EC-MEA June 2023

Page 50

COVER STORY

Safeguarding data across borders With the increasing reliance on technology for storing and circulating important and personal information, the threat of data breaches and theft has become a major issue. Organizations are embracing privacy by design principles and enhancing transparency in their data handling practices.

How do you balance the need for data security with the need for accessibility and ease of use?

A

s data has taken precedence and gained utmost importance for security, what are some of the challenges that organizations facing today and how do you address them? Organizations in the Middle East are facing significant challenges in effectively managing and safeguarding vast amounts of data, complying with data privacy regulations, addressing increasing cyber threats, and ensuring data protection across various platforms. To tackle these challenges, we recommend organizations to develop a data privacy and data security program which is a phased approach towards achieving their goals. This involves developing their strategy, developing and implementing best practices for data discovery, data classification, implementation of technology controls and monitor them 24x7. One of the fundamentals is to plan the journey in a logical manner rather than investing in technologies without meeting the pre-requisites for a successful implementation.

50

EC JUNE_2023.indd 50

MEA

To achieve a harmonious balance, it is crucial to initially align the security program with the organizational business functions and clearly define expectations while safeguarding the customer experience. Subsequently, creating and executing a customized security and privacy-centric program that is intuitively designed and seamlessly integrated for end users is necessary.

With data so diversified today in storage and movement, what are some of the trends you see in the market that organizations are implementing to increase data security? Organizations are exploring various avenues to enhance data security. Firstly, the adoption of cloud technology has resulted in the implementation and expansion of cloudbased security solutions. These solutions seamlessly utilize advanced encryption and authentication mechanisms, offering precise controls for privileged users. This significantly contributes to securing data stored and processed in the cloud. Secondly, there is a growing emphasis on data-centric security approaches within data centers, such as masking, tokenization, and classification. These measures significantly

J U N E 2023

6/16/2023 5:37:04 PM


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

The rise of service robots

5min
pages 76-78

Right solutions, strategy and insights

3min
pages 74-75

Tips for CISOs to enable better business experiences and outcomes in 2023

3min
pages 72-73

How to build an API with security in mind

3min
pages 70-71

Navigating the trade-offs of cyber attribution

3min
pages 68-69

Technology is evolving fast and making the world a more connected place

3min
pages 66-67

6 Government IT trends to watch in 2023

3min
pages 64-65

Trellix launches comprehensive Endpoint Security Suite

0
page 63

Infopercept launches Invinsense 4.0

0
page 63

AVEVA announces launch of AVEVA Predictive Analytics software

1min
page 62

AI, and blockchain to streamline processes, reduce costs, and increase transparency

3min
pages 60-62

Supply chain: Automation plays a key role in promoting sustainability

3min
pages 58-59

Supply chain and digital transformation

2min
pages 56-57

Safeguarding data across borders

7min
pages 50-55

Tech trends, reshaping data storage

3min
pages 48-49

Business growth, sustainability insights: a road to success

3min
pages 46-47

SolarWinds adds transformative AI features to IT service management solutions

1min
pages 44-45

SunMoney Solar Group invests in a revolutionary tyre recycling technology

1min
page 44

Fake ChatGPT apps scam users out of thousands of dollars, Sophos reports

1min
page 43

SAS commits $1B to AI-powered industry solutions

1min
page 43

Porter announces first-ever international expansion with its foray into UAE

1min
page 42

IFZA joins forces with ZOHO to help businesses improve efficiency

1min
page 42

BenQ with instant products and solutions

1min
page 41

AVEVA recognized as a leader in the IDC market scape

0
page 41

Veritas simplifies FY24 channel program to help partners drive growth

1min
page 40

Proofpoint’s 2023 Voice of the CISO report revelations

1min
page 40

New Pure Storage survey underscores importance of IT modernization

1min
page 39

Mindware expands distribution agreement with Trellix

1min
page 39

NetApp delivers simplicity and savings to block storage with new All-Flash SAN Array

1min
page 38

Nozomi Networks delivers industry’s first AI-powered cybersecurity analysis and response engine

1min
page 38

Gartner survey finds CEOs cite AI as the top disruptive technology impacting industries

1min
page 37

Salesforce drives customer transformation in the Middle East with latest AI, Data and CRM tools

1min
page 37

BeyondTrust global survey provides insights on identity issues

1min
page 36

Cloudflare equips organizations with the Zero Trust security

1min
page 36

Kissflow awards Middle East Business Partners with Tesla Model 3

1min
pages 34-35

GITEX Africa, the most influential tech event

1min
pages 32-33

UAE Cyber Security Council

3min
pages 22-23

7th edition of GCC Security Symposium Saudi Arabia

2min
pages 16-17

7th edition of GCC Security Symposium Qatar edition

2min
pages 10-11

CloudHost presents Fusion Cloud - Bringing unity in diversity

2min
page 9

Treasury Transformation: the trendsetting force

2min
pages 8-9

Embracing Limitless Possibilities

8min
pages 3, 5-8
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.