Kaspersky Stay Secure, Stay Ahead Forcepoint Securing AI with AI Setsa New Standard for Data Security Invicti Transforming Application Security
Dear Readers,
Welcome to the very first issue of TechPulse MEA — a new voice for a region on the rise.
Hot on the heels of GISEC, where cybersecurity and innovation took center stage, we are proud to introduce TechPulse MEA, a media platform born for bold, insightful, and regionally rooted tech storytelling. Headquartered in Dubai, we are here to decode digital shifts, spotlight tech leadership, and pulse-check for the ever-evolving MEA technology landscape — one story at a time.
In a world of accelerated change — where AI, data sovereignty, cloud, sustainability, and cyber resilience are no longer buzzwords but boardroom priorities — TechPulse MEA is more than just a magazine. It's your strategic window into what’s shaping the future of business and technology across the Middle East and Africa.
This debut edition sets the tone for what’s to come:
Deep dives into AI, cybersecurity, digital infrastructure, and tech transformation.
Executive interviews with visionaries shaping the region’s digital agenda
Coverage of innovations that are disrupting industries — from smart cities to sovereign cloud, and everything in between
At TechPulse MEA, we are committed to bridging the gap between regional innovation and global relevance. Whether you're an enterprise leader, government official, IT decision-maker, or tech enthusiast — we invite you to join us on this journey.
Let this be the beginning of a deeper, sharper, and more meaningful tech conversation in the region.
The pulse is strong — and it’s only getting louder.
Stay curious. Stay connected. Welcome to TechPulse MEA.
Co-Founder & Managing
TechPulse MEA by Remedify Events
General Inquiries: info@remedifyevents.com
Editorial: editor@techpulsemea.com
Business & Media Relations: dolly@remedifyevents.com pooja@remedifyevents.com anant@remedifyevents.com
Publisher Remedify Events
Sharjah Media City Free Zone United Arab Emirates.
Dolly Lakhani
Editor
Dolly Lakhani Co-Founder & Managing Editor
Nabeel Khan PR & Social Channel Manager
Faisal Farooq Head Developer
CONTENT
OPINION
P-05
Force Point Securing AI with AI Sets a New Standard for Data Security
P-07
MOI The New Age of Leadership: Creating and Becoming Leaders
P-08
DWTC Why Cybersecurity Should Be Your Career of the Future
INTERVIEW
P-09
Infoblox Vision for Cybersecurity and Networking in the META Region
P-15
Pure Storage Powering Digital Transformation in MEA with AI-Ready, Energy-Efficient Storage
P-17
Accops Highlights Stronger Data Protection and Unified Security at GISEC 2025
P-21
Tech First Gulf Cybersecurity Roadmap Smarter, Stronger, and More Secure
P-25
Kissflow Digital Transformation Beyond IT
P-27
Bulwark 25 Years of Cybersecurity Leadership in the Middle East
P-33
WSO2 Brings AI into the Heart of Modern Software Development
P-35
Axis Communications a well-oiled machine: Unpacking intrusion protection for O&G operators in the Middle East
P-11 ARTICLE
TREND
P-24
The Cyber Frontier Where Vigilance Meets Innovation
PRODUCT
P-31
SelfDrive Mobility Expands into
17 09 27
Securing AI with AI Sets a New Standard for Data Security
Samer Diya, Forcepoint META VP
We all know by now that the rise of artificial intelligence in business—particularly GenAI—introduces both challenges and opportunities for enterprises dealing with sensitive data. The double-edged sword here is that with AI-driven threats evolving fast, having AI-powered defenses in place is no longer optional—it’s a must. And in the Middle East, where industries are increasingly adopting these technologies, organizations and government agencies must evolve their security strategies to keep pace—here’s how.
Powering Data Security with AI
Some might be surprised to learn that AI can—and should—be used to boost data security strategies. AI is incredibly effective at identifying threats to make data classification and risk detection more precise than ever—helping businesses act faster to mitigate risks and vulnerabilities that traditional tools may take too long to catch.
This is why AI-driven data security has become a business imperative today. A unified platform approach—such as the Forcepoint Data Security Everywhere architecture—makes security stronger and more manageable by bringing visibility and control under one roof with AI-powered accuracy. The innovations for Data Security Posture Management (DSPM) and Data Detection and Response (DDR) are both powered by AI Mesh technology, which fine-tunes small language models for specific industries and data sets, making data classification faster and more accurate than ever before. And when combined in a fully integrated stack alongside Data Loss Prevention, enterprises can be empowered to effectively secure data at rest, in use and in motion—essential in a fast-paced, data-driven world.
Automation Meets Innovation
In the Middle East, industries such as oil, gas, and healthcare are investing heavily in AI technologies, and for good reason—AI can streamline tasks, drive strategic thinking, and so much more. Enterprises who outright ban AI tools due to data security concerns will likely end up with a whole host of problems, with unstructured use and shadow IT just the tip of the iceberg. Employees have already experienced the strategic support that comes from AI, which is why employing a unified data security platform approach—can help businesses streamline their data security operations, minimize risks, and leverage AI safely and proactively by bringing visibility and control under one roof.
The ongoing reality is that AI has become a business imperative in both operations and data security. Those not adopting AI to defend against attacks—whether intentional or unintentional—will find themselves exposed to risk sooner rather than later. Whereas traditional tools might miss an exfiltration attempt for weeks or even months, AI-driven tools can detect unauthorized changes, alert security teams, and even enable an accurate fix well-before data is compromised.
Strengthening Cybersecurity Culture
Finally, maintaining a strong culture of cybersecurity awareness becomes crucial for enterprises with an innova tion mission. Even with new tools emerging seemingly every day, people are still a first line of defense—and prioritizing ongoing training and awareness programs to keep employees informed about evolving threats is a must. Without the combination of clear guidelines, training, and a data-driven security stack that offers robust defenses, employees may inadvertently expose their organizations to security risks.
By Faisal Khan
And specifically, across the Middle
East, as companies adopt new technologies, the pressure on cybersecurity teams will only continue to intensify. Managing the increased workload while responding to emerging threats is a challenge, with the risk of burnout becoming more pronounced. To address this, organizations must adopt strategic, data-driven defenses to risk manage-
The New Age of Leadership: Creating and Becoming Leaders
Naser Alneyadi Head of Information Security Department - Ministry of Interior UAE
Leadership today looks nothing like it did a decade ago. It’s no longer about hierarchy, titles, or command-and-control management. The new age of leadership is about influence, trust, adaptability—and most importantly, the ability to create more leaders. The best leaders today are not the loudest in the room or the ones with the longest resume. They’re the ones who know how to listen, observe, empower, and build others up. We’re seeing a shift where leadership is no longer about being in charge, but about taking care of those in your charge.
I’ve come to believe that leadership is not a position you hold—it’s a role you step into every day, by choice. It’s in how you treat your team, how you communicate in times of stress, and how you respond when things don’t go as planned.
In this environment, creating leaders is not optional—it’s a responsibility. True leadership is measured by the legacy you leave behind, and that legacy is the people you've mentored, supported, and inspired to lead.
So how do leaders build more leaders?
• They give others space to lead. They don’t micromanage or control every decision. They guide and then step back.
• They share credit and take responsibility. This builds trust and loyalty—two of the strongest currencies in leadership.
• They teach through action. The best lessons aren’t in the meetings— they’re in the moments.
• They recognize potential before it’s fully formed. Sometimes, all someone needs is for someone else to believe in them.
We’re now in an era where leadership is distributed, not centralized. And that’s a good thing. It’s how
organizations grow. It’s how cultures evolve. And it’s how we stay resilient in a constantly shifting world.
The future belongs to those who lead with humility, empathy, and purpose—and who raise others to do the same.
Why Cybersecurity Should Be Your Career of the Future
My Message to the Upcoming Generation!
In a world where everything from your fridge to your friendships is online, cybersecurity isn’t just a career rather it's a responsibility inflicted upon each one of us. For the upcoming generation, this field offers the perfect blend of purpose, challenge, and reward.
As someone with close to 30 years in this field, I often reflect on how I got here starting from a young professional with no clear path, to a leader in a field that continues to evolve by the minute. Today’s generation faces an overwhelming landscape filled with options, uncertainties, and noise. Choosing cybersecurity might seem daunting but let me offer some perspective and guidance.
Why choose cybersecurity? Because every click, tap, and swipe today creates digital footprints, and someone needs to protect them. Cybersecurity professionals defend individuals, businesses, and even nations from threats that are becoming smarter by the second.
With the rise of AI, cybersecurity threats are evolving faster than ever. Attackers now use AI to automate phishing, craft deepfakes, and breach systems with speed and precision. As systems grow smarter, so must we. Staying ahead isn’t optional rather it’s a survival.
But make no mistake: this isn’t a field for the faint-hearted. The stakes are high, and the urgency is real. It demands curiosity, grit, and a thirst to outthink the bad guys. You’ll face challenges like keeping up with evolving threats, understanding complex systems, and working under high-pressure situations. Yet, for those who thrive on learning and love solving real-world puzzles, there’s nothing more thrilling.
So, where do you start? Begin early. Learn the basics of networking, operating systems, and coding. Join cybersecurity communities. Get your hands dirty with Capture The Flag (CTF) challenges. Follow ethical hackers, read up on breaches, and understand how they happened. Take courses on platforms like TryHackMe, Hack The Box, or Coursera
Expect detours. You might feel lost at times, but keep your goal in sight. This field will challenge you, inspire you, and stretch your limits. And like they say, "with great power comes great responsibility."
In cybersecurity, we add accountability to that power.
Finally, remember this: cybersecurity isn’t just a job, it’s a mission. And the digital world needs defenders now more than ever. If you’re ready to protect, problem-solve, and make an impact, this might just be your calling.
Faisal Khan I DWTC Associate Director – Information Security & Compliance
Infoblox Vision for Cybersecurity and Networking in the META Region
MJ (Mohammad Jamal) Tabbara Head of Solutions Architects, Infoblox
How is Infoblox helping organizations stay ahead in the DNS, DDI, and cybersecurity space?
Infoblox is helping organizations stay ahead in the DNS, DDI, and cybersecurity space through several key initiatives and solutions. One of the primary ways Infoblox achieves this is by leveraging its advanced DNS security solution, Infoblox Threat Defense. This is a hybrid cybersecurity solution that leverages DNS as the first line of defense to detect and block cyber threats. It uses highly accurate threat intelligence and machine learning based analytics to detect modern malware, ransomware, phishing, exploit kits, DNS-based data exfiltration, Domain Generation Algorithms, DNS Messenger and more. In addition, the hybrid approach allows organizations to use the cloud to detect more threats, while providing deep visibility and full integration with the on-premises ecosystem.
In the realm of networking, Infoblox's Universal DDI™ is the industry’s most comprehensive, advanced product suite for deploying and managing critical network services and visibility solutions across hybrid, multi-cloud networks.
Additionally, Infoblox's collaborations and partnerships, like the most recent with Google Cloud, lead to best in breed holistic solutions customers deserve and underscore Infoblox's commitment to innovation and its role in enhancing cloud networking and security.
In your view, what are the top three cybersecurity threats organizations in the META region must prioritize in 2025?
Ransomware Attacks: Ransomware remains a significant threat, with attackers increasingly targeting critical infrastructure and demanding higher ransoms. Organizations must
prioritize robust defense solutions, along with employee training to recognize phishing attempts.
Phishing and Social Engineering: Phishing attacks continue to be a prevalent threat, particularly in sectors like financial services and telecommunications. Implementing solutions that can detect and stop malicious communication before damages are done is essential.
State-Sponsored Attacks: The META region, especially the GCC countries, face a high risk of state-sponsored cyber threats. Strengthening defenses against highly sophisticated attacks is mandatory and requires a combination of threat intelligence, advanced monitoring, and collaboration with law enforcement if needed.
What are some of the unique cybersecurity challenges and opportunities you observe in the Middle East and Africa compared to other global markets?
The Middle East and Africa region presents unique cybersecurity challenges and opportunities compared to other global markets. One of the primary challenges is the rapid pace of digital transformation, which sometimes outstrips the implementation of adequate security measures, which can leave critical vulnerabilities unaddressed. Additionally, the region faces a high incidence of state-sponsored attacks and hacktivism, driven by geopolitical tensions.
However, there are significant opportunities as well. The increasing investment in cybersecurity measures, such as Zero Trust architectures and cloud-managed networking, reflects a growing awareness of the need for robust security solutions. The adoption of multi-cloud strategies and the focus on NetOps and SecOps collaboration are also driving innovation and enhancing the region's cybersecurity posture.
What common misconceptions do you think business leaders still have about cybersecurity or DNS security?
One common misconception among business leaders is that cybersecurity is solely the responsibility of the IT department. In reality, cybersecurity is a shared responsibility that requires involvement from all levels of the organization, including executive leadership. Another misconception is that traditional security measures are sufficient to protect against modern threats. With the increasing sophistication of cyberattacks, organizations need to adopt advanced security solutions, such as DNS security and threat intelligence, to stay ahead of attackers.
Speaking of DNS: This part of
cybersecurity is often overlooked. DNS is a critical component of the internet infrastructure, and used correctly, businesses can leverage a tool that is already there to significantly enhance their overall security posture. Because every connection begins with a DNS query, it provides unparalleled visibility into network activity—making it a powerful first line of defense. DNS can block threats before they ever reach the network, acting as a preventative shield against malware, ransomware, and phishing attacks. And with real-time threat intelligence integration, modern DNS solutions can identify and stop malicious activity as it unfolds.
Infoblox unites networking, security and cloud to create a as resilient as it is agile.
Proven | UnIfied | Trusted
By Mairaj Muhammad – Digifort Middl e East
Unifying Physical Security with ISMS: A Smarter Path Forwar d Digifort ISMS Platform
In todayʼs world, physical security is no longer a matter of isolated systems operating in silos. The demands of modern infrastructures, especially in financial institutions, oil & gas, and large commercial enterprises, require integrated, responsive, and intelligent security environments. This is where Digifort ʼs ISMS (Integrated Security Management System) transforms the game
For many organizations, managing physical security involves a patchwork of disconnected systems, CCTV, access control, intrusion alarms, analytics, each managed separately, often with no real-time correlation between them This fragmented approach not only increases operational complexity but introduces risk A lack of unified situational awareness delays response time and undermines decision-making.
At Digifort, weʼve reimagined how organizations secure their assets. ISMS is not just a platform, it ʼs a mindset A way of bringing multiple layers of physical security into a single, intuitive inter face With Digifort ISMS, security operators can monitor video surveillance, access logs, perimeter breaches, fire systems, and alarms, all in one centralized dashboard. The system is designed to not just react, but to inform, analyze, and guide.
Eng. Mairaj Muhammad
Additionally, through our SmartConnect integration layer, Digifort ISMS can seamlessly inter face with a wide range of industrial and automation protocols, including ModBus, BACNet, SNMP, and even third-party alarm systems like Trikdis. This opens up power ful possibilities for crosssystem automation, real-time telemetry, and enhanced situational awareness beyond traditional security domains
At Digifort, we believe that security is only as strong as its integration. The future of physical security lies in intelligent convergence, and that future is already here.
Kaspersky is Mumbai Indians’ Official Cyber Security Partner for second year in a row
Kaspersky, the global cybersecurity and digital company, remains the Official Cyber Security Partner for the premier cricket team Mumbai Indians (MI) for 2025. This is an extension of the association that was formed with the MI team in 2024.
Through this partnership, Kaspersky aims to connect with computer users in India and spread awareness about the pitfalls of web-borne threats and help them protect their systems, data, and privacy from such attacks.
Talking about the partnership, Purshottam Bhatia, Head of Consumer Business for India at Kaspersky says, “We are delighted to extend the partnership with Mumbai Indians and remain the team’s Official Cyber Security Partner for 2025. This will give us a leverage to create awareness about the ever-evolving cyber threat landscape in India. Being with this highly popular, premier Indian cricket team will enable Kaspersky to connect with users through interesting end-user offers, and bundles that can help boost Indian’s defences against online threats. We have an award-winning range of easy-to-use cyber security solutions for users in India. Our security solutions help the users in India keep their devices running smoothly and internet use safe and private.”
The Mumbai Indians spokesperson says, “We're thrilled to extend our partnership with Kaspersky, a global cybersecurity leader. As our Official Cybersecurity Partner for 2025, we look forward to interesting engagements with Kaspersky along with the MI team
across the world. We are excited to work with Kaspersky to educate and engage our fans and customers on the state of cyberthreats and protecting their digital privacy.”
During the period of this key partnership, Kaspersky customers can avail special incentives and offers on security subscription plans and solutions at planned brand events and
campaigns. In addition, Kaspersky’s business partners, customers and users stand to win match tickets, VVIP passes, autographed bats and autographed playing shirts of the Mumbai Indians Team.
To know more about the promotions related to this partnership.
by Remedify Events
Director, Partners, Middle East, Turkey & Africa, Pure Storage
Samer Semaan
Powerful Protection: Strategies for Optimal Data Resiliency
These solutions support customers with their most challenging workloads now, and in future.
How critical is the channel ecosystem to Pure Storage’s growth strategy in emerging markets like Africa and the Gulf?
The channel ecosystem is crucial to Pure Storage’s growth globally. It is especially impactful in emerging and distributor-led markets like parts of Africa, as it drives scalable reach, speeds up customer adoption, ensures brand awareness and brings essential local expertise to deliver our cutting-edge all-flash data storage platform.
By offering Storage-as-a-Service through its Evergreen/One model, integrating automation with solutions like Pure Fusion, and introducing the first AI copilot for storage, Pure Storage aims to simplify infrastructure management, enhance resilience, and support sustainable growth. This approach enables MEA enterprises to accelerate their digital initiatives while reducing complexity and environmental impact.
Accops Highlights Stronger Data Protection and Unified Security at GISEC 2025
As a leader in secure access and digital workspace solutions, what is Accops focusing on this year at the GISEC event?
Vijender Yadav Co-founder, MD & CEO, Accops
It’s great to be engaging with the business community – our customers, partners, and technology peers – here at GISEC again. This year, we're dialling up the intensity on a critical area: taking data protection and compliance to the next level. We've used the phrase “Data Protection & Compliance On Steroids” because the baseline isn't enough anymore, especially in the dynamic MEA region, facing rapid digitalisation and evolving threats like those involving AI.
Our focus at GISEC 2025, therefore, is demonstrating this intensified approach practically. It’s about moving beyond fragmented tools. We’re showcasing how integrating key capabilities – like Zero Trust principles, strong identity verification including biometrics, and secure virtualised access – into one unified platform doesn't just strengthen security, it actually simplifies the entire
Our goal is clear: deliver robust, audit-ready protection and compliance without complexity or hindering productivity. We're here to discuss how businesses can achieve this heightened security – control, seamless access, demonstrable compliance – effectively and
What differentiates Accops in a crowded cybersecurity and access management market, especially in regions like the Middle East and
Differentiation lies in solving customer problems effectively, particularly in a diverse region like MEA. For Accops, it boils down to a couple of core aspects:
Firstly, our commitment to a truly unified approach. Many wrestle with security 'silos' – disparate tools creating gaps and management headaches. We built Accops as a cohesive platform integrating essential controls, from Zero Trust access and MFA (including biometrics) to secure VDI, all working together. This integration simplifies management and strengthens security, a major advantage for resource-constrained teams.
Secondly, our agility and deep understanding of regional nuances. We don't impose a rigid global template. We listen closely to specific MEA needs – compliance, infrastructure, culture – allowing us to tailor genuinely fitting solutions and support. Our customers value that responsiveness.
business continuity without interruption.
Finally, what message would you like to share with your partners, customers, and the cybersecurity community here at GISEC and across the region?
Ultimately, it’s about delivering 'next-level' security and compliance in a way that's manageable, cost-effective, and aligned with regional operational realities. We aim to make powerful security accessible, not complex.
Cybersecurity is no longer just about protection—it’s about business continuity and user experience. How is Accops enabling organizations to strike that balance?
You're absolutely right, that balance is paramount. The old view of security as a barrier is obsolete. We believe effective security must invisibly enable both productivity and continuity. Security that frustrates users or impedes operations ultimately fails.
Our unified platform architecture achieves this balance. By integrating crucial elements like Zero Trust principles (continuous, context-aware verification), strong authentication methods, and secure application access (like VDI), we embed security naturally into user workflows. It's woven in, not bolted on. This inherent integration ensures robust security doesn't compromise user experience or agility. It empowers teams to work securely from anywhere, on any device, knowing protection and compliance are built-in, ensuring
GISEC is always an energising focal point for cybersecurity in this vital region. My message is fundamentally about partnership and raising the bar together.
To our fantastic partners: Your role in bringing effective security to MEA organisations is crucial, and our unified platform is designed to empower you; let's continue collaborating closely for mutual success.
To our valued customers: We are your committed ally in this complex
environment; your needs fuel our innovation as we help you simplify infrastructure and achieve robust, audit-ready controls – please connect with us, your feedback is critical.
And to the wider cybersecurity community: The challenges, from AI threats to intricate compliance, require collective effort; let's share insights, debate approaches, and foster the collaboration needed to enhance cyber resilience across the region.
Ultimately, achieving truly strong, 'next-level' data protection and compliance is essential for the region's growth. It's a significant goal, but by working together, innovating, and focusing on integrated, effective solutions, I'm confident we can collectively reach it. Let's connect and make progress this week.
Ultimately, it’s about delivering 'next-level' security and compliance in a way that's manageable, cost-effective, and aligned with regional operational realities. We aim to make powerful security accessible, not complex.
ith the constantly evolving threat landscape, today’s enterprises are cloud-first.
In fact, as many as 85% of applications used by businesses are expected to be SaaS-based by the end of this year.
W FOR THE CLOUD-FIRST WORLD; THE IMPORTANCE AND PRACTICE CYBER RESILIENCE COMMVAULT® CLOUD
Driving this is the significant increase in data and threats generated by the emergence of Artificial Intelligence. Uptake of AI has been faster than first thought, but has now exploded into the industry, currently growing at an exponential rate, and requiring massive bandwidth to accommodate its processing and storage requirements.
But with this in mind, how can you remain resilient within the cloud-first world?
Cleanrooms
Traditional cleanroom methods are too expensive and complex for most organizations. They often require organizations to maintain duplicate environments for every critical application across every server and every location. Many organizations simply can’t afford to do this.
However, Commvault Cleanroom Recovery provides an affordable,
secure, isolated recovery environment on-demand for testing cyber recovery plans, conducting secure forensic analysis, and uninterrupted business continuity.
As an example, a standard enterprise organization may use up to 350+ plus cloud applications, according to Productiv research, spanning various departments like finance, HR, and business operations. After an attack,
CLEAN ROOMTM RECOVERY
Commvault is transforming what recovery looks like in the modern world by expanding simple, secure, and intelligent functionality that can accelerate recovery processes and advance security. As well as this, Commvault Cleanroom Recovery can recover workloads from any location to a safe, cloud-isolated environment that helps deliver the strongest and most reliable cyber resilience and readiness.
Cloud Rewind
Today, when businesses come under attack, restoring your data and critical infrastructure are only half the battle. The time-costly task is actually restoring the distributed cloud applications, which are used to run and power that data.
organizations can’t always go back to standard business procedures immediately, or at least not until many of those applications are rebuilt in a step-by-step, systematic, time-consuming way.
Organisations should trust vendors that can offer proactive measures into simplifying cloud cyber recoveries.
Minimum Viable Company
Minimum Viable Company is the concept used to describe smallest possible version of an organisation that can still function and serve customers should an incident bring down operations or critical systems. Essentially, understanding as an organisation what systems contribute to your minimum viability status, is the next step in ransomware defence.
TFG Cybersecurity Roadmap
Smarter, Stronger, and More Secure
Ram, you’ve been leading the Cyber Security business unit at Tech First Gulf — what’s your core vision for this unit in the next 2–3 years?
My vision for the Cyber Security unit at Tech First Gulf over the next 2–3 years is to position it as a trusted regional leader in delivering end-to-end, intelligence-led cybersecurity solutions. We’re already moving in that direction by expanding our portfolio — recently adding DLP, DSPM, and next-gen firewalls — to cover a broader spectrum of data protection and threat prevention. Looking ahead, we'll continue to grow into areas like zero trust, cloud-native security, and managed detection and response. We'll also deepen our strategic alliances with global vendors and invest in local talent development. The goal is to evolve from being a solutions provider to a strategic cybersecurity partner, helping clients stay secure, compliant, and resilient as they accelerate their digital transformation
How do you select cybersecurity vendors to represent under TFG’s portfolio? What’s your criteria?
At TFG, we carefully select cybersecurity vendors that bring innovative and effective solutions to real-world challenges. We look for technologies that are validated, scalable, and fill critical gaps in the market. Strategic fit with our existing portfolio is essential—we want solutions that complement and enhance what we already offer. Vendor support, training, and post-sales service are also key factors. We value partners who are committed to a channel-first approach and long-term collaboration. Ultimately, our goal is to deliver trusted, future-ready solutions to our clients
Ram Reddy Business Unit Head, Tech First Gulf
cybersecurity from your perspective?
AI, Zero Trust, and SASE are fundamentally reshaping cybersecurity. AI helps us detect and respond to threats faster and more accurately, which is critical given today’s volume of attacks. Zero Trust moves us away from perimeter-based security to a model where identity and context drive access—essential in remote and hybrid environments. SASE brings security and networking together in the cloud, enabling secure, scalable access anywhere. Together, these technologies allow us to be more proactive, agile, and resilient in protecting our digital assets
What innovations or new solutions can we expect from TFG’s
In the coming quarters, we’re focused on delivering a more holistic cybersecurity offering. This includes AI-driven threat detection, enhanced web and API security, endpoint
data. We're also strengthening our capabilities in threat intelligence, privileged access management, and DDoS protection to ensure resilient, end-to-end security for both enterprises and consumers across the region
My vision for the Cyber Security unit at Tech First Gulf over the next 2–3 years is to position it as a trusted regional leader in delivering end-to-end, intelligence-led cybersecurity solutions.
THE CYBER FRONTIER WHERE VIGILANCE MEETS INNOVATION
Cybersecurity is no longer confined to the server room or the IT department — it now shapes boardroom decisions, national strategies, and even individual freedom. As the digital economy expands, so do the threats that lurk within its shadows. From ransomware gangs to state-sponsored cyber espionage, we are entering an era where cyber resilience is synonymous with business survival.
Just weeks ago, GISEC 2025 reminded us all: this isn’t just a technology conversation — it’s a human one. With billions of connected devices and critical infrastructure moving online, the attack surface is broader than ever. Yet amid these risks lies a powerful opportunity: to build smarter, more secure ecosystems that protect not just data, but trust.
Today’s threat landscape demands a shift in mindset. We must move from reactive defense to proactive resilience. This means embracing technologies like AI-driven threat detection, zero trust architectures, SASE frameworks, and cyber threat intelligence sharing across borders and industries. But technology alone isn't the silver bullet — awareness, education, and a strong security culture are just as vital.
In this issue of TechPulse MEA, we speak with CISOs, cyber policymakers, and innovators who are redefining what cybersecurity means in the MEA region. From sovereign cybersecurity strategies to cloud-native defense mechanisms, we explore how governments and enterprises alike are adapting to stay ahead of the curve.
And perhaps most importantly, we highlight the human side of cybersecurity — because behind every breach is a person, and behind every defense is a collective effort. Whether it’s empowering frontline analysts or educating end users, the human factor will always be at the heart of this battle.
Cybersecurity is no longer an add-on. It’s the foundation of trust in our digital future. Stay vigilant. Stay informed. And let’s shape a safer tomorrow — together.
Digital Transformation Beyond IT
Digital transformation has been a buzzword for over a decade, yet many initiatives still fail to meet expectations. Is this due to technical challenges or something more fundamental in how organisations approach transformation?
It’s tempting to blame the technology, but in reality, all too often, the root cause lies in how organisations structure their transformation efforts. According to McKinsey, the majority (70%) of digital transformation initiatives fall short of their goals. And that’s despite the fact that we now have incredibly powerful tools at our
The real issue is a structural one. There’s a growing IT skills shortage across the Middle East, and IT teams are already swamped with backlogs. Business teams, on the other hand, are full of untapped potential. These are people who live and breathe the processes that need transforming. Give them the right tools—specifically low-code and no-code platforms—and you suddenly magnify your development capacity overnight.
These ‘citizen developers’ can build apps that solve problems immediately relevant to their work. We’ve seen HR teams create onboarding workflows, logistics teams optimise fleet management, and finance departments streamline approvals. The result isn’t just faster transformation, but smarter
How has this message been received in the Middle East? Are organisations on board, or is there still work to do in terms of education?
scalability, or security. When they see that Kissflow can deliver both agility and enterprise-grade performance, the message lands.
The UAE has been a natural fit for us. We set up our office in Dubai Internet City and have already built a strong customer base across banking, logistics, government, and retail. Demand has grown so much that we’re now doubling our team in the UAE.
Saudi Arabia is equally exciting. Vision 2030 is fuelling digital transformation at every level, and low-code is becoming the go-to strategy for scaling innovation without overwhelming IT. We're seeing firsthand how organisations are empowering business teams to take the lead in creating digital solutions.
But doesn’t giving non-technical users access to application development raise concerns around security and governance?
Absolutely—and rightly so. But the beauty of modern low-code/no-code platforms is that they’re designed with these concerns in mind. At Kissflow, we’ve built enterprise-grade security directly into our platform: role-based access, audit trails, encryption, and full compliance with standards like ISO 27001 and SOC 2.
What this does is create a safe sandbox. Business users can innovate within guardrails set by IT, who still define the parameters, approve integrations, and monitor activity. Rather than being bypassed, IT becomes the enabler—the architect of a secure, scalable innovation ecosystem.
This approach provides the perfect balance in a region like the Middle East, where data sovereignty, uptime, and compliance are non-negotiable. You get speed and innovation without
real risk of seeing AI as a magic fix. But AI is only useful if people can actually use it. That’s where low-code and no-code come into play.
AI has traditionally been the domain of data scientists and specialised teams. But with platforms like Kissflow, we’re changing that. We’re embedding AI directly into the tools that business users already understand, enabling them to create powerful applications even more intuitively.
This is the next level of democratisation of IT, and AI is the catalyst of this revolution. For the Middle East, where transformation is urgent and talent is in short supply, this approach puts AI to work immediately.
Once organisations understand the value of low-code, how do you differentiate Kissflow in such a competitive market?
We welcome the competition because it validates the market. But not all platforms are created equal. Some prioritise ease of use but lack depth. Others are so complex that they defeat the purpose of low-code entirely.
Kissflow is perfectly balanced. Our platform is intuitive enough for business users to adopt on day one, but powerful enough to handle serious enterprise use cases. We integrate seamlessly with legacy systems like SAP, Oracle, and Microsoft, which is critical in a region where those systems are still the backbone of many businesses.
Another key differentiator is our track record. We’ve been in this space from the beginning. While others are now entering the low-code race, we’ve spent years refining our platform in collaboration with customers. That longevity matters, especially in a market like the Middle East, where trust and consistency are critical.
Ultimately, we’re not just offering a tool. We’re helping organisations rethink how they build, scale, and evolve. And in a region where digital ambitions are sky-high, that makes all the difference. It’s already been an exciting journey, and as digital differentiation becomes ever more important to businesses, we only expect to go from strength to strength.
The UAE has been a natural fit for us. We set up our office in Dubai Internet City and have already built a strong customer base across banking, logistics, government, and retail. Demand has grown so much that we’re now doubling our team in the UAE.
Bulwark 25 Years of Cybersecurity Leadership in the Middle East
Jose Menacherry Managing Director, Bulwark Technologies
As a strategy maker and MD of the company, how are you positioning your portfolio to address the rapidly evolving cybersecurity challenges faced by enterprises in the Middle East?
As the cybersecurity focused value-added distributor, Bulwark has always been on staying ahead of the curve in cybersecurity. The threat landscape in the Middle East is evolving rapidly, driven by digital transformation, cloud adoption, regulatory compliance, and increasingly sophisticated cyber threats. With the increasing complexity and volume of cyberattacks, enterprises need solutions that are not just reactive, but proactive.
We have carefully curated a diverse set of best-of-breed cybersecurity solutions those harness the power of AI, automation, and analytics covering critical areas like data protection, cloud security, identity & access management, threat intelligence, and secure remote connectivity. Another trend we see is a strong shift towards consolidated security platforms that integrate multiple capabilities - so we’re also aligning with vendors who are unifying solutions across their ecosystems. We are working closely with CISOs and compliance heads to align solutions with evolving regional regulations like NESA, NCA, SAMA, Personal Data Protection, QCF frameworks.
How does GISEC serve as a strategic platform for Bulwark to strengthen vendor alliances and empower channel partners across the region?
GISEC is a pivotal platform for Bulwark, a strategic enabler for deepening alliances and driving regional cybersecurity momentum. GISEC gives us the opportunity to showcase the collective strength of our technology portfolio alongside our global vendor partners. It provides a platform
for face-to-face interactions between vendors, partners and customers to understand their security needs, align future roadmaps and explore regional growth strategies. This opens new avenues for solution deployment, strategic collaboration, and partner onboarding—amplifying Bulwark’s presence and impact across the Middle East.
Distribution is no longer just about product availability—how is Bulwark evolving to become a value-added advisor and enabler in the cybersecurity ecosystem?
Yes, value added distribution today goes far beyond product availability and logistics. At Bulwark, we’ve embraced a transformative role: evolving into a cybersecurity enabler, trusted advisor, and regional catalyst for secure digital transformation with consultative engagement. Our pre-sales team works closely with partners and customers to understand their business risks, compliance needs, and infrastructure maturity.
Being a value-added distributor, our strength lies in not just the products, but in the support ecosystem we build around them. We offer pre-sales expertise, training, certifications, webinars,PoCs, and post-sales support to ensure our partners and customers get maximum value. We are a strategic partner that empowers the region’s cybersecurity journey with insights, innovation, and impact.
Bulwark Technologies recently marked its 25th anniversary—a remarkable achievement in the ever-evolving cybersecurity landscape. How has the journey been so far, and what key leadership insights or lessons would you like to share with industry peers and aspiring professionals?
Celebrating 25 years of Bulwark Technologies has been both a humbling and proud moment for us. The journey has been one of resilience, reinvention, and relentless focus— navigating a cybersecurity industry that has evolved from basic antivirus solutions to today’s AI-driven,
IT security solutions in the Middle East. At that time, Cybersecurity wasn’t yet a buzzword in this region, Cloud was a dream, Artificial Intelligence was science fiction, still we ventured into uncharted waters, believed in its future relevance and dedicated ourselves to becoming a trusted name in Cybersecurity space. During the early stages, we had to build awareness, create demand, and earn trust—step by step.
We always value the People and
mutual growth have always been our guiding principles.
For those aspiring professionals in cybersecurity - this is one of the most exciting and meaningful industries you can be part of. The learning never stops, the impact is real, and the opportunity to grow is immense. Regularly update yourself on what is happening in the industry, keep learning, stay curious, and never lose sight of the bigger picture: securing the digital world.
At Bulwark, we’ve embraced a transformative role: evolving into a cybersecurity enabler, trusted advisor, and regional catalyst for secure digital transformation with consultative engagement. Our pre-sales team works closely with partners and customers to understand their business risks, compliance needs, and infrastructure maturity.
LARGE SCALE From Concept We Deliver
LARGE EVENT
to Curtain Call
Deliver Events That Lead
SelfDrive Mobility Expands into Luxury Chauffeur- Driven Services with the Launch of OTO
The service is designed to meet the evolving needs of tourists and travellers across the UAE, Bahrain, and Qatar
Dubai, UAE, May 2025 - In a strategic expansion set to redefine the future of premium transport, SelfDrive Mobility—the region’s largest mobility tech company and leading car subscription and rental platform— officially announced the launch of , a next-generation chauffeur-driven service. Seamlessly blending advanced technology, sustainable mobility, and luxury vehicles, OTO is now live across the UAE, Qatar and Bahrain, offering an elevated travel experience tailored for modern professionals and discerning
“OTO is a next-generation tech platform elevating premium luxury chauffeur services with seamless digital innovation and smart efficiency. We blend advanced technology with premium customer service to create a smoother, more convenient, and modern mobility experience. With OTO, every journey is effortless, refined, and designed for ultimate comfort with personalized services,” said Soham Shah, CEO and Founder of SelfDrive Mobility.
With on-demand vehicles deployed in as little as one hour, OTO's curated fleet features top-tier models from BMW, Tesla, Lexus, Audi, Mercedes, and more. Every vehicle is operated by a professional chauffeur trained to uphold the highest standards of safety, etiquette, and punctuality. OTO leverages SelfDrive’s existing cross-border travel corridors to ensure regionally consistent service—a key differentiator from traditional local
OTO’s Suite of Services Includes:
Hourly Chauffeur Services tailored rides designed to accom modate multiple scheduled meetings seamlessly.
• Daily Chauffeur Services – Full-day luxury transportation at your service.
• Weekly Chauffeur Services – Ideal for business travelers, C-suite executives, event attendees.
• Monthly Chauffeur Services –Long-term, premium travel for corporates, C-suite executives and VIPs.
• Intercity Transfers (One Way) –ideal for airport transfers and travel between different Emirates.
• Corporate Mobility – Chauffeurdriven vehicles for all business needs.
• Bus & Coach Services – Group transport for staff, events, tours, and teams.
• School Rides – Safe, reliable daily pick-up and drop-off for students.
• Competitively Priced Premium Service – OTO offers a luxury chauffeur-driven experience at competitive rates, backed by SelfDrive’s robust tech ecosystem, ensuring transparent pricing, instant confirmations, real-time tracking, and secure payments.
Customers can connect with the OTO concierge team directly via call or WhatsApp for personalized service and instant bookings. Whether for airport transfers, board meetings, or family travel, OTO guarantees a refined journey, every time.
From Experiment to Execution: WSO2 Brings AI into the Heart of Modern Software Development
AI is now a first-class concept across the entire WSO2 software stack, enabling enterprises to easily create, integrate, manage and secure intelligent digital products and services
Emerging artificial intelligence (AI) technologies are disrupting business models and opening opportunities to drive cost-efficiencies and new revenue streams. However, few AI proof-of-concept projects make it to production because current software platforms lack the abstractions and building blocks to include AI components in production-grade applications in a way that is easy and scalable. Today, WSO2 is closing this gap with the next generation of its industry-leading, open-source platform, which has been reinvented for the AI era.
AI is now a first-class concept across the entire spectrum of products that comprise the WSO2 software stack—enabling enterprises to easily create (code), integrate, manage and secure intelligent digital products and services. The newest WSO2 product offerings are generally available, and their AI-native capabilities are being demonstrated at WSO2Con 2025, which runs March 18-20, 2025 in Barcelona, Spain.
Taking a Comprehensive Long-View to AI
WSO2’s AI-native platform is the result of the long-term strategy that WSO2 product and research teams have built around generative AI (GenAI) and the agentic economy. It builds on WSO2’s breadth of functionality and experience to cover an AI application’s entire lifecycle, from coding through delivery, monitoring and observability.
Dr. Sanjiva Weerawarana Founder and CEO, WSO2
The platform brings together low-code and pro-code programming for building AI agents, applications that leverage Gen AI and AI agent capabilities, and a novel programming approach that combines natural language and code.
Additionally, the open WSO2 platform integrates out-of-the-box with AI ecosystem libraries, agent frameworks, knowledge bases, and GenAI APIs. Together, the capabilities allow enterprises to build resilient, scalable, secured and observable AI APIs, applications and agents while leveraging WSO2’s GenAI productivity support to reduce both costs and time to market.
Enterprises can also onboard AI agents built on their framework of choice and apply WSO2’s quality of service capabilities—including security, governance or monitoring. Moreover, the open, highly extensible WSO2 platform is designed to evolve with AI technology developments, providing enterprises with a future-proof platform for their intelligent digital experiences.
“AI is fundamentally changing the applications that enterprises are building, as well as how they are building them,” said Dr. Sanjiva Weerawarana, WSO2 founder and CEO. “WSO2 is on a transformational journey across the company to help our customers use AI to boost their own productivity and deliver great digital experiences. As part of this journey, we are building on our commitment to open-source software, a key enabler of AI adoption. We’re also investing in our team, and we are excited to have AI expert Rania Khalaf join WSO2 as Chief AI Officer to spearhead our company-wide strategy and roadmap for delivering on the promise of the AI era.”
Supporting AI Across the Software Development Lifecycle
“The modern application is AI native. The current software development lifecycle (SDLC) and software application stack are not,” said Rania Khalaf WSO2 chief AI officer. “What is happening is a fundamental co-evolution of both—at every level and stage—as generative AI boosts developer productivity and pushes multi-modal understanding and synthesis deep into the development stack. WSO2 is positioned at the center of this shift with an open-source platform that, for the first time, brings
AI-native capabilities to functions across the SDLC.”
Today, product offerings across the WSO2 platform bring together the AI-native capabilities enterprises need to easily code, integrate, manage and secure intelligent digital products and services.
Code: WSO2 supports a new AI-native “natural programming” approach via its Ballerina specialized integration language. WSO2 also provides the ability to create AI agents and AI APIs, as well as build retrieval-augmented generation (RAG) and other AI-driven applications using capabilities from the Choreo internal developer platform as a service (IDPaaS), WSO2 Integration Manager and Devant integration platform as a service (iPaaS), and WSO2 API Manager and Bijira API management software as a service (SaaS). Additionally, these products feature a range of AI-powered tools to support developer productivity.
Integrate: to use AI to create intelligent integrations, supported by extensive connectivity to large language models (LLMs), vector databases, AI agents, APIs and systems using WSO2 Integration Manager and the Devant IpaaS. Meanwhile the AI Gateway employed by WSO2 API Manager and Bijira API management SaaS provides visibility and control over third-party APIs for AI services and LLMs along
with multi-model backend support for seamless, dynamic routing of AI API requests between OpenAI, Microsoft Azure OpenAI, and Mistral models.
Manage: WSO2 empowers
AI is fundamentally changing the applications that enterprises are building, as well as how they are building them,” said Dr. Sanjiva Weerawarana, WSO2 founder and CEO. “WSO2 is on a transformational journey across the company to help our customers use AI to boost their own productivity and deliver great digital experiences.
A well-oiled machine: Unpacking intrusion protection for O&G operators in the Middle East
Andrea Monteleone Segment Development Manager, Axis Communications
For the Middle East, protecting oil and gas infrastructure and operations is an economic necessity. As world demand for energy continues to rise, the market in the region is expected to be worth over $1.4 trillion by 2030. Countries like the UAE and Oman are expanding their gas processing and export capabilities amid growing investment in cross-border pipeline projects, while GDP growth in the Middle East and North Africa (MENA) is expected to accelerate in 2025 with the help of higher oil production in the
Operators in the region have to deal with many security considerations and one of the biggest is physical security, specifically perimeter protection and intruder-related events. For many, the best approach is a multi-layered one, connecting different surveillance solutions to enable beyond solely detecting intruders. In other words, operators need to look beyond the initial real-time alerts associated with detection and implement a broader intruder-related damage or theft.
A camera is no longer just a ‘recording device’. Today, sophisticated network cameras have powerful processing capabilities that let them act as sensors, gathering metadata and acting as servers on the edge to communicate, control, and trigger other devices on the network via open communications protocols. This also enables oil and gas operators to scale their security systems and integrate open surveillance solutions into their
Thinking of cameras as edge devices acting as powerful, real-time sensors is the first step towards building better, more optimised surveillance systems, and is the starting point for a multi-layered approach for effective intrusion protection that helps secure
people, assets, and facilities in what are highly critical industries.
Work from the outside in Intrusion protection starts at the outer perimeter where a potential intruder is detected and verified along the fence line or ‘buffer zone’. Radar devices pointing outwards from the fence line spot a potential threat and send operators an alert long before the intruder reaches the actual perimeter. Reinforcing this, thermal cameras with intelligent analytics can identify and classify whether a moving object is a potential intruder and not some other object, like an animal. Thermal cameras also offer detection accuracy and reliability irrespective of weather conditions.
Once an intruder is detected, operations can either raise the alarm immediately or configure their system to raise it should the intruder enter a previously classified zone. The latter option reduces the risk of false alarms while enabling the system to detect the intruder early and only activate further escalation procedures if necessary. The next step is verification where visual cameras with tracking analytics respond to the alarm being triggered and verify it by showing a visual image of the intruder, monitoring them wherever they go. Operators can then deploy deterrents such as audio speakers or LED reflectors that can light up an area and warn the intruder to cease moving, direct security personnel to their location, and discourage potential theft or property damage.
Not every security system is the same, as each site has its own physical and operational circumstances, but the connected implementation of these security solutions enables operators to enforce a standard procedure and adhere to protocols for maximum impact and efficiency.
Protect the core of your operations
The third layer of intrusion protection is access control, as in controlling access to site buildings and other facilities. Devices such as door stations and intercoms play a key role in this layer, ensuring that only authorised personnel and visitors can
access entrances, exits, and specific buildings or rooms. Vehicle access control also forms a part of this. Using cameras equipped with licence plate recognition and analytics, operators can admit or stop vehicles before they enter or leave the site, while also communicating with the users and security personnel via intercom systems. This is also essential for sites that are automated and not staffed by many people.
Looking more broadly, intrusion protection systems should not have a single point of failure. Building an edge-based, decentralised system that doesn’t depend on one device is key. Edge-based systems can also help mitigate risks, particularly when comprised of physical devices that offer a variety of built-in cybersecurity features to counter cyberattacks and prevent unauthorised system access. Operators can also create clusters of security devices that run independently of a central server. That way, even if one device fails, the rest are not affected.
Maximum protection, minimal cost
When building an edge-based, decentralised intrusion protection
system, oil and gas enterprises have an opportunity to substantially reduce security costs. By operating at the edge, enterprises can reduce their bandwidth requirements and the number of video streams that need to be sent to central servers, eliminating the need for extra servers, racks, and passive network equipment. Deploying thermal cameras also eliminates the need for more visual cameras while still covering the same amount of area, reducing installation and cabling costs and power consumption.
All this cost optimization speaks to the depth of the approach that the industry needs to take to security. By layering security solutions as part of a holistic, connected protection system, enterprises can safeguard their sites and facilities in a comprehensive, reliable, and cost-effective manner, while leaving the door open to future growth and expansion.
Axis intelligent surveillance solutions are the ideal way to protect upstream, midstream, and downstream oil and gas activities. For more information about how you can remotely monitor manned and unmanned sites and protect personnel and assets.
Operators in the region have to deal with many security considerations and one of the biggest is physical security, specifically perimeter protection and intruder-related events. For many, the best approach is a multi-layered one, connecting different surveillance solutions to enable beyond solely detecting intruders.