO and Co-founder of Infopercept Consulting Pvt Ltd.

through SaaS model. With this version, they have also structured and aligned their respective Managed Detection and Response (MDR) services with different teams for offensive, defensive, and compliance modules.

Trellix launches comprehensive Endpoint Security Suite Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today announced the launch of Trellix Endpoint Security Suite. Trellix Endpoint Security Suite’s products and advanced capabilities empower Security Operations Center (SOC) analysts with superior visibility and control in a single pane of glass to proactively secure all endpoints. Endpoint security is foundational for any organization’s security program and the baseline for securing the enterprise, as each endpoint serves as an entry point into the business. Trellix Endpoint Security Suite provides Trellix customers with a complete end-to-end security solution, helping organizations confidently confront today’s most advanced threats. In its approach to unified security, Trellix is aiming to be outcome-focused, from IDC’s perspective, we concur and reinforce that one of the outcomes should be methodically reducing cyber risk. Endpoint remains the first line of defense for every organization. To strengthen operational resiliency, organizations need a seamless, comprehensive solution for endpoint protection, detection, and response. By integrating endpoint detection and response workflows with deep forensic capabilities, Trellix Endpoint Security Suite is the best solution to effectively manage endpoint security.

Aparna Rayasam, Chief Product Officer, Trellix.

J U N E 2023

EC JUNE_2023.indd 63

MEA

63

6/16/2023 5:37:14 PM


GUEST COLUMN

6 Government IT trends to watch in 2023 After driving a great jump in digitalization in the past three years, IT leaders working in government will have to figure out how to maintain stable and sustained evolution from 2023 onward.

T

he report E-Government Survey 2022: The Future of Digital Government, from the United Nations, highlights that “Determining where to focus is essential for leaders with finite resources looking to truly move the needle on experience—and to promote critical outcomes linked to those efforts.” With uncertain times ahead, Liferay, who has been helping public sector entities on their path to digitalization for more than 15 years, identified the main challenges CIOs in government will face in 2023:

Closing the Gap Between Customer Experience and Citizen Experience Citizens are accustomed to great consumer experiences, and the success of public sector operations is increasingly linked to their ability to provide similar experiences. In fact, the user experience will be a critical KPI in 2023’s digital economy when it comes to providing new government service delivery models. McKinsey & Co., in the article The Global Case for Customer Experience in Government, observes that “By investing in customer experience programs, we’ve found that agencies can address the priorities that matter to every government leader.” In this context, it is worth mentioning that the public sector still has to improve in terms of usability and web design. Often, government sites are not attractive and have a poor user experience. To improve on that, IT teams will have to invest in user-centered design and define consistent design systems that work across all channels.

Turning Complex Legacy Ecosystems into Fully Integrated Environments Given the broad range of services, they must offer citizens, government CIOs often have to manage multiple systems that each have their own technology stack and database. Meanwhile, government employees must expend extra effort to navigate these siloed systems, which mirror the silos in government departments themselves. To bridge this gap between citizen expectations and

64

EC JUNE_2023.indd 64

MEA

To deal with budget constraints, government CIOs are looking for ways to leverage the systems and solutions they already have

budget limitations, public sector organizations are using technologies like digital experience platforms to quickly bring a usable, personalized face to their services, while tackling systems modernization over time. According to Gartner, 43% of Governments will invest in Integration Technologies/APIs in 2023.

Driving Innovation with Reduced Budgets Even though worldwide IT spending is expected to grow 5.1% in 2023, budgets in government will most likely get tighter due to the effects of the global recession expected this year. Doing more with less will be a strong motto for leaders in IT even as digital transformation initiatives for the public sector increase in importance. To deal with budget constraints, government CIOs are looking for ways to leverage the systems and solutions they already have. As new technology acquisitions will be subject to budgetary approval, “this will motivate governments

J U N E 2023

6/16/2023 5:37:14 PM


GUEST COLUMN

to invest in fixed TCO (Total Cost of Ownership) technology that will help them work with tight budgets,” highlighted Chang.

Increasing Operational Efficiency: Public Employees as Allies in Digital Evolution Another critical way to improve citizen experiences is to invest in the employee experience by providing public servants with tools to streamline the processes that directly impact their service to citizens. If public employees continue working with manual, intricate processes, investments in citizen experience may not pay off.

Simplifying Infrastructure Building public infrastructure that allows better access to digital solutions will continue to be a challenge this year, and the cloud is turning into one of the most powerful tools to do so, as, according to Gartner, 62% of Governments will invest in Cloud Platforms in 2023. Gartner also predicts that “migrating services to the cloud is among [the] primary innovation priorities that governments are focused on.” Organizations have been using cloud platforms to simplify infrastructure, reducing the need for maintaining and managing their own infrastructure. As an example of this impact, a January 2021 survey showed that 70% of state and local government executives highlighted that cloud is their preferred environment for hosting citizen and mission data.

Security by Design

Ahmad Saad Country Manager UAE and Qatar, Liferay

According to Gartner, addressing security risks is a top priority for federal and local government CIOs in 2023. Cybersecurity threats continue to grow, so software that was secure yesterday may no longer be secure today. It is imperative that public sector entities stop looking at software security as building a fortified wall. Instead, they should view software security as creating an active immune system that is able to constantly address new threats. Public organizations that excel in dealing with security risks are using enterprise-grade technologies built with a “secure by design” mentality that is compliant with market-wide best practices and equipped with tools to quickly find and mitigate vulnerabilities in code. After analyzing the journey our government customers worldwide have been through, we recognize their effort to stay aligned with citizens’ expectations. Now, flexible, scalable, and secure technologies represent their best shot at maintaining a realistic sustained pace of digital evolution. ë

J U N E 2023

EC JUNE_2023.indd 65

MEA

65

6/16/2023 5:37:15 PM


GUEST COLUMN

Technology is evolving fast and making the world a more connected place The advanced solutions of Ingram Micro covers Data Center products, Enterprise Networks, Cyber Security, Physical Security, AI, IoT, Cloud solutions, Unified Communications, Enterprise Software, and Point of sale solutions. These are supported by their Professional and Financial Services.

P

artners face different challenges depending on the country where they operate. Examples include credit to support large deals in high-income countries such as GCC, retention of skills in areas like cybersecurity, financing multi-year deals and de-risking, increasing risks from cyber fraud, currency devaluation, and International currency availability in several countries. 2022 saw significant delays in hardware shipments. Solutions that required multiple components suffered delays. The situation is getting better. At Ingram Micro the people are focused on giving the customer an accurate ETA. The new platform Xvantage aims to help partners to track shipments and get accurate delivery times. The same applies to Cloud deliveries and renewals. The “E” in ESG, is a key part of their focus. Environment and sustainability are key. They ensure their suppliers are committed, and they have key goals themselves. The word ‘Digital Transformation’ has become overused and may mean different things to different people, including how it’s interpreted by end users, manufacturers, and ISVs. It could mean automation, the use of the latest AI, the type of cybersecurity safeguarding an organization, or various products and services being offered. Simply put, it is to use digital technology to digitize non-digital products, services, or operations and make them more efficient, more friendly, more secure, or faster. So, will this affect a company’s brand name? Yes, absolutely. They will end up being better and safer in what they offer.

66

EC JUNE_2023.indd 66

MEA

The new platform Xvantage aims to help partners to track shipments and get accurate delivery times. The same applies to Cloud deliveries and renewals

Digital transformation has been happening over the last 40 years as computing technology evolved. You see this in innovations like the Internet, programs that have replaced manual accounting, optical charter recognition, Wikipedia, and thousands of other emerging applications. All have created new job roles or enhanced the delivery of certain jobs. Now they all talk and hear about AI, ML, and the latest incarnation of ChatGPT and GPT4.0

J U N E 2023

6/16/2023 5:37:15 PM


GUEST COLUMN

Ali Baghdadi SVP & Chief Country Executive – MEA Ingram Micro

and how this will change job roles in many industries.They see this as a continuation of the transformation and learning. They are intelligent beings and will utilize and adapt. Technology is evolving fast and making the world a more connected place. This digital world is allowing entire nations that were left behind by the industrial revolutions of western countries to advance. It is allowing young startups with good ideas to afford to launch them. It is enabling large companies to become more efficient and focused on customer needs. It is creating new job opportunities where they see shortages in skilled cybersecurity experts. On the other hand, they have seen the rise of cyberspace crime through the use of new technology. There may also be ethical issues related to some research in AI and Organoid Intelligence. The young generation becoming computer savvy before they can talk –Games One, shopping online, virtual tours, and even having Generative AI write homework are already happening. So, for existing and established companies, many are still catering to an older generation. As a result, transformation to meet the emerging needs of a new generation is a must. They at Ingram Micro have started rolling out a platform called Xvantage that will allow their customers, their own employees, and their suppliers to communicate with intelligent and easy-to-use systems driven by AI. When they talk supply chain, historically they spoke about routes to market (to the end user), warehousing, shipping, and delivery of physical goods. Significant progress has been made in automating these processes. They engage all their employees to participate by using LEAN programs and other well-researched methodologies – of course, driven by technology. AI-driven routing of deliveries is a new and emerging technology that will reduce CO2 emissions, reduce costs, and speed deliveries. Financial services to their partner networks will assist in fulfilling large projects. Today, supply chains also apply to non-physical goods. Cloud, SaaS, IaaS & PaaS services are being delivered by Cloud aggregation platforms like their automated CloudBlue platform. There is consolidation among many vendors they deal with. Understanding the role of the channel, be it distribution or one-tier specialist resellers and system integrators is key. Services are also becoming a key value for their partners. They see a rising number of Managed Security Service Providers. Vendors need to cater to the needs of such partners with special programs. ë

J U N E 2023

EC JUNE_2023.indd 67

MEA

67

6/16/2023 5:37:15 PM


GUEST COLUMN

Navigating the trade-offs of cyber attribution It is crucial that security teams first understand their own requirements and limitations before deciding on which level of attribution to pursue, as this allows for an agile “just enough” approach to security.

A

ttribution matters, but to what extent? The game of cyber whodunit is often perceived as a clean and binary question, where threat activity is either attributed or it is not. Yet, it is typically a more complex process that regularly involves difficult trade-offs. Different forms of attribution—ranging from simply linking threat clusters together to identifying the names and faces of an adversary—present vastly different challenges and resource requirements. Analysts making attribution judgements must also weigh up several competing priorities, including the deadlines set by stakeholders, the completeness of data, and the confidence level behind their assessments.

The Three Tiers of Threat Actor and Attribution Analysis Security researchers rarely attribute threat activity to named individuals or organizations. More commonly, attribution involves clustering discrete indicators such as IP addresses or domains that are in some way related. This is commonly known as tactical attribution. Once tactical attribution is achieved, researchers can begin extrapolating characteristics from these activity clusters to achieve operational profiling. Examples of operational profiling include statements such as “a loosely-affiliated group of mostly amateur individuals” or “a coordinated group of criminals with access to sophisticated tools”. By extrapolating out these capabilities, behaviors, motivations, and other characteristics, researchers can get ahead of the threat because they can anticipate if, how, and why an actor may act. Finally, once operational attribution is achieved, researchers may then look to establish strategic attribution. That is, the identity of a threat group or threat actor. This may include an individual’s name or associations, or this identity may only be defined by the sponsor, or ultimate beneficiary, of the threat operations.

68

EC JUNE_2023.indd 68

MEA

Analytical Independence Various entities weigh in on attribution, including CTI vendors, government agencies, and independent researchers. This poses a question on how much we should trust others. Ignoring all third-party intelligence in the pursuit of complete independence would mean neglecting valuable insight. Conversely, sloppy clustering between threat actors tracked by different entities can quickly lead to confusion and imprecision. For example, the threat actor dubbed “Winnti” became increasingly vacuous due to inconsistent methodologies, dubious clustering, and a lack of collaboration between different security organizations. Mandiant naturally pays attention to threat research published by a wide variety of entities and our analysts will explore whether we have overlapping visibility within our own collection universe. However, we are also committed to developing attribution judgements that are firmly based on our independent analysis and primary-source collection data.

Confidence Levels CTI functions should avoid making rash attribution judgments, yet an overly cautious approach can stymie action. Ultimately, if the bar to merging threat clusters is too high, stakeholders will struggle to tackle key threats in a timely fashion. Mandiant Intelligence practices a flexible approach through the use of uncategorized threat clusters (referred to as UNC groups). This enables us to reveal useful insight into threats quickly and without having to complete a lengthy attribution process straight away. For example, shortly after the 2020 SolarWinds supply chain compromise, Mandiant Intelligence released details on the threat actor behind the campaign: UNC2452. This

J U N E 2023

6/16/2023 5:37:16 PM


GUEST COLUMN

Dr. Jamie Collier, Senior Threat Intelligence Advisor at Mandiant and Shanyn Ronis, Senior Manager, Threat Intelligence at Mandiant

Analytic Techniques

Attributing cyber activity should always be seen as an enabler rather than a straitjacket uncategorized group was eventually merged with APT29 many months later but the use of a UNC group allowed Mandiant to publish actionable intelligence as quickly as possible. This also means that Mandiant Intelligence analysts do not need to rush attribution and merging processes.

Going Public While everyone loves a juicy CTI blog post lifting the lid on the latest APT campaign, publicizing threat research involves multiple equities including source sensitivities, a victim’s reaction, the current geopolitical context, implications for ongoing response engagements, and a threat actor’s potential reaction. Ultimately, whether you are a government releasing cyber sanctions or a CTI vendor calling out an APT group, a thoughtful and considered approach is crucial.

Structured techniques play an important role in improving the rigor and quality of analytical assessments. However, they can also be cost, time, and resource-intensive. The role of analytical techniques is therefore best seen as a sliding scale that can be ramped up or down accordingly. For instance, CTI functions may want to ramp up their use of analytical techniques for important attribution judgements with significant implications for their organization or when dealing with poor collection quality. Attribution presents plenty of difficult decisions and complex tradeoffs. But, attributing cyber activity should always be seen as an enabler rather than a straitjacket. Attribution trade-offs can pose awkward questions for a security function, yet the answer is usually obvious when we simply ask: what is best for our organization? That is because the attribution process thrives when it is linked to clear organizational requirements, use cases, and outcomes. This might not be quite as glamorous as trying to replicate government intelligence agencies, but it will be a whole lot more effective for your organization and stakeholders. ë

J U N E 2023

EC JUNE_2023.indd 69

MEA

69

6/16/2023 5:37:16 PM


GUEST COLUMN

How to build an API with security in mind A business should protect their API endpoints by using an API gateway that provides robust authentication, authorization, and continuous auditing capabilities.

A

pplication programming interfaces (APIs) are the preferred means of connecting modern applications and have become an indispensable part of application development. Businesses rely on them to share data with developers, third parties, and customers. However, the data they handle and the endpoints they access also make them an attractive target for hackers looking to illegally access sensitive organization data. While you can add security features to APIs during or after deployment, it’s often not enough. To properly secure them, you need to include security in the design phase and build it from the ground up. This gives you a better chance of protecting your API from threats.

Build APIs with a security foundation Security is a constantly evolving challenge. Cybercriminals are always looking for new ways to exploit vulnerabilities to their benefit. This is why it is important to consider security requirements from the beginning. You must deliberately design what should and what should not be allowed rather than trying to patch things further on in the process.

Design security Building a secure API starts before a developer writes their first line of code. It begins when they design how the API will work, who it will serve, and what information it’ll carry. So, this

70

EC JUNE_2023.indd 70

MEA

should be addressed before development is in full swing. Thinking about it this way allows for the seamless application of security controls and practices as you build the API. One group that is almost always going to be affected by additional API security measures is the users. For instance, some security measures will require them to provide their credentials regularly. This jumping through hoops degrades the user experience. That’s why engaging users in the initial design stage is essential.

Security focal points There are three focal points that a developer has to consider while creating a secure API. They include authentication, authorization, and auditing. Let’s discuss what each one entails.

1. Authentication Authentication involves determining who a user is. Some methods that can be used to authenticate API users include API keys, HTTP basic authentication, OAuth authentication, and Multi-Factor authentication (MFA). l HTTP basic authentication: This involves combining a username and a password, encoding them, and including them as a special HTTP header in every request. Before a server can process a request, it verifies the client’s identity using the sent credentials. l API key authentication: This involves including a key with a long series of numbers and letters in the header of every request. The server grants an API key to each user and identifies the client making that request using their API key.

J U N E 2023

6/16/2023 5:37:16 PM


GUEST COLUMN

l

l

OAuth authentication: This mechanism generates a token for each client once they login into a system. The client then uses that token to identify themselves to the server while making requests. Multi-factor authentication (MFA): This method sends a one-time password (OTP) to clients wishing to access the API via push notification or SMS. The most commonly used OTP is the timebased one-time password (TOTP) which is only valid for a limited time. A robust authentication mechanism should confirm the identity of clients making API requests reliably, safely, and quickly. Additionally, it should rely on more than just usernames and passwords.

2. Authorization

Jiri De Jagere, Senior Director Product Strategy Software AG

API authorization involves determining what an authenticated user can access and making it available to them securely. The process involves checking if the client making a request has permission to perform the requested action. Broken Object-Level Authorization (BOLA) and Broken Function-level Authorization (BFLA)–both included in the OWASP API Security Top 10–can pose serious security risks to an API. Broken Function-Level Authorization (BFLA) occurs when an API fails to properly enforce access controls on specific API functions or operations, allowing a client with restricted privileges to gain unauthorized access to them.

3. Auditing Logging and auditing all client requests is a critical component of API security. It allows you to analyze incoming traffic and identify usage patterns. You can use such data to identify attacks and evaluate their impact. The lack of a proper audit system can make you miss attempted and successful attacks. That’s because hackers can successfully execute an API attack without triggering any security alerts. Therefore, continuous auditing is critical in monitoring and improving an API’s security posture.

Software AG API Security

Building a secure API starts before a developer writes their first line of code

Software AG helps companies build secure and reliable APIs. Its webMethods API Gateway enables companies to expose their APIs endpoints securely. It makes it possible to securely connect their backend to third-party developers, partners, and consumers. webMethods API Gateway supports REST-based, SOAP-based, GraphQL, and OData APIs. It provides complete run-time protection and a web-based user interface to perform API-related tasks. The increase in API attacks has made API security so critical that businesses can’t afford to make it an afterthought. They have to consider security in the API design stage because it minimizes the chance of a successful attack. ë

J U N E 2023

EC JUNE_2023.indd 71

MEA

71

6/16/2023 5:37:16 PM


GUEST COLUMN

Tips for CISOs to enable better business experiences and outcomes in 2023 The role of a CISO now consists of much more than just risk management and compliance. CISOs are now routinely consulted on business issues because digitized business processes are critical to any enterprise’s success, so cybersecurity is therefore a board-level concern.

Tip 1: Consolidate to Drive Responsive Operations

C

ybersecurity is at the heart of most enterprise businesses because of e-commerce and the digital marketplace. For example, e-commerce, whether business-to-business or businessto-consumer transactions all depend on consistently good user experiences to deliver business outcomes. And this requires consistently good networking, security, and computing performance. Many organizations’ leadership teams recognize the business value of cybersecurity that comes from its ability to enable trusted communications and better user experiences. It’s now clear that enabling responsive computing operations is key to ensuring consistently good user experiences. In short, today’s CISO’s role is no longer just about protecting the organization from cyber threats. The CISO is now a key business enabler and leader, tasked with managing risk and delivering business value. Below are suggestions for how CISOs can help generate better business outcomes for their organizations.

72

EC JUNE_2023.indd 72

MEA

There’s widespread agreement that more tools from more vendors is not a viable approach to addressing today’s broad array of cyber risks. Indeed, in most cases, multiple vendor relationships with the associated multiple training requirements, license management issues, consumption models, management consoles, and integration requirements, only add greater complexity and costs. Today, most CISOs are rationalizing their legacy investments from several dozen vendors, down to six to eight platforms around which their teams will build the automation for identification, protection, prevention, detection, response, and recovery. Vendor consolidation drives more consistent and responsive networking, security, and computing performance creating better user experiences.

Tip 2: Digital Experience Monitoring for Better Performance As mentioned above, a key way CISOs can enable the business is by creating exceptional user experiences. A digital experience monitoring (DEM) solution provides IT teams with end-to-end network and application performance monitoring that helps improve digital experiences. Because of the increase in remote work and the migration of applications to the cloud, many organizations are struggling to identify the root cause of application performance issues and traditional monitoring tools simply aren’t up to the task. This is where a DEM tool can add significant value as it unifies data and helps teams to better understand networking, security, and cloud issues that may create latency in

J U N E 2023

6/16/2023 5:37:17 PM


GUEST COLUMN

the application is hosted. Also look for features that unify and consolidate the monitoring of endpoints, network devices, infrastructure, applications, and cloud services with a single management console. This capability enables the organization and the CISO to move from being reactive to being more predictive and proactive. Now, they can identify certain times of the day or times in the year when the network is going to need to scale up to enable customers to easily access applications.

Tip 3: Demonstrate the Value of Security

Jonathan Nguyen-Duy, Vice President, Global Field CISO, Fortinet

A key way CISOs can enable the business is by creating exceptional user experiences

business processes, as well as see compute in terms of the cloud, figuring out CPU usage, and comprehending storage capabilities. Therefore, a good DEM solution can help IT teams spot potential problems at any point—across networking, security, and computing. This provides proactive visibility to mitigate issues that would otherwise lead to performance degradation. Look for a DEM monitoring platform that gives your operations team good endto-end performance visibility across networking, security, and computing. A good DEM solution should provide the ability to observe applications and services, from multiple vantage points, across any network, and even the infrastructure on which

DEM product usage is something that is happening consistently today because there is now an understanding that user experiences determine business outcomes. DEM solutions provide CISOs with the ability to demonstrate tangible results by showing how performance improvements lead to more brand interactions, e-commerce transactions, and new growth. You can really see this value over time after you’ve implemented solutions such as SD-WAN, zerotrust network access (ZTNA), and secure access service edge (SASE). With these types of products, CISOs can demonstrate tangible ROI in the form of fewer failed logins for better help desk productivity, which can be readily monetized. In addition, proactive network management means fewer network disruptions, which means more e-commerce transactions and revenue. Better user experiences can also be measured by better collaboration, or they can measure things over time like what’s the meantime for DevOps, from code conception to launch. These are types of things that CISOs can do today to demonstrate the value of cybersecurity. CISOs should keep cybersecurity as a main area of concern. However, they should also be working to maintain the quality of experience, the quality of service, and the quality of business outcomes. It’s important to be compliant and have strong risk management, but that can be negated if CISOs don’t deliver the outcomes. It’s all about the results. Today, for CISOs it’s not just about the security threshold, managing risk, and being compliant with regulations. At the end of the day, CISOs have to enable the business as well. ë

J U N E 2023

EC JUNE_2023.indd 73

MEA

73

6/16/2023 5:37:18 PM


GUEST COLUMN

Right solutions, strategy and insights Partners are at the center of IBM’s go-to-market strategy. They are essential to helping clients capitalize on IBM’s hybrid cloud and AI technology and they continue to innovate and bring new hybrid cloud and AI offerings to market.

IBM Partner Plus program designed to fuel growth

O

ver the past year, IBM has reimagined how people engage with partners. For example, in October 2022, IBM revamped its approach to skilling that, for the first time, gave all registered partners access to the same training and enablement as IBM sellers at no cost to them. In January, a new partner program was launched, IBM Partner Plus, to help partners deepen their technical expertise, accelerate time to market and win with clients. IBM’s approach has improved how they support and cocreate with partners by providing unprecedented access to IBM resources and incentives to help them unlock greater opportunities in MEA and worldwide. For example, following the introduction of IBM watsonx – a new AI and data platform - at the Think conference in Orlando, launched training and skilling programs for IBM partners to ensure they are knowledgeable and prepared to implement the new technology with their clients when it is available later this year.

74

EC JUNE_2023.indd 74

MEA

IBM is indeed putting partners in control of their earning potential. They can start earning on day 1 of joining as an IBM partner, making it easier than ever to scale their growth. As part of IBM Partner Plus, current partners can access a simple incentives stack - across software and infrastructure - that provides a clear line of sight into how their business decisions impact the incentives they receive, as well as how to maximize those incentives and deal eligibility. The IBM Partner Portal offers additional visibility into how partners are scaling through the program tiers and provides a live dashboard that shows how much they are earning.

Technology enabling new business models and revenue streams Hybrid cloud and AI are two of the most transformative technologies of the time, and they want their partners to be the best in the industry at enabling clients to capitalize on their potential. The combination of IBM technology, such as an open hybrid cloud platform, with Red Hat OpenShift and IBM CloudPaks, along with the specialization and expertise of partners, is a powerful combination to help achieve differentiation in the market. IBM watsonx is a recent example. It’s a new AI and data platform that will enable enterprises to scale and accelerate the impact of the most advanced AI with trusted data. The platform consists of three components to help enterprises unlock business value derived from how adaptable an AI model can be to their unique data and domain knowledge.

J U N E 2023

6/16/2023 5:37:18 PM


GUEST COLUMN

In the new program, the more you learn, the more you earn, and benefits relevant to each partner are unlocked at each tier.

Driving partner collaboration in the hybrid cloud era

Kate Woolley, General Manager IBM Ecosystem

The success is dependent upon harnessing the reach and capability of the partners by making them a true extension of IBM.

They heard a great deal of excitement for IBM watsonx from partners who are, unsurprisingly, reporting unprecedented interest in AI from their clients.

Broader market opportunities IBM Partner Plus offers a single, integrated experience, consistent for all partner types. Whether they are ISVs, MSPs, system integrators, resellers, GSIs, or others – they are putting growth potential into their hands. Each partner can deepen their technical expertise to receive benefits, resources, and incentives that can help them win with clients.

The success is dependent upon harnessing the reach and capability of the partners by making them a true extension of IBM. A thriving ecosystem is about leveraging joint strengths to solve today’s most complex challenges, and their collective clients are already experiencing the benefits of this approach. The reach and scale of the IBM Ecosystem are helping bring client solutions to market 4x faster and driving exponential growth. Through collaboration, they are enabling partners to tap into new opportunities by helping them meet clients wherever they may be on their hybrid Cloud journeys. Last fall, they announced a program in the US that enables IBM ecosystem partners to resell eligible IBM software solutions through the AWS Marketplace. It’s a good example of how helping foster new opportunities for partners, create new avenues of business, and connect several parts of the ecosystem that might not have worked together in the past.

Identifying potential partners The IBM Ecosystem includes tens of thousands of partners with a shared vision for the future of hybrid cloud and AI. Partners are committed to deepening their technical expertise and understanding clients’ needs, allowing them to leverage joint strengths to deliver value. They work with partners in whatever way they choose to engage with IBM, whether they build on IBM’s hybrid cloud and AI technology, service, sell it, or do a combination of these activities. IBM Partner Plus makes it easier than ever for new partners to join and transact, and for existing partners to expand their offerings. There is an addition of 2,000 new registered partners globally since January, and the goal is to continue to scale and grow the ecosystem with new skilled and innovative partners. ë

J U N E 2023

EC JUNE_2023.indd 75

MEA

75

6/16/2023 5:37:18 PM


GUEST COLUMN

The rise of service robots The transition of robots from industrial applications to service roles that bisect and positively impact day-to-day human life.

I

n the book ‘In Other Worlds: SF and the Human Imagination,’ novelist, literary critic, environmental activist, and inventor Margaret Atwood stated, “Human toolmakers always make tools that will help us get what we want, and what we want hasn’t changed for thousands of years because as far as we can tell the human template hasn’t changed either.” This statement seems true for the foreseeable future when we look back through our history, current trends, and fictional depictions of the time ahead. Humanity has always found ways and means to improve things, whether by necessity or desire. The next stage encompasses the broader integration of robots into our personal and business lives. Of course, robots have been serving as critical parts of engineering chains such as industrial production for many years, known as industrial robots. However, some robots, known as service robots, can operate as standalone, isolated machines that perform select tasks continuously, with minimal intervention or interruption. Service robots are relatively new to the market, and, as their name might imply, they are designed to support humans in their daily lives. For the last few years, innovation around service robots has been limited, but that is rapidly changing, thanks to a convergence of technologies that are bringing with them previously unheard-of levels of sophistication and capability to these machines.

service robots are ideal fit since they can be programmed to address any of these segments of the warehousing operational processes. The form factor of these robots can be anything from autonomous vehicles to lifters and carriers and, more recently, even highly capable drones. These relatively low intelligence machines are usually deployed in large numbers (to be helpful) and so are enjoying high demand. In fact, over the next decade, robots fitting these form factors are expected to see a CAGR of 21%.

A Hive of Activity - The World of Logistics

Keeping it Clean!

The logistic and warehousing sector is where volume goods are delivered, stacked, indexed, retrieved, and dispatched constantly. Given the repetitive, potentially dangerous, and strenuous nature of work in this scenario,

Taking advantage of service robots in the cleaning and sanitization sector makes perfect sense as this sector is characterized by repetitive tasks that must be accomplished on a set schedule and

76

EC JUNE_2023.indd 76

MEA

Service robots are ideal fit since they can be programmed to address any of the segments of the warehousing operational processes

J U N E 2023

6/16/2023 5:37:22 PM


GUEST COLUMN

the use of chemicals that might affect human health in the long run. Here, service robots can quickly clean and sanitize, so the environment, be it a home, workplace, place of leisure, or any other area, is fit for habitation and usage by humans. Due to the importance of this massive sector and the raft of benefits service robots offer, the household and professional cleaning robots’ segment is the second largest among service robots. Various effective cleaning and sanitization tools can be built into service robots and can be either contact or non-contact-based, i.e., brushes and detergents or sprays and UV light. The use of service robots in the cleaning and sanitization sector was significantly pushed during the initial pandemic, as thousands of organizations deployed these robots around the world.

Service with a Smile

Mohammed Aldousari, Regional Robotics Lead PROVEN Robotics

EC JUNE_2023.indd 77

Service robots designed for customer service can automate many basic tasks via real-time face-to-face customer interactions. These robots can be mobile or stationary and have humanoid or non-humanoid form factors. Typically, investments in robots here result in the automation of several tasks and routines, high efficiency, workforce savings, and 24/7/365 productivity. Several well-known service robots are already in this segment, including Pepper, Double 3, PuduBot, BellaBot, KettBot, HolaBot, Puductor 2, and Xenex. Apart from providing information and offering a limited range of services in response to customer inputs, these service robots, and others like them are important as they can gather engagement data from the experiences customers have with them. This can include parameters such as the nature of the query, success rate, time spent, and more. Generally speaking, customer service robots enable people to locate products in a retail environment, assist with the price of an item, or even complete a particular task for the person. In addition, they can guide hospitality or retail customers through the environment. Over time, they have become more intuitive and, as a result, have become expected fixtures in retail outlets, shopping malls, and even family entertainment centers. Pepper features face recognition software and a touchscreen display, an excellent example of a service robot designed to perceive emotions and form empathetic connections with users. Some of its successful use cases include performing airport concierge and hospital assistant duties. Considering the benefits service robots already offer, the ongoing introduction of new, innovative, and capable robots, and a regional desire to shine as a hotspot for technology, the near future could see a tidal wave of service robot adoption within the Middle East. The key to this future is working with a qualified regional service provider that will enable you to deploy and reap the benefits of robotic innovation. ë

6/16/2023 5:37:29 PM


EXECUTIVE MOVEMENTS

Endava announces a new member of the Board of Directors Endava, a leading next-generation technology service provider, has announced the appointment of Patrick Butcher to its Board of Directors. Patrick Butcher most recently served as Group Chief Financial Officer of the Headlam Group plc from April 2022 until March 2023. From January 2019 to November 2020, he served as Group Chief Financial Officer at Capita plc. Prior to that, Patrick Butcher served as Chief Financial Officer at various companies, including The Go-Ahead Group plc, Network Rail Limited, the English and Scottish Railway, and Mapeley Limited. Patrick Butcher received his B. Compt. (Hons.) in Accounting and Finance from the University of South Africa and is a qualified Chartered Accountant (South Africa). Endava also announced a number of changes to the executive team, effective July 1, 2023, designed to help position the company to achieve its projected growth out to 2030.

ServiceNow announces new leadership appointments in EMEA

ServiceNow, the leading digital workflow company that makes the world work better for everyone, announced expanded leadership roles and promotions in Europe, Middle East and Africa (EMEA). This comes as part of the company’s continued commitment to investment, innovation, and ambitious growth in the region. Current Vice President EMEA South, Cathy Mauzaize is promoted to president, EMEA. In her role, Mauzaize will drive the growth strategy in EMEA to support ServiceNow in becoming the defining enterprise software company. Mauzaize previously held senior leadership roles across companies including Microsoft, SAP, Dell, PwC, and Hewlett Packard. EMEA President Ulrik Nehammer is promoted to chairman, international. In this strategic advisory role, Nehammer will bring his expertise to global customer accounts and strategic planning. Fabio Spoletini has joined ServiceNow as vice president, EMEA South, leading business development across the extensive and diverse area of Southern Europe, Middle East and Africa.

78

EC JUNE_2023.indd 78

MEA

Nutanix appoints Raif Abou Diab as Country Manager for UAE, Oman, Pakistan and Yemen Nutanix, a leader in hybrid multicloud computing, announced the appointment of Raif Abou Diab as Country Manager for UAE, Oman, Pakistan and Yemen. In his role, Raif is responsible for ensuring strong business growth and excellence of operations across the region, leveraging Nutanix’s globally renowned expertise to meet the aspirations of government bodies and private sector organizations. With over 2 decades of experience in Information Technology, Raif brings a wealth of expertise and insights to the job and will play a critical role in strengthening Nutanix’s position as a leading provider of cloud computing solutions. Embracing the core values of integrity, innovation, and growth, Raif stands at the forefront of the fastest-moving technology and digital transformation trends including Artificial Intelligence, Edge solutions, Hybrid Multiclouds, IoT, and customer investments shifting to the information age and digital economy.

J U N E 2023

6/16/2023 5:37:30 PM



POWERED BY

2023

ROAD SHOW

JULY-SEPTEMBER 2023

RISE OF THE POWER

50

COUNTRIES

EC JUNE_2023.indd 80

4000

C-LEVEL EXECS

300+ 200+ SESSIONS

EXHIBITORS

6/16/2023 5:37:40 PM


Articles inside

The rise of service robots

5min
pages 76-78

Right solutions, strategy and insights

3min
pages 74-75

Tips for CISOs to enable better business experiences and outcomes in 2023

3min
pages 72-73

How to build an API with security in mind

3min
pages 70-71

Navigating the trade-offs of cyber attribution

3min
pages 68-69

Technology is evolving fast and making the world a more connected place

3min
pages 66-67

6 Government IT trends to watch in 2023

3min
pages 64-65

Trellix launches comprehensive Endpoint Security Suite

1min
page 63

Infopercept launches Invinsense 4.0

1min
page 63

AVEVA announces launch of AVEVA Predictive Analytics software

1min
page 62

AI, and blockchain to streamline processes, reduce costs, and increase transparency

3min
pages 60-62

Supply chain: Automation plays a key role in promoting sustainability

3min
pages 58-59

Supply chain and digital transformation

2min
pages 56-57

Safeguarding data across borders

7min
pages 50-55

Tech trends, reshaping data storage

3min
pages 48-49

Business growth, sustainability insights: a road to success

3min
pages 46-47

SolarWinds adds transformative AI features to IT service management solutions

1min
pages 44-45

SunMoney Solar Group invests in a revolutionary tyre recycling technology

1min
page 44

Fake ChatGPT apps scam users out of thousands of dollars, Sophos reports

1min
page 43

SAS commits $1B to AI-powered industry solutions

1min
page 43

Porter announces first-ever international expansion with its foray into UAE

1min
page 42

IFZA joins forces with ZOHO to help businesses improve efficiency

1min
page 42

BenQ with instant products and solutions

1min
page 41

AVEVA recognized as a leader in the IDC market scape

1min
page 41

Veritas simplifies FY24 channel program to help partners drive growth

1min
page 40

Proofpoint’s 2023 Voice of the CISO report revelations

1min
page 40

New Pure Storage survey underscores importance of IT modernization

1min
page 39

Mindware expands distribution agreement with Trellix

1min
page 39

NetApp delivers simplicity and savings to block storage with new All-Flash SAN Array

1min
page 38

Nozomi Networks delivers industry’s first AI-powered cybersecurity analysis and response engine

1min
page 38

Gartner survey finds CEOs cite AI as the top disruptive technology impacting industries

1min
page 37

Salesforce drives customer transformation in the Middle East with latest AI, Data and CRM tools

1min
page 37

BeyondTrust global survey provides insights on identity issues

1min
page 36

Cloudflare equips organizations with the Zero Trust security

1min
page 36

Kissflow awards Middle East Business Partners with Tesla Model 3

1min
pages 34-35

GITEX Africa, the most influential tech event

1min
pages 32-33

UAE Cyber Security Council

3min
pages 22-23

7th edition of GCC Security Symposium Saudi Arabia

2min
pages 16-17

7th edition of GCC Security Symposium Qatar edition

2min
pages 10-11

CloudHost presents Fusion Cloud - Bringing unity in diversity

2min
page 9

Treasury Transformation: the trendsetting force

2min
pages 8-9

Embracing Limitless Possibilities

8min
pages 3, 5-8
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.