8 minute read

CONTENTS

Next Article
A CONNECTED WORLD

A CONNECTED WORLD

INTEL NEXT-GEN MOBILE PC PROCESSORS

Intel has announced its next-generation mobile PC processors and the evolution of its broad ecosystem partnerships that are propelling the mobile PC industry forward.

Advertisement

New 11th Gen Intel Core processors with Intel Iris X graphics (code-named “Tiger Lake”) are the world’s best processors for thin-and-light laptops with unmatched capabilities for real-world productivity, collaboration, creation, gaming and entertainment across Windows and Pure Storage has announced the second generation FlashArray//C, reducing the cost of running capacityoriented workloads so significantly it eliminates the need for legacy hybrid disk arrays, said the firm. The only all-QLC storage array, FlashArray//C is built on Pure’s DirectFlash technology and Purity software platform to deliver enterprise-grade performance and features costeffectively, marking another step towards realising the firm’s vision of bringing flash mainstream for any use case through its entire portfolio of products and solutions.

With the second generation of FlashArray//C, Pure is extending its QLC advantage by delivering the first and only enterprise-grade all-QLC flash array – transforming raw QLC into a high-endurance medium while delivering new cost economics that are 30% less ChromeOS-based laptops.

Leveraging Intel’s new SuperFin process technology, 11th Gen Intel Core processors optimise power efficiency with leading performance and responsiveness while running at significantly higher frequencies versus prior generations. More than 150 designs based on 11th Gen Intel Core processors are expected from partners including Acer, Asus, Dell, Dynabook, HP, Lenovo, LG, MSI, Razer, Samsung and others.

Intel also introduced the Intel Evo platform brand for laptop designs verified to the second edition specification and KEIs of the Project Athena innovation program. Based on 11th Gen Intel Core processors with Intel Iris X graphics, devices featuring the Intel Evo badge are verified to be the best laptops for getting things done. More than 20 verified designs

Pure Storage FlashArray//C

are expected this year. than similarly sized hybrid storage arrays on the market today. FlashArray//C is available with 24.7TB and, the industry’s largest, 49TB QLC DirectFlash modules providing the lowest possible total cost of ownership. This makes all-flash accessible for use cases previously relegated to spinning disk or inefficient hybrid solutions, like backup and data protection, test/dev environments, and workload consolidation.

Kingston 128GB USB flash drive

Kingston Digital Europe Co, the Flash memory affiliate of Kingston Technology Company, has announced the availability of the 128GB DataTraveler® 2000 encrypted USB flash drive.

DataTraveler 2000 features an alphanumeric keypad that allows users to lock the drive with a word or number combination for an easy-to-use PIN providing an extra layer of protection. For additional security, an auto-lock feature is activated when the drive is removed from the host device if not properly shut down before ejection.

DataTraveler 2000 is FIPS 140-2 Level 3 certified and offers military-grade 256-bit AES hardware-based encryption. Designed with global security IT professionals, smallto-medium businesses and corporate end users in mind, DT2000 is perfect for those who require electronic data protection. Encryption is done on the drive with no trace of the PIN left on the system. The drive is OS independent, making it easily deployable in work environments where multiple devices and operating systems are in use.

Samsung Galaxy Z Fold2

R&M has launched its new PRIME Ribbon distribution module in the Middle East. The slide-in module for the fibre optic distributor rack PRIME connects ribbon fibre cables with the flexible and proven PRIME program. With this type of cable, the number of optical fibres in a rack can be increased by 30% to 40%.

In comparison to single fibre cables, ribbon fibre cables offer several advantages. They enable a higher number of fibres with the same cable diameter as well as the splicing of 8 or 12 fibres in one working step. With this technology, three to four times more fibres can be laid in a conduit or rack than usual. Samsung Electronics has unveiled the next generation of its category-defining foldable device, the Samsung Galaxy Z Fold2. Packed with enhanced refinements and meaningful innovations, the Galaxy Z Fold2 delivers new foldable experiences for those who enjoy being on the cutting edge of technology. With a larger Cover Screen and massive Main Screen, the Galaxy Z Fold2 features a solid design with intuitive new features for a unique mobile experience that offers the versatility that everyday life demands.

A 6.2-inch Infinity-O Cover Screen provides maximum usability so users can check email, look up directions, or even watch favourite content without needing to unfold the device every time. When unfolded, the massive 7.6- inch Main Screen, with minimised bezels and notch-less Front Camera, immerses users with a 120Hz adaptable refresh rate for smooth scrolling and gameplay. To complete the experience, the Galaxy Z Fold2 comes with the best dynamic sound available on a Galaxy device to date, with enhanced stereo effect and clearer sound

R&M PIME Ribbon

provided by high-dynamic dual speakers.

The PRIME ribbon distribution modules from R&M occupy a 3/4 height unit in a 19″ rack. Their capacity is 96 fibres. In addition to the splice patch variant with LC duplex or SC couplings, R&M offers a pure splice variant for 288 splices.

The PRIME ribbon distribution modules are suitable for fibre to the home projects in combination with the PRIME racks. They are used for network expansion in central offices, POPs and street cabinets. Data centres use them to consolidate the fibre optic cabling of meetme rooms and zone distributors. Campus networks and backbones in large buildings are also among the areas of application.

REDESIGNING CYBERSECURITY TO EMBRACE DIGITAL TRANSFORMATION SUNIL PAUL, MANAGING DIRECTOR OF FINESSE, HIGHLIGHTS THE IMPORTANCE OF RESTRUCTURING CYBERSECURITY STRATEGIES TO REALIZE DIGITAL TRANSFORMATION PROMISE SECURELY.

Organisations across verticals are fast-tracking their digital agendas by automating their operations to increase efficiencies and offer enhanced customer experiences.

With the rise of digital enterprises, cybersecurity has gained prominence and made its way into boardroom discussions. The fact that these boardroom discussions are now happening on video collaboration platforms is proof that cybersecurity strategies need to be redesigned to embrace digital transformation truly.

Securing multi-cloud environments

Digitalisation is a vital business objective. As part of this plan, organisations today are leveraging multi-cloud strategies to improve IT operations and provide better services to their customers. This means ensuring strong security across clouds, networks, applications, and data is critical for them to achieve the advantages of multi-cloud environments.

In line with this, it is imperative that businesses have to put clear protocols for cloud governance and access controls right from the beginning of developing a multi-cloud strategy. It is also essential to make sure every workload in these environments is adequately protected. Business leaders should not be asleep at the wheel when it comes to securing data and workloads in the cloud.

However, securing multi-cloud environments is not without challenges. Native security tools offered by cloud providers, while advantageous, are not sufficient to work across clouds. An ideal approach is deploying security tools such as a unified platform security orchestration, automation, and response (SOAR) technology to gain a centralised view and control of the threats and vulnerabilities across a multi-cloud environment. This will provide security teams with the capability to analyze threat data better and prioritize alerts.

Business leaders should understand that cybersecurity needs to be a constant thought, especially as cyber adversaries exploit any circumstance and get more creative in their attacks by the day.

Enforcing security by design approaches

That being said, it is now more important than ever to ensure cybersecurity is not an afterthought. Believe it or not, most organisations continue to procrastinate on security. This is further seen in a recent report by EY Global Information Security Survey. It revealed that only 36% of organisations admitted that cybersecurity was involved right from a new business initiative’s planning stage. Businesses cannot afford to invest in technology and think of adding the security layer at a later stage. They need to invest in technologies that are embedded with security solutions.

Having security by design approach considers cyber risks and security right from any technology implementation impetus and should foster trust at every stage. Moreover, this kind of approach focuses not only on technologies but also on the way an organisation functions. It is important to ensure that everyone within the organisation has a cyber risk-aware mindset. While making this cultural shift is challenging, it is vital for the success of any security strategy; after all, cybersecurity is everyone’s responsibility.

Bridging the gap between IT teams and C-level

There cannot be any room for disconnects or misalignments between IT security teams and the C-suite when rethinking

security for digital transformation, laying down policies for securing assets, and assessing other risk areas. Bridging this gap is imperative because both parties are unequivocally affected in the event of a cybersecurity breach. Strong communication between the IT team and the C-suite also ensures that investments in security solutions are prioritized. While the C-level executives may not be armed with technical knowledge, they must be aware of the consequences of poor security measures and how it can directly or indirectly impact business profitability.

Fortifying the interconnected future

Increased digitalisation across verticals is leading to a proliferation of connected devices and technologies. This, in turn, increases the attack surface area offering new playgrounds for cybercriminals. Safeguarding interconnected devices, technology, and networks is the future. Cybersecurity technologies and strategies have to be revamped to take into consideration the millions of devices that are now highly susceptible to cyber breaches. If a perpetrator breaks into a single IoT endpoint, they can effortlessly access corporate networks, hack into sensitive data and create havoc.

The threat and severity of cyber-attacks are growing. The COVID-19 pandemic has been a wake-up call for most organisations in terms of evaluating where they are in digital journeys and how prepared they are to tackle cyber threats. Cybersecurity strategies also need to be ever-evolving to stay in tune with ongoing market developments. We have to reassess our present cybersecurity strategies to leverage the complete potential of being digitally transformed.

KEEP ADVERSARIES OFF YOUR ENDPOINTS

Phone: +971-4-8863850 E-mail: info@asbisme.ae www.asbisme.ae

This article is from: