SME Issue 141: December 2024

Page 1


PARKING, PERFECTED

Limitless introduces a new solution for a modern challenge

SECURING THE FUTURE

Trends and predictions for the security industry

EQUALITY IN SECURITY

The key to a stronger security sector

DATA UNDER SIEGE

Safeguarding the Digital Realm

CONTACT US

EDITORIAL

Publisher

Barry Bebbington

+44 1708 229354 barry@pubint.co.uk

Editor Cora Lydon +44 7834 244613 cora.lydon@securitymiddleeastonline.com

ADVERTISING

Worldwide

Mike Dingle

+44 1752 267330 mike@securitymiddleeastonline.com

Ryan Bickerton +44 1752 265802 ryan@securitymiddleeastonline.com

Gareth Driscoll +44 1752 260603 gareth@securitymiddleeastonline.com

Rahul Vara +44 1752 604352 rahul@securitymiddleeastonline.com

Will Russell +44 01400 262217 will@firemiddleast.co.uk

Marketing Manager

Paul Riglar +44 7496 377603 paul@securitymiddleeastonline.com

Digital Editor

Britt Jones britt@securitymiddleeastonline.com

PUBLISHED BY

Publications International Ltd +44 1708 229354 166 Front Lane, Upminster, Essex, RM14 1LN, UK

UP FRONT

The relentless pace of change in the security industry is evident in daily news headlines, with AI and other technologies rapidly transforming the sector. In this issue, we focus forward on the sector with our Industry Insight, in association with Johnson Controls. From page 21 you can find out more about the company’s plans for the region and their predictions for the future of security.

On page 57, Betania Allo, a cyber law and policy expert, calls on the sector to embrace diversity. Embracing diversity within the security sector is not only a matter of social justice but also a strategic imperative. A diverse workforce fosters innovation, enhances communication and improves our ability to understand and serve the diverse communities we protect.

how it can deliver intelligent insights to transform footage.

Finally, we invite you to join us at Intersec 2025, the region’s leading trade fair for security, safety, and fire protection – Security Middle East magazine will in attendance at stand S3-B42. Our show guide, starting on page 95, highlights key conference sessions, exhibitor spotlights and must-see attractions.

written consent of the publishers.

©Publications International Ltd. 2024 For

securitymiddleeastmagazine.com

We also explore how sensitive data can be protected from unauthorised access and breaches, as Rohith Rajan, Chief Technology Officer at Intello Cyber Technologies discusses the guardians of the digital age (page 88).

On the topic of video surveillance, this issue takes a look at the power of metadata. On page 46 Assim Khedr, Engineering & Training Manager – Middle East at Axis Communications, explores

As we embark on a new year, the security industry continues to evolve at a rapid pace. The challenges we face are complex, but so too are the solutions we can implement. We hope this issue provides valuable insights and inspires you to embrace the future of security. Myself and the team at Security Middle East magazine wish you a healthy, happy and prosperous 2025.

Cora Lydon Editor

cora.lydon@securitymiddleeastonline.com

CONTENTS

MONITOR

03 Up front

Foreword from the Editor

06 News Monitor

ISSUE 141 DECEMBER 2024

The latest regional and international security news

08 Market Monitor

A roundup of the latest security products and solutions

11 Technology: The foundation of modern security leadership

Read our new column from Rapiscan’s Hanan L. Ross, Regional Business Development – Middle East & Africa

14 Cover story: Limitless

Mohamed Hediya, MD of Limitless, explores the future of car parking with the Limitless Ticketless Parking System

21 Industry Insight: The future of security in association with Johnson Controls

Johnson Controls shares its plans for the Middle East region, the newest addition to its line-up and reveals it has gained SIRA accreditation

FEATURES

18 Security Middle East Conference 2025

We introduce the Security Middle East Conference Advisory Board and the experience they bring to this prestige event

29 Protecting paradise

Tawfeeq Alsadoon, Group Head of Security, Red Sea Global, visits tourism security from a Vision 2030 perspective

34 Securing the city

Osama Al-Zoubi, Regional Vice President of Middle East, Phosphorus Cybersecurity, looks at how real-time data and unified xIoT security can power smart cities

36 Five pillars of CIAM

Malithi Edirisinghe, Director, Architect –Identity and Access Management, WSO2, writes about customer identity and access management (CIAM)

39 Optimising CCTV system costs

Read some practical design strategies to reduce system costs while maintaining efficiency of CCTV systems from Ahmed Hassan, Technical Manager in BT Applied Technology – Saudi Arabia

42 The future of retail surveillance

Dennis Choi, General Manager at IDIS Middle East & Africa, is watching over business and shares the transformative role of video surveillance technology

46 Intelligent insights

Assim Khedr, Engineering & Training Manager – Middle East at Axis Communications, explores how metadata can transform video surveillance

52 The future is secure

We tasked a number of experts with predicting what they think the future may hold for the security sector

57 Beyond the stereotype

Betania Allo, a cyber law and policy expert, explores breaking down barriers in the Middle East to embrace a diverse security workforce

62 Breaking the trust habit

Apu Pavithran, CEO and Founder, Hexnode, explores why the Middle East can’t afford to ignore zero trust

66 Bricks, bytes and beyond

Unifying physical and digital security can take banking security from siloed to seamless, asserts Simon Whitehouse, Divisional Director of Security Consulting at AESG

Top physical security trends

Firas Jadalla from Genetec casts his mind forward to what physical security trends we can anticipate for 2025

CYBERSECURITY

32 Emerging cyber risks for the Middle East

The ISF’s Regional Director, EMEA, Daniel Norman considers what threats should be on your radar for the new year

70 Hackers’ playbook

Eric O’Neill, cybersecurity authority and former FBI counterterrorism and counterintelligence operative, unveils the common tactics used to hack us

72 Securing the perimeter

Global information technology expert, Ian Keller takes a closer look at identity management for physical and logical access

78 A roadmap to modern application security

Chrystal Taylor, SolarWinds Head Geek, looks at what organisations can do to embrace modern application development, while at the same time bolstering security

80 The weakest link

With vulnerable supply chains keeping critical infrastructure security leaders awake in the Middle East, Sertan Selcuk, VP for METAP & CIS, OPSWAT, tackles shoring up the defences

84 Detecting the undetectable

Irina Zinovkina, Head of Information

Security Analytics Research at Positive Technologies, explains how to detect security incidents in infrastructures of any scale

88 Guardians of the digital age

Rohith Rajan, Chief Technology Officer at Intello Cyber Technologies, looks at how to protect sensitive data from unauthorised access and breaches

INDUSTRY MONITOR

90 Case study: icetana AI

A major mall management group in the Middle East maximised its security operations by installing icetana AI’s Video Analytics platform

92 Shaping the future of security and safety

Ahmed Ismail Albalooshi, Chairman, Professional Security and Safety Alliance (PSSA) announces the relaunch of the Security Professionals Association (SPA) as it morphs into the PSSA

93 Interview: Aviation security

Meshal Aljohani, CPP, PSP, PCI, Security Operations Specialist, talks with Adnan Alghamdi, Advisor to the Executive Vice President for Aviation Security at the General Authority of Civil Aviation (GACA) in Saudi Arabia

106 Diary

Diary dates for forthcoming security exhibitions, conferences and events

95 SPECIAL

96 A global platform for security innovation

Find out more about 2025 Dubai’s edition of Intersec and what it offers for security professionals

98 Intersec 2025 Conference Sessions

Explore the programme of presentations and debates planned for the show

100 Intersec exhibitors

Hear from some of this year’s exhibitors ahead of the event

THIS ISSUE’S PARTNERS & CONTRIBUTORS

Rohith Rajan

Chief Technology Officer at Intello Cyber Technologies

Rohith Rajan specialises in cybersecurity innovation and strategy and is a NASA Hall of Fame inductee.

Eric O’Neill

Cybersecurity authority and former FBI operative

Eric O’Neill is best known for his role in capturing the most notorious spy in US history, Robert Hanssen, and is the inspiration for the film Breach.

Betania Allo

Cyber law and policy expert

Betania Allo has held roles at the United Nations specialising in technological solutions for criminal investigations and digital platform protection.

Apu Pavithran

Founder and CEO, Hexnode Apu Pavithran is a strong advocate for IT governance and information security management.

ADMAF and AGDA host the Intercultural Relations Panel to celebrate 40 years of diplomatic relations

In commemoration of 40 years of diplomatic ties between the United Arab Emirates and China, the Abu Dhabi Music & Arts Foundation (ADMAF) and the Anwar Gargash Diplomatic Academy (AGDA), hosted a special panel discussion.

Titled the ‘Intercultural Relations Exchange between UAE and China: Strategy for the Future and Challenges’, the event was hosted at the Anwar Gargash Diplomatic Academy in Abu Dhabi on November 14.

It brought together senior diplomats and key experts to discuss this prosperous partnership and address both

the opportunities and complexities in strengthening intercultural connections for a progressive future.

Her Excellency Huda Ibrahim Al Khamis-Kanoo, Founder of Abu Dhabi Music & Arts Foundation (ADMAF) said: “We are co-hosting a panel discussion with AGDA to commemorate the 40th anniversary of diplomatic relations between the UAE and China, our guest of honour at the Abu Dhabi Festival 2024, to promote cultural dialogue, international cooperation and continue to build global partnerships with a country that shares our core values.”

HID acquires IXLA to enhance card

and passport personalisation portfolio

HID has announced it has acquired IXLA, an Italian manufacturer of laser and colour personalisation systems for cards and passports.

Björn Lidefelt, EVP and Head of HID, said: “With IXLA’s technology and expertise, we are better positioned for geographic expansion, particularly in the government and financial institution space.”

IXLA is a company which specialises in the design, development and

implementation of advanced laser and colour personalisation systems in three core categories.

Craig Sandness, SVP and Head of Secure Issuance, HID, added: “We look forward to incorporating IXLA into our growing printer and credential personalisation offering. This addition helps increase our relevance in both the government and finance space, as well as better serve users in emerging markets across the globe.”

PwC: Tech advancements in the region heighten cyber threats

PwC Middle East has issued its regional findings from the 2025 Global Digital Trust Insights report, which highlights the growing importance of digital and cyber risks for organisations across the Middle East.

As GCC countries accelerate their digital transformation, they attract significant investments from global tech giants. However, this rapid adoption of new technologies brings heightened risks, prompting organisations to manage tech disruptions proactively.

The report shows that 55% of Middle Eastern companies prioritise mitigating digital and technology risks over the next year, just exceeding the global average of 53%.

Cyber risks remain a major concern, with 42% of regional businesses focusing on them, reflecting a continued emphasis on cybersecurity.

In the Middle East, 47% of respondents are concerned about hackand-leak operations, compared to 38% globally.

Over the past three years, 15% of regional organisations reported data breaches costing over US$100,000; underscoring the need for robust cybersecurity measures.

Samer Omar, Cybersecurity and Digital Trust Leader at PwC Middle East said: “Integrating cybersecurity across all business functions and establishing a robust AI framework are pivotal for enhancing regional security and fostering innovation against the backdrop of rapid digitisation we are seeing in the region.”

POSITIVE TECHNOLOGIES REVEALS FINANCIAL SECTOR AMONG TOP FIVE MOST TARGETED ECONOMIC SEGMENTS WORLDWIDE

Positive Technologies has analysed cyberthreats in the financial industry, finding that by the end of H1 2024, these organisations placed among the top five in recorded incidents.

During this period, the share of cyberattacks using social engineering more than doubled compared to H1 2023, while malware remains the weapon of choice for cybercriminals.

Banks, including federal and regional organisations from 52 countries, were the primary targets of the attacks. While malware is one of the primary methods of attack on financial organisations. For instance, in H1 2024, it accounted for 56% of reported incidents, representing a 12% increase over the same period in 2023.

Despite suffering the largest number of successful cyberattacks overall, financial-related cybersecurity incidents worldwide decreased by 36% in 2024 compared to H1 2023. Experts link this decline to the overall increase of corporate security but stress that IT assets of financial organisations are still vulnerable to hacker efforts.

Furthermore, analysts point to the fact that many companies cover up security incidents to avoid bad publicity; some incidents are still made known through messages on dark web forums, though.

SANS Khobar explores Saudi Arabia’s digital growth and cybersecurity skills gap

SANS Institute addressed the cybersecurity skills gap at SANS Khobar, which took place 7-12 December at the Holiday Inn & Suites Hotel, Al Khobar, Saudi Arabia.

The event supported Saudi Arabia’s Vision 2030’s goals of creating a diversified and knowledge-based economy and dived into the skills gap in the Middle East.

Saudi Arabia ranked first globally for cybersecurity in 2024 by IMD’s World Competitiveness Yearbook, an achievement that the National Cybersecurity Authority (NCA) attributes to proactive local and global training initiatives. However, according to the World Economic Forum, there is a global skills shortage of almost four million cybersecurity experts, impacting the Middle East disproportionately as it expands its digital infrastructure.

IN BRIEF

OMAN ISSUES NEW REGULATIONS

The Ministry of Transport, Communications and Information Technology (MTCIT) introduced new regulations for ship and port security under ministerial decision No 423/2024 to enhance the security of ports and ships and achieve the highest level of safety.

KUWAIT AIMS TO COLLABORATE ON SECURITY

Kuwait is inclined to enhance maritime security cooperation with regional and international organisations, as highlighted by Assistant Foreign Minister Abdulaziz Al-Jarallah during NATO talks focused on addressing security challenges like piracy.

DUBAI CREATES NEW STRATEGIES

Dubai has launched new strategies aimed at boosting innovation and resilience, including a US$204 million fund for R&D and a plan to prepare for future challenges similar to the COVID-19 pandemic. The initiatives aim to establish Dubai as a global hub for innovation while ensuring community safety.

UAE DISCUSS FUTURE OF SECURITY AT THE UN SECURITY COUNCIL

The United Arab Emirates expressed strong support for reforming the United Nations Security Council, stressing the need for a composition that reflects the diversity of the international community and addressing the underrepresentation of regions like Latin America, Asia-Pacific, Africa and the Arab World.

KSA MILITARY OFFICIAL VISITS OMAN MARITIME SECURITY CENTRE

Lt. Gen Mohammed Abdulrahman Al Gharibi, Chief of Staff of the Saudi Royal Naval Forces visited the Maritime Security Centre (MSC), accompanied by Rear Admiral Saif Nasser Al Rahbi, Commander of the Royal Navy of Oman (RNO). They were briefed on the roles and tasks carried out by the centre in the Omani maritime environment.

UK JOINS US-BAHRAIN AGREEMENT

The UK has confirmed that it will join the US-Bahrain Comprehensive Security Integration and Prosperity Agreement to build long-term security and stability across the Middle East.

MOROCCO REPELLED 644 CYBER ATTACKS LAST YEAR

A Moroccan minister confirmed that the Kingdom’s security services were able to repel 644 cyber attacks in 2024.

The statistic was revealed during a meeting between the Minister Delegate in charge of the National Defence Administration, Abdellatif Loudiyi, and parliamentarians.

According to a statement issued yesterday by the Moroccan Parliament, the Minister said: “In light of the escalation of threats and the increase in cyber attacks, the General Directorate of Information Systems Security (DGSSI) implemented in 2024 enhanced protection measures for the security of information systems of vitally important bodies and infrastructures.”

He explained that 644 cyber attacks had been identified in 2024 and that 134 required field interventions from the Centre for Vigilance, Monitoring and Response to Information Attacks.

He shared that the directorate issued “1,050 notifications and 575 security bulletins and carried out 25 interventions in the security operations centres of seven agencies to immediately confront threats.”

Cisco reveals top cybersecurity threats trends

Cisco has released insights into key cybersecurity trends that emerged between July and September 2024.

The findings, based on analysis from Cisco Talos, found that there was a notable increase in identitybased and ransomware attacks.

Over the three-month period, there was a rise in identity-based attacks, particularly with a focus on stealing credentials, which accounted for 25% of incident response engagements. Ransomware incidents also remained a significant concern, making up nearly 40% of engagements.

New ransomware variants, including RansomHub, RCRU64 and DragonForce, were observed this quarter, alongside familiar variants like BlackByte and Cerber.

Organisations in the education, manufacturing and financial services verticals were most affected, accounting for over 30% of compromises.

FUJAIRAH DIGITAL GOVERNMENT

AND TORRY HARRIS BUSINESS SOLUTIONS SIGN MOU

Torry Harris Business Solutions Private Limited (THBS) has signed a Memorandum of Understanding (MoU) with Fujairah Digital Government to accelerate the Emirate’s digital transformation efforts.

This agreement supports the collaboration in digital transformation in Fujairah, leveraging the latest technologies and innovations in alignment with the emirate’s vision to enhance government services and better serve its citizens.

The MoU was officially signed by Sheikh Engineer Mohammed bin Hamad bin Saif Al Sharqi, Director General of Fujairah Digital Government, and Shivdayal Charan, Director and Legal Representative of Torry Harris Business Solutions, in a move to foster collaboration and knowledge exchange in digital governance and best practices, aligning with the UAE’s vision to become a global leader in delivering digital government services.

Empowering smarter access

saltosystems.com

Secure Domains launches cloud-based DNS security operations in the Middle East

Secure Domains has announced the launch of its operations in the Middle East and Africa.

Wissam Saadeddine, Co-Founder of Secure Domains said: “DNS security is crucial in today’s cybersecurity landscape due to its critical role in preventing cyberattacks. The launch of our operations marks a significant step in Secure Domains’ commitment in reshaping the cybersecurity and tech industry across the GCC and Africa region leveraging AI and ML.”

With 90% of cyber threats leveraging DNS in the cyber kill chain, DNS Armor positions itself as a critical first line of defence for businesses.

DNS Armor is built to support Managed Service Providers with flexible, scalable

multi-tenancy, allowing IT teams to protect the organisation anytime, anywhere while adhering to business policies.

It is fully operational across 25 data centres strategically located in the US, Europe, Asia, Middle East and Africa, enabling global reach and robust service delivery.

As a part of its go-to-market strategy, Secure Domains aims to expand its channel network by recruiting, enabling and aligning with key distributors and channel partners in the UAE, Saudi Arabia and Qatar, and later expanding its operations to other countries across the Middle East. secure-domains.org

Help AG showcase AI-driven cybersecurity solutions

Help AG showcased its advanced cybersecurity services and solutions at Black Hat Saudi Arabia 2024 at RECC Malham.

Fahad Al-Suhaimi, Country Director, Saudi Arabia, Help AG (opposite) said: “Whether it’s in the integration of AIenhanced threat detection, building post-quantum readiness, or leadership in Managed Security Services, Help AG brings a unique level of expertise to Saudi Arabia’s digital transformation journey. We are glad to be joining Black Hat for another consecutive year as a vital platform for the Saudi cybersecurity industry.”

Supporting Saudi Arabia’s digital ambitions, Help AG introduced the Cybersphere Nexus, a pioneering approach to shape the future of cybersecurity by addressing today’s challenges and anticipating those of tomorrow.

Help AG’s end-to-end portfolio addresses the Kingdom’s most pressing cybersecurity needs, combining advanced solutions with local expertise.

To further enhance compliance with NCA frameworks, Help AG’s offerings include services tailored for audit readiness, incident response planning, and adherence to national regulations across sectors such as government, finance, healthcare and infrastructure.

These efforts are supported by stateof-the-art Security Operations Centres (SOCs) in Saudi Arabia, delivering 24/7 monitoring and incident response with in-country expertise, led by local Saudi professionals. helpag.com

SentinelOne reveals new AI security posture management abilities

SentinelOne has revealed its new AI security posture management (AI-SPM) capabilities to protect and secure the use of AI services in the workplace.

Built on SentinelOne’s market-leading Singularity cybersecurity platform, the new offering will expand SentinelOne’s top-rated Singularity Cloud Security portfolio to give customers visibility into – and protection over – both known and shadow AI cloud services running in their environment.

SentinelOne’s AI-SPM will help security teams discover the entire inventory of AI applications and models being used; detect and pinpoint AI service misconfigurations and vulnerabilities; and gain visibility into potential attack paths related to AI workloads.

“The power and benefits of generative AI are undeniable. Yet, the very tools and cloud services that simplify and accelerate GenAI adoption are simultaneously opening up a brand new attack surface and potential regulatory risk,” said Ely Kahn, Vice President of Product Management at SentinelOne (above).

“With AI-SPM, we’re empowering customers to unleash the distinct advantages of GenAI, while giving security teams the visibility, insight and tools needed to protect the sensitive data behind these powerful cloud applications.” sentinelone.com

AXIS COMMUNICATIONS ANNOUNCES ARTPEC-9 SOC SOLUTION

Axis Communications has announced the 9th generation of its purpose-built system-on-chip (SoC). ARTPEC-9 builds on and refines the capabilities and features of previous generations of the company’s in-house designed SoC, including low bitrate, AI-powered analytics, quality imaging and enhanced cybersecurity.

ARTPEC-9 now supports the proven AV1 video encoding standard from the Alliance for Open Media (AOM). Together with Axis Zipstream, AV1 reduces data storage costs without sacrificing forensic detail.

“ARTPEC-9, with its industry-first support for AV1, allows for attractive bitrates and extended client compatibility. It’s really a win for the industry,” said Johan Paulsson, Chief Technology Officer at Axis Communications.

“The keywords are ‘easy access’ and ‘open’, which align perfectly with how we work to fulfil our promise of innovating for a smarter, safer world. Plus, like all our SoCs, ARTPEC-9 is made expressly for high-quality network video. And, as always, we retain complete control of the SoC production process.”

Axis will begin including the ARTPEC-9 SoC in select network video products starting in early 2025. axis.com

Check Point unveils Check Point Quantum Firewall Software R82

As organisations face a 75% surge in cyber-attacks worldwide, R82, launched by Check Point Software Technologies, delivers new AI-powered engines to prevent against zero-day threats including phishing, malware and domain name system (DNS) exploits.

It also includes new architectural changes and innovations that drive DevOps agility for data centre operations as well as simplicity and scale.

Quantum Software R82 delivers over 50 new capabilities for enterprise customers including four new AI engines to find hidden relationships and patterns to block over 500K additional attacks per month that protect against sophisticated zero-day phishing and malware campaigns. Plus Operational Simplicity to offer seamless scalability for networks of all sizes, automatically adapting to business growth and traffic spikes. checkpoint.com

Technology: The Foundation of Modern Security Leadership

Regional Business Development –Middle East & Africa, Rapiscan

In today’s volatile landscape, where risks evolve faster than ever, the conversation around security is no longer about “if” technology should be integrated but “how effectively” it can redefine the way we protect what matters most. At the heart of this transformation lies a stark reality: technology isn’t just an enabler – it’s the driving force behind modern security leadership.

From artificial intelligence to IoT, cutting-edge innovations are reshaping how we anticipate and neutralise threats. AI systems, for example, have moved us beyond reactive defences. They now analyse vast streams of data in real-time, spotting risks before they escalate. IoT-connected ecosystems ensure seamless monitoring and management, creating a proactive approach to risk mitigation that was unthinkable a decade ago.

Yet, as interconnected systems flourish, so do vulnerabilities. Cybersecurity has become the boardroom’s most pressing agenda item. The sophistication of modern cyber threats underscores a critical truth: leadership in security requires not just adopting technology but mastering its integration. Organisations that prioritise robust frameworks, continuous innovation and upskilling their teams will be the ones that stand resilient in the face of tomorrow’s challenges.

The future of security is about foresight. Leaders who champion a predictive, technology-driven approach to safety will not only protect their assets but also inspire trust and confidence across their ecosystems.

The bottom line is clear: security is no longer just a function — it’s a strategic imperative, and technology is its foundation. For those in leadership, the choice is simple: harness the power of innovation, or risk being left behind in an increasingly digital and interconnected world. rapiscansystems.com

PROTECTING HIGH-THREAT FACILITIES & CRITICAL INFRASTRUCTURE

Secure your checkpoint with our industry-leading X-ray inspection, optical inspection, and radiation detection technologies that help to uncover threats and identify and authenticate vehicles and occupants. With our comprehensive checkpoint security solutions, we can help you maximize threat detection and operational success. rapiscan.com

VISIT US INTERSEC DUBAI BOOTH S3-D12

THE FUTURE OF PARKING

Mohamed Hediya, MD of Limitless, tells Security Middle East magazine more about the Limitless Ticketless Parking System, which supports efficient, secure parking

In Dubai, where innovation and luxury meet, one challenge has consistently lingered for busy shopping destinations, gated communities, corporate offices and other high-traffic venues: parking. Often considered an afterthought, parking can quickly become a source of frustration for visitors, residents and employees alike. Recognising this challenge, Mohamed Hediya, MD, Limitless, and his team saw an opportunity to redefine the parking experience with a groundbreaking approach: the Limitless Ticketless Parking System.

As the Managing Director of Limitless, Mohamed wanted to address the common issues that parking brings — long waits,

congested lots, outdated ticket machines — and transform parking into a smooth, integrated experience that’s as easy as entering and leaving. “We wanted parking to feel effortless,” Mohamed shared, “not just for malls but for any location where convenience and security are priorities.”

Revolutionising Mall Parking

For shopping malls, where high foot traffic is common, the Limitless Ticketless Parking System has quickly become a game-changer. Here’s how it works: when a visitor enters the parking area, AI-powered cameras immediately scan the car’s license plate, registering the vehicle automatically without the need

for a ticket. This ticketless entry reduces congestion and allows drivers to find parking faster.

“We know that shoppers come to enjoy their visit, not to worry about parking logistics,” Mohamed said. The Limitless app further enhances the experience. Through it, visitors can track their parking duration, receive reminders when their visit is ending, and pay directly on their phones. For those who prefer not to download an app, QR codes are conveniently placed around the parking area. A quick scan connects drivers to an online payment portal, where they can settle their parking fees without needing a physical ticket or receipt.

In addition, the system integrates with an advanced parking guidance feature. LED indicators above each spot change colour to show availability, while digital signs throughout the parking area guide drivers to open spaces in real-time. “The goal,” Mohamed explained, “is to make finding a parking spot as intuitive and fast as possible.”

Extending Beyond the Mall: A System for Every Venue

But the Limitless Ticketless Parking System isn’t just for malls. Its adaptability has made it an ideal solution for a wide range of environments, from gated communities and private residences to corporate offices and government facilities. In gated communities, for example, the system provides both security and convenience. The technology recognises residents’ vehicles, granting them automatic access while restricting entry

“We know that shoppers come to enjoy their visit, not to worry about parking logistics”

for unauthorised vehicles. Residents can also manage visitor access through the app, simplifying the check-in process for guests with QR codes that allow temporary access. “It’s a seamless solution for residential spaces where security and privacy are paramount,” Mohamed said. Corporate offices and government buildings have also found unique advantages. In these high-security environments, the system can integrate with existing protocols, ensuring only authorised vehicles enter the premises. Frequent visitors and employees are automatically recognised, while guests can be pre-registered or directed to specific parking zones. This approach allows for multiple access levels and ensures a safe, organised flow of vehicles, even during peak times or special events.

Supporting High-Traffic Venues Like Event Spaces and Stadiums

For event spaces and stadiums, where traffic surges are common, the Limitless system offers powerful guidance and efficient guest management. The system’s app can help organise different sections for VIPs, season ticket holders and general visitors, guiding each group to their designated parking area with minimal delays. “In a busy venue, speed and convenience are crucial,” Mohamed explained. “With ticketless entry and easy guidance, guests can enjoy their event without the stress of finding parking.”

A Tailored Rewards Programme for Frequent Visitors

One of the most appealing features of the Limitless system is its flexibility to incorporate rewards programmes, creating value for regular visitors across a range of settings. In malls, frequent shoppers can earn loyalty points redeemable for parking payments, enhancing their experience. In a corporate setting, employees who

carpool or drive eco-friendly vehicles could earn points toward transportation vouchers or cafeteria discounts. “It’s about creating an experience that’s more than just parking,” said Mohamed, “by making it rewarding for people who visit frequently and encouraging sustainability.”

Data-Driven Insights for Property Managers

Beyond convenience, the Limitless system provides property managers with real-time insights into parking occupancy, peak hours and visitor behaviour. With this data, Limitless parking clients can make informed decisions to improve operations, staffing and resource management. “This system is designed not just for users but for the locations themselves,” Mohamed pointed out. “The insights we provide help venues optimise their spaces and serve their visitors better.”

Looking Ahead: An Invitation to Make Parking Limitless

Since launching the Limitless Ticketless Parking System, Limitless has received interest from shopping malls, corporate complexes, gated communities and event venues across Dubai and beyond. The system has redefined the experience of parking, turning it into an effortless and even rewarding part of the visit.

For businesses or property managers seeking to elevate their visitor experience, Limitless offers an adaptable, secure and user-friendly solution. “If you’re looking to transform parking at your location, we’re here to make it happen,” Mohamed concluded. With Limitless, parking becomes easy, efficient and a gateway to enhanced satisfaction.

For those ready to experience what’s possible, contact Limitless today to bring a truly limitless parking solution to your property. www.limitlessparking.com

SHAPING A MORE SECURE FUTURE

As the leading regional event for security professionals we’re committed to delivering cutting-edge insights and practical solutions. Helping us achieve just this is our esteemed Advisory Board.

To ensure the highest quality content and address the most pressing industry challenges, we’ve assembled a distinguished Advisory Board comprising leading global experts in the world of security. Our board members bring a wealth of knowledge and experience to the table, shaping the conference agenda and contributing to insightful discussions.

Each member plays a crucial role in shaping the direction and content of the Security Middle East Conference. Composed of noted authorities from across the sector, they provide invaluable insights and guidance to ensure the conference remains at the forefront of industry trends.

Our Advisory Board will help assist us in:

Curating Content

The Advisory Board helps curate a comprehensive agenda, identifying key topics and trends that are relevant to the security community. They draw on many decades of experience within the industry to ensure timely and valuable topics for our audience.

Selecting Speakers

Our board help us in selecting renowned experts and thought leaders to deliver keynote speeches and panel discussions. They give the industry a voice on who they would find most inspirational to see, and who can add real value to the conference.

Ensuring Relevance

The board ensures that the conference content aligns with the latest industry developments and addresses the evolving challenges faced by security professionals.

Fostering Collaboration

By bringing together diverse perspectives, the Advisory Board facilitates networking opportunities and fosters collaboration among attendees. This is a key part of the conference and so a vital role for our board to play.

Setting the Future

Agenda

The board helps to identify emerging trends and future challenges, shaping the direction of the security industry. Our goal is to grow the conference year-on-year so it is essential our Advisory Board thinks about the longer journey we are on.

By leveraging the expertise of our Advisory Board, we are committed to delivering a world-class conference that empowers attendees with the knowledge and tools they need to excel in their field.

MEET THIS YEAR’S ADVISORY BOARD MEMBERS

Our Advisory Board is composed of renowned experts from diverse backgrounds, including security heads, researchers and industry leaders. They represent a wide range of disciplines, ensuring that the conference covers a comprehensive spectrum of security and safety topics.

Tawfeeq Alsadoon

GROUP HEAD OF SECURITY, RED SEA GLOBAL

Alsadoon is Group Head of Security at Red Sea Global, and General Manager of The Red Sea for Security Services. He has extensive experience spanning more than 30 years in the security fields, including 25 years as a Special Security Forces officer in the Ministry of Interior, before moving to work on giga projects.

Alsadoon holds a Bachelor’s degree in Computer Science and a Higher Diploma in Security Sciences. He has a proven track record of achievements in the field of building security systems. He is currently working on developing the security capabilities of The Red Sea Global projects, such as The Red Sea and AMAALA destinations. He also contributed to the establishment of The Red Sea Security Services, a company specialised in tourism security, which aims to qualify and employ the youth of the Kingdom to work in the tourism security sector within the projects of the Kingdom’s Vision 2030.

Meshal Aljohani

SECURITY GROUP SUPERVISOR, SAUDI ARAMCO

Meshal has been in the security industry for 15 years in various capacities. He is working as a Security Operations Specialist at Saudi Aramco.

Aljohani has acquired the ASIS International Triple Crown: Certified Protection Professional (CPP), Physical Security Professional (PSP) and Professional Certified Investigator (PCI) certifications.

He has been recognised for his great work as a security professional in the 2023 ASIS NextGen of the Year award, and as a finalist for the 2022 In-House Security Individual or Team of the Year in the Security & Fire Excellence Awards. He is a member of both ASIS Professional Development Community & NextGen Steering Committees. He is also a regular contributor to Security Middle East magazine, interviewing security leaders about their career paths.

2025 Sponsors

Luke Bencie

MANAGING DIRECTOR, SECURITY MANAGEMENT INTERNATIONAL

Bencie has worked as a consultant to the US Department of State, US Department of Defense, Fortune 500 companies, as well as foreign governments. He has worked in over 100 countries and has trained thousands of police, intelligence and military officers around the world in the fields of counterterrorism, counterintelligence, crisis management and strategic leadership.

RETIRED LIEUTENANT COLONEL, SENIOR MANAGER OF SAFETY & SECURITY, DIRIYAH COMPANY

Al Shalhoub is a highly experienced security specialist with a strong knowledge in security science, homeland defence and crime studies. He brings to the Advisory Board over 22 years’ experience working within Saudi Arabia’s Ministry of Interior. He is well positioned to advise on the security and defence challenges faced on the ground in Saudi Arabia.

Editor of Security Middle East magazine, Cora Lydon has been instrumental in shaping the publication into a leading voice for the security industry in the Middle East. With years of experience in journalism and an understanding of the region’s security landscape, Cora is committed to delivering high-quality content that addresses the evolving needs of security professionals. As a member of the Advisory Board, Cora will leverage her expertise to help drive the strategic direction of the Security Middle East Conference, ensuring it remains a premier platform for knowledge sharing and networking.

DIRECTOR OF SECURITY, SAFETY AND TRANSPORTATION, KAPSARC

Althowaini holds a Bachelor degree in Aeronautical Science and a Masters degree in Military Science and Operational Studies. He served as an officer at Royal Saudi Air Force for more than 25 years, and has worked as an instructor pilot, and as a leader for flight and ground safety and security services.

Daniel Norman

MIDDLE EAST REGIONAL DIRECTOR, INFORMATION SECURITY FORUM (ISF)

Daniel Norman’s role at the ISF involves helping organisations manage current and emerging cyber risks by helping them design information security systems, architecture and environments to effectively mitigate the risks associated with human behaviour. Historically he has focused on threat intelligence and risk forecasting.

Nadeem Iqbal

MIDDLE EAST REGIONAL DIRECTOR, INTERNATIONAL FOUNDATION FOR PROTECTION OFFICERS

Iqbal is an ASIS Middle East member who provides consultancy, advisory and training for regional organisations in enterprise security risk management, project management and facility and event security management. Iqbal is a multi-lingual change leader highly skilled in security risk management, loss prevention, business continuity and resilience programmes.

The Security Middle East Conference is taking place on May 13 2025 and will be held at the prestigious VOCO Hotel Riyadh.

A SPECIAL REPORT AND INDUSTRY INSIGHT

SHIELDING TOMORROW

THE FUTURE OF SECURITY ... POWERED BY JOHNSON CONTROLS

Johnson Controls is forging ahead in the world of security and is ready to protect the unknown through AI advancements and investment in the region

Introducing IQ Panel with PowerManage: A powerful and flexible intruder panel solution

Johnson Controls offers a comprehensive suite of security solutions designed to protect your property and ensure peace of mind, including its newest addition: IQ Panels with PowerManage support. This powerful and flexible intrusion panel system combines the strengths of two industry leaders:

IQ Panel: Originally from Qolsys (acquired by JCI in 2020), the IQ Panel has a fearsome reputation for its ease of installation, intuitive user interface, and compatibility with various automation solutions. Installers appreciate its user-friendliness, while customers benefit from its comprehensive functionality.

PowerManage: This established software solution originates from Johnson Controls’ legacy intruder panels. Following the successful introduction of a bespoke solution within the European region, JCI took its tried and trusted PowerManage software solution and integrated it with the renamed IQ Panel into the PowerManage solution.

The resulting solution facilitates remote management and configuration, along with offering dealers and installers valuable tools for diagnostics and maintenance. In addition, the IQ Panel with PowerManage system represents a significant advancement by seamlessly integrating these two established solutions.

Benefits of IQ Panels with PowerManage

Unparalleled data privacy: IQ Panels with PowerManage meets the highest standards of data privacy. Unlike traditional solutions that store customer details in the cloud,

PowerManage provides complete control over data storage, with data under the control of the service provider.

Enhanced flexibility: IQ Panels with PowerManage, thanks to open architecture and various installation options, is accessible to a wide range of customers seeking a flexible solution that caters to their specific needs.

Accessibility: PowerManage deployment is not limited in any way and the solution will be launched across all the MENA region.

Key features of IQ Panels with PowerManage

Ultimate home security & automation system: The IQ Panel stands out in the market thanks to its unique functionalities like Bluetooth Disarming, Installation Wizard, different automation protocols and many more.

Ultra-reliable communication: IQ Panels employ PowerG, proprietary wireless technology for communicating with sensors and accessories.

Platform for remote management: PowerManage offers a web interface and smartphone application for remote management by installers and operators. This allows for centralised control over multiple panels, ideal for larger organisations, enabling administrators to diagnose issues and perform routine maintenance. The interface and application can also be customised for user-specific needs.

On-premise option: Larger dealers can leverage their own cloud infrastructure for an on-premise solution, eliminating any data privacy concerns completely.

Flexibility with automation software: PowerManage seamlessly connects with a variety of automation platforms used by monitoring stations for efficient alarm management. This includes existing industry-standard solutions and the ability to integrate new, emerging automation software as it becomes available.

The IQ Panels with PowerManage is a powerful and flexible intruder panel solution designed to meet the evolving needs of today’s security landscape. By offering enhanced flexibility, increased data privacy, and seamless integration with various automation software solutions, IQ Panels with PowerManage provides a comprehensive solution for protecting properties with complete peace of mind and unparalleled user experience.

Learn more

For more information on the IQ Panels, PowerManage and other Johnson Controls security solutions, please contact Maciej Polak on maciej. polak@jci.com. Maciej has been with JCI for 25 years. He is the Senior Regional Product Manager for Intrusion products, acting as a link between the market and Product Management team, and overlooking the intrusion product lines internationally to fully understand the customer requirements and market needs.

Leading the charge

Security Middle East magazine talks to Jason Burrell, VP of Sales EMEA and APAC for Johnson Controls about his experience and his vision for the region

You’ve been with Johnson Controls for eight months now. What’s your take on the security industry at the moment, especially here in the EMEA region?

I joined the company at an exciting time – the security industry is evolving rapidly, with a strong emphasis on intelligencedriven solutions. We’re starting to see a shift towards more sophisticated systems and a greater need for tailored solutions.

Given your extensive experience how do you see your role at Johnson Controls shaping the future of regional security?

I spent 20 years working at Honeywell and my time there was invaluable. Before that I led the Source Tagging Security Division, EMEA for Tyco; a significant role as it was a new initiative which created a new business vertical that is still supporting customers today. It gave me a deep understanding of the global markets, as well as a focus on the EMEA market and its complexities. At Johnson Controls, I’m excited to leverage this experience to drive growth and innovation across the International region. We’re focusing on streamlining our offerings and providing a seamless customer experience.

Can you elaborate on Johnson Controls’ strategy for the Middle East market?

The whole of the Middle East region is a strategic market for us and we’re

really excited about the opportunities here. We’re investing heavily in the region, both in terms of personnel and infrastructure.

We’ve recently appointed a new leader to spearhead our efforts in the region, and we’re seeing a lot of traction with both businesses and government initiatives. Our new demo facility in Dubai is a testament to our commitment to this market. We’re also continuing to explore opportunities in emerging markets and sectors, such as government buildings and hotel complexes.

As part of the current strategy we are also looking at how we can enhance the customer experience. This will involve working closely with our other strategic business units, notably our Fire division, to create a portfolio strategy and a simpler structure for our customers to deal with. For example, each customer would have just one point of contact making it easier to deal with us and the focus can remain on the exemplary service we are known for.

What are some of the exciting developments we can expect from Johnson Controls?

We’re constantly pushing the boundaries of innovation. Our new PowerManage solution, for instance, leverages cloud technology to simplify installation and

management. This shift towards softwarecentric solutions offers greater flexibility and scalability for our customers. We’re excited to empower our customers with these cutting-edge technologies.

As you look ahead, what are the biggest opportunities and challenges for Johnson Controls in the Middle East?

The Middle East presents a unique blend of opportunities and challenges. The region’s rapid urbanisation and infrastructure development create significant demand for advanced security solutions. Thanks to urban planning and innovation there are continued development opportunities across the region. It is an area of high activity, for example with the further expansion of mega cities and the investment that brings.

However, navigating complex regulatory environments and ensuring cybersecurity remain key challenges. We’re well-positioned to address these challenges and capitalise on the region’s growth potential.

JCI SECURITY VIDEO PORTFOLIO SYSTEM ACHIEVES SIRA ACCREDITATION

JCI’s American Dynamics video system has achieved Dubai’s Security Industry Regulatory Agency (SIRA) –elevating the brand above the competition

Johnson Controls is proud to announce that its American Dynamics video system has successfully obtained SIRA accreditation from Dubai’s Security Industry Regulatory Agency (SIRA). This significant achievement underscores the company’s commitment to delivering cutting-edge security solutions that meet the highest industry standards.

SIRA’s rigorous testing process ensures that products comply with stringent regulations and possess the necessary features and functions to safeguard businesses across Dubai’s diverse sectors. As a result of the accreditation, all business types within Dubai’s vertical markets can now benefit from JCI’s Video portfolio.

Before any type of business can become established within the city, permission needs to be passed by the Agency. By achieving SIRA accreditation, Johnson Controls’ video surveillance solution is now fully certified for use within the Emirate.

A key aspect of SIRA’s requirements is the ability of video systems to integrate

“Our customers can be confident that they and their property are being monitored and in the event of anything out of the ordinary, the Dubai Police can act swiftly”

seamlessly with Video Guard, SIRA’s surveillance software. Video Guard acts as a gateway and communicates between the JCI video management product and the Dubai Police system; enabling them to remotely connect to view and export any footage of incidents. This integration allows authorities to monitor and access footage from any location, enabling swift response to incidents and therefore enhancing overall security.

Stuart Bettle, Global Product Manager – Video Surveillance at Johnson Controls, expressed his enthusiasm for the achievement: “We’re delighted to achieve this accreditation from SIRA. Our customers can be confident that they and their property are being monitored and in the event of anything out of the ordinary, the Dubai Police can act swiftly.”

With this accreditation, Johnson Controls solidifies its position as a trusted provider of advanced security solutions in the Middle East. This milestone reinforces its dedication to providing reliable and innovative security solutions. JCI customers can have peace of mind knowing that their security systems are compliant with the highest industry standards and supported by Dubai Police.

The company remains committed to delivering cutting-edge technologies that empower businesses to protect their assets and safeguard their operations.

What does the SIRA accreditation mean for our customers?

SIRA accreditation is a significant milestone for companies operating within Dubai’s security industry. It signifies that the company has met rigorous standards of quality, professionalism and compliance with local regulations.

For customers, JCI’s SIRA-accreditation offers a range of benefits:

ENHANCED SECURITY

SIRA-accredited companies are held to high standards, ensuring that they employ qualified personnel and utilise advanced security technologies. This translates to enhanced security measures and a higher level of protection for your assets and personnel.

REGULATORY COMPLIANCE

SIRA-accredited companies are well-versed in local regulations and compliance requirements. This ensures that their services align with the latest industry standards, minimising the risk of legal and operational issues.

RISK MITIGATION

By choosing a SIRA-accredited company, you can mitigate risks such as security breaches, data loss and property damage.

PEACE OF MIND

Knowing that your security provider is SIRA-accredited provides peace of mind, allowing you to focus on your core business activities.

PROVEN EXPERTISE

SIRA-accredited companies have demonstrated their expertise and commitment to delivering high-quality security services. This ensures that you receive reliable and effective solutions.

A NEW ERA OF INNOVATION

Johnson Controls has unveiled its state-of-the-art Demo Suite in Dubai, inviting customers to immerse themselves in the future of security

Tony Nasr

Johnson Controls, a global leader in building technologies, has a longstanding commitment to the Middle East. With over 20 years of experience in the region, the company has recently relocated its Security and Fire Business Units to a modern office space in Dubai Internet City.

To further enhance customer experience and partner training, Johnson Controls is transforming its previous office space into a state-of-the-art demonstration and training facility. This dedicated space will provide a handson platform to showcase the company’s comprehensive range of security solutions, including access control, video surveillance and cloud-based systems.

The 80-square-metre security space is designed to be flexible and adaptable, and can comfortably accommodate up to 12 training desks. The new and improved space is anticipated to host more than the usual 500 engineers and technical personnel annually.

Visitors will be immersed in a cutting-edge experience, exploring the seamless integration of industry-leading brands such as Software House, American Dynamics, Exacq, Kantech, and Johnson Controls’ own vertical specific CEM system.

Tony Nsar, General Manager, Emerging Markets, expressed enthusiasm for the new facility. He said: “Our new demonstration and training suite offers us the opportunity to showcase our full range of products and services. We’re committed to helping our integrator

partners learn how to help our end-user customers experience the full value of our solutions.”

The new facility will serve as a vital hub for knowledge sharing and skill development, showcasing the full potential of Johnson Controls’ product portfolio. By providing hands-on training and immersive experiences, the company is dedicated to helping its integrator partners unlock the value of its solutions for end-users.

This significant investment in a dedicated demonstration and training facility reinforces Johnson Controls’ dedication to the Middle East market. By offering world-class training and support, the company aims to strengthen partnerships, drive innovation and deliver exceptional value to its customers.

Tony Nasr has recently joined the company and is the main contact for Johnson Controls’ customers in the Middle East region.

Areas of expertise: Strategic business planning, strategic partnerships and alliances, business turn-around, P&L accountability, relationships management.

TEAM

MEET FAISAL PANDIT

Faisal is a seasoned global executive with over three decades of experience driving growth and innovation in the technology industry. Most recently, he served as President of Panasonic Connect North America, a division in North America, where he led a diverse portfolio of businesses, including industrial automation, mobile computing and professional audio-visual solutions. Prior to this he had successfully led several high-profile businesses including Panasonic’s industrial, retail tech and security solutions.

Throughout his career at Panasonic, Faisal successfully led transformative initiatives, leveraging his expertise in digital transformation, customer experience and IoT. He is passionate about fostering a culture of innovation and empowering teams to achieve excellence. He is focused on creating exceptional customer experience and fostering exceptional and positive employee practices.

As VP and GM, Global Security Products at JCI, Faisal brings a wealth of knowledge to the role and decades of experience leading profitable businesses and digital transformation. He has been responsible for breaking down barriers within businesses in order to foster innovation and value creation. As well as being productfocused he has a reputation as a thought leader within the Internet of Things (IoT) space.

Faisal holds an MBA from Northwestern University, a Master’s degree in computer science from the Illinois Institute of Technology, and a Bachelor’s degree in computer science from the University of Illinois.

FAISAL PANDIT, VP

& GM, GLOBAL

SECURITY PRODUCTS,

AT JCI REVEALS HIS PREDICATIONS FOR THE FUTURE OF SECURITY

AN EMERGENCE OF COMPLIANCEFOCUSED SECURITY PROS

With organisations increasing their focus on the regulatory environment, there will be an uptick in specialised certification programmes to meet these needs. New security roles will emerge that will be focused on tracking and applying relevant regulatory changes, an area of product development that currently lacks awareness across the industry. This increase in certifications and specialisations will not only improve product outcomes but will also be instrumental in mitigating existing and looming talent shortages.

THE RACE TO ENHANCE UX TECH INTENSIFIES

As security solutions become more complex with the integration of new technologies, such as artificial intelligence, organisations must keep the user experience top of mind. The latest technology may help streamline security operations on the back end but doing so while ensuring ease of use is critical to keeping and securing new end users without compromising overall security.

ARTIFICIAL INTELLIGENCE ISN’T THE BE-ALL AND END-ALL OF SECURITY

Artificial intelligence is a new and exciting technology that is having drastic effects on physical security, but it isn’t –and shouldn’t be – the ultimate deciding factor of security operations. While AI as a tool to streamline workflows and improve physical security has been invaluable and more users see the value of AI and data, it isn’t an umbrella solution. The future of security operations includes customisable, scalable solutions where users can control if, when, and how they use AI to improve efficiency depending on the size and function of their organisation.

Remote management

Monitor and control IQ panels remotely.

Get in Touch

Easy PowerManage upgrade Leverage your existing PowerManage installation and add IQ Panels to your offering.

Real-time alerts Instant notifications of security events and system status.

Integration Capabilities

Seamlessly integrates with other systems and devices through the PowerManage Rest API.

User-friendly interface Easy to navigate and operate.

Reduces costs Reuse of devices from previous installations.

API World Tower, Shiekh Zayed Road, Dubai, AE linkedin.com/company/ johnson-controls-middleeast-africa me.johnsoncontrols.com/ contact-us

Johnson Controls Middle East Regional Headquarters

Empower your IQ panels and the safety of your customers

As the technology landscape continues to evolve, your wireless home security system must evolve as well.

With the IQ family of panels, you can take your home or business to a new level of security and integration.

The IQ family of panels is Johnson Controls’ newest line of All-in-One smart home and security systems. Now our IQ line of panels is available to our valued customers looking to leverage Connect Alarm and PowerManage as an interactive and monitoring solution.

Open up a world of possibilities! For more information contact your local sales representative or distributor.

Protecting Paradise: A Vision 2030 Perspective

Exclusively for Security Middle East magazine, Tawfeeq Alsadoon, Group Head of Security, Red Sea Global, examines the role of tourism security in enhancing the economy and developing local communities

As Saudi Arabia embarks on the ambitious journey to diversify the economy, Vision 2030 places tourism at the forefront of national development. The Kingdom aims to position itself as a global tourism destination, capitalising on its rich cultural heritage, breathtaking landscapes and innovative giga projects. Central to achieving this vision is the role of tourism security, which ensures that visitors feel safe, protected and welcomed throughout their journey.

Tourism security extends beyond safeguarding tourists and destinations;

it plays a pivotal role in economic growth, sustainable development and the empowerment of local communities. It creates an environment where businesses thrive, visitors enjoy peace of mind and local residents actively contribute to the tourism experience.

Tourism Security and Vision 2030

Under Vision 2030, Saudi Arabia has set an increased target of welcoming 150 million visitors annually by 2030, generating 10% of GDP from tourism and creating one million new jobs. Achieving

these ambitious goals requires a robust and comprehensive approach to tourism security. Visitors need to feel confident in their safety, not only from traditional threats but also from emerging challenges such as health crises and cyber risks.

Saudi Arabia’s commitment to tourism security is evident in its giga-projects, such as:

1. The Red Sea, which promises luxurious, eco-friendly resorts on pristine islands.

2. AlUla, a historical treasure showcasing ancient civilisations.

3. NEOM, a futuristic city designed to redefine urban living.

4. Diriyah Gate, celebrating Saudi Arabia’s cultural and historical roots.

These projects require advanced security frameworks to protect tourists, infrastructure and natural assets while maintaining a welcoming and seamless experience.

Boosting the Economy Through Tourism Security

Tourism security is a key driver of economic growth. When a destination is perceived as safe, it attracts more visitors, leading to increased spending on accommodations, dining, transportation and entertainment. Additionally, it enhances investor confidence, encouraging the private sector to develop tourismrelated businesses and infrastructure.

In Saudi Arabia, this economic impact is amplified by Vision 2030’s focus on tourism as a primary sector for diversification. The establishment of secure environments within giga-projects ensures:

• Job Creation: Security services and tourism development projects generate direct employment opportunities for Saudi citizens, from security personnel to hospitality staff.

• Increased Revenue: Safe and wellmanaged destinations lead to higher tourist arrivals and greater economic activity, benefiting both the national economy and local businesses.

• Investment Growth: With robust security measures in place, investors are more likely to support large-scale tourism initiatives, boosting longterm growth.

For example, The Red Sea has already attracted billions in investments, with security as a critical enabler of its success.

Empowering Local Communities Through Security

Tourism security contributes to the wellbeing and prosperity of local communities in several ways:

1. Cultural Preservation: Security measures protect historical and cultural sites, ensuring their longevity for both residents and tourists. Sites like AlUla, with its ancient ruins and rock formations, rely on security teams to prevent vandalism and over-tourism.

2. Economic Inclusion: By safeguarding tourism zones, local residents can confidently engage in the sector. From selling traditional crafts to offering

guided tours, communities directly benefit from increased visitor numbers.

3. Community Engagement: Security programmes that involve local communities foster trust and collaboration. Local residents often act as the first line of defence, reporting suspicious activities and ensuring a hospitable environment.

Through initiatives like Vision 2030’s Quality of Life Program, tourism security also enhances the standard of living for residents, creating vibrant, safe communities that are attractive to both locals and tourists.

Tourism Security Strategies in Saudi Arabia

Saudi Arabia’s approach to tourism security is both innovative and comprehensive, encompassing various strategies:

1. Partnerships with Local Communities

Collaborating with local communities is essential for building trust and ensuring seamless security operations. Training programmes for residents help them understand their role in maintaining a safe environment while benefitting economically from tourism growth.

2. Training and Development

To ensure a world-class visitor experience, tourism security personnel receive specialised training. Programmes include:

• Cultural Awareness: Understanding diverse visitor backgrounds to provide respectful and effective service.

• Crisis Management: Preparing for emergencies such as natural disasters, health pandemics, or security threats. For example, the Red Sea Security Team, who is tasked with managing high-profile tourism zones, undergoes rigorous training in international best practices.

3. Technological Innovation

Saudi Arabia integrates cutting-edge technology into its tourism security framework. Examples include:

• Smart Surveillance: AI-powered cameras and drones monitor large areas, enhancing safety without disrupting visitors.

• Visitor Apps: Mobile apps provide real-time updates on safety guidelines, emergency contacts and local regulations.

• IoT Sensors: Internet of Things (IoT) devices monitor environmental changes and detect unauthorised activities, ensuring safety and sustainability.

• Integrated Emergency Response Systems: Centralised systems connect multiple agencies to

ensure rapid coordination during any crisis.

• Cybersecurity: Protecting digital infrastructures, such as online booking platforms and visitor data systems, is a priority.

4. Health and Safety Measures

In the wake of global health crises like Covid-19, Saudi Arabia has prioritised health security. Protocols include enhanced sanitation, contactless services and health monitoring systems, ensuring that tourists feel protected from both physical and health-related risks.

Tourism Security for Sustainable Development

A key aspect of Vision 2030 is sustainability, and tourism security is integral to achieving this goal. By protecting the Kingdom’s natural and cultural assets, security measures ensure that tourism growth does not come at the expense of the environment or heritage.

For example:

• Ecotourism Zones: The security teams at The Red Sea are dedicated to safeguarding the Red Sea’s unique ecosystems while ensuring a seamless balance between visitor enjoyment and environmental preservation.

• Controlled Access: Sites like AlUla implement measures to limit visitor numbers, preventing overuse and ensuring the site’s sustainability.

Additionally, secure environments promote longer tourist stays, reducing the pressure on high-traffic areas and encouraging exploration of lesser-known destinations, further spreading economic benefits.

Vision 2030: A Holistic Approach to Tourism Security

Saudi Arabia’s commitment to tourism security reflects its broader objectives under Vision 2030. It integrates safety into every aspect of tourism development, from planning gigaprojects to enhancing local community participation. This holistic approach ensures that the Kingdom is not only a safe destination but also a leader in sustainable and inclusive tourism.

Tourism security is more than a protective measure — it is a strategic enabler of economic growth, community development and global competitiveness. Under Vision 2030, Saudi Arabia has demonstrated that investing in security is not just about mitigating risks but about creating opportunities. By fostering a secure and welcoming environment, the Kingdom is well-positioned to achieve its tourism goals, empowering its people, preserving its heritage and building a sustainable future for all. As Saudi Arabia opens its doors to the world, tourism security remains a cornerstone of its success, ensuring that visitors leave not only with unforgettable memories but also with the desire to return time and time again.

www.redseaglobal.com

Emerging cyber risks for the Middle East

As we move into 2025, Daniel Norman, Regional Director, EMEA at the ISF, considers what threats we need to be aware of for next year and beyond

The Middle East has been one of the major focal points for geopolitical risk and conflict over the last year, and predicting what will happen next in Israel, Lebanon, Syria and beyond is incredibly difficult. 2025 could be a year of further intensification, or perhaps reconciliation, depending on how optimistic or pessimistic your viewpoint may be. This unpredictability makes for a challenging environment for Middle Eastern business leaders.

Deep rooted issues between religious factions, nationalities and governments

continue to worsen, as conflicts spread across the physical world into cyberspace. With war in Eastern Europe continuing to trudge along slowly, Russian and Western support in the Middle Eastern region has diminished as their focus turns inwards; elections all around the world continue to reshape international relationships, trade, information sharing and partnerships. However, investment in the Middle East is steadfast – Saudi Arabia, the UAE and Qatar continue to press ahead with financing large Giga projects, including tourist locations, smart cities,

entertainment areas, etc. Partnered with more scrutiny from regulators on managing these technological developments in a responsible fashion, technology leaders have their work cut out.

Geopolitical fragmentation and a tilting Western power axis creates a challenging backdrop for business leaders to manage cyber risk, whilst consistently having to balance the risks against pressing ahead with technological investments. With this in mind, here are some of the major threats organisations in the Middle East should consider for 2025:

1. An unpredictable Trump administration will turn existing agreements upside down. What this means for the US’ global policies will soon become clear when Trump arrives for his second term. As an existing major provider of offensive and defensive cybersecurity solutions, microchips, machine learning and AI to Middle Eastern allies, his ‘America-first’ policies may pose challenges for existing trade agreements, supply chain security and business development in the region. The expectation is a barrage of reshaped trade embargos and regulation around acceptable use of AI, cryptocurrencies, cloud services, etc. Moreover, the reshaping of power axis in the Americas, Asia and Western Europe will reinvest threat intelligence gathering and sharing for all nations globally – Middle Eastern governments and organisations may have to adapt themselves to this new order.

2. Rapid global investment continues to pose a significant technological risk to organisations, governments and society in general in the Middle East. For example, in Saudi Arabia and the UAE, organisations have a diverse, multinational supply chain, making third-party risk management complex and potentially damaging. There is also now a critical dependency on technology within Giga projects and beyond, which introduces a broad spectrum of technology/cyber risks to the region. Most organisations in the region consider themselves to be embarking on a digital transformation of some capacity which typically introduced cloud security risk, and a myriad of new technical threats, including newer devices such as IoT and AI. The Middle East is also one of the main targets for ransomware gangs as attackers turn their attention to new high-value targets.

Ultimately, 2025 will be an interesting year politically, technologically and financially for the Middle East – as the region becomes a bigger player on the global field, nefarious actors will

3. Geopolitical conflicts and wars will have inadvertent impacts globally: cyber warfare does not discriminate – attacks that compromise a certain piece of software, hardware or even at the code-level, can have far-reaching and sometimes accidental impacts on organisations caught in the crossfire. There are far too many examples of organisations becoming collateral damage throughout history, e.g. NotPetya, WannaCry, etc. Now, with the backdrop of war in the Ukraine, conflicts in the Middle East and tension in the South China Sea all playing out at the same time, nation state attacks will become more common, and may, in fact, damage entire nations accidently.

4. The rise of right wing politics globally will cause a significant problem for organisations. There has been a significant trend of growing isolationism and protectionism in the West, e.g. the US, UK, France, Germany, Netherlands, etc. This may pose a challenge for trading relationships between new political parties and the Middle East, a reduction in networking/information sharing about cyber threats, and a conservative data protection policy between nation states. This could create a breeding ground for nefarious actors to exploit dwindling relationships between countries and maybe a further risk in insider threats.

5. Middle Eastern countries are focusing significantly on security compliance, which may overburden security teams. There is a tremendous focus on better cyber risk and third-party risk management, defining a core set of controls, measuring effectiveness and further alignment with global standards – this is no doubt a good thing, but Middle Eastern organisations must be prepared, with workforce attraction programmes, professional development, and increased coordination and cooperation between organisations and governments.

begin targeting and perhaps exploiting relatively immature organisations with technological weaknesses.

Protecting digital assets will become a major concern of senior business leaders, and balancing compliance demands with a risk-based approach will be critical.

securityforum.org

SECURING THE CITY

Leveraging real-time data and unified xIoT security are vital for smart city success. Osama Al-Zoubi, Regional Vice President of Middle East, Phosphorus Cybersecurity, looks at how

Smart cities present a future where tech and urban life are seamlessly connected by using technologies like the Internet of Things (IoT) and Operational Technology (OT), to improve residents’ lives, make city services more efficient, and encourage sustainable practices. In the Middle East, cities like Abu Dhabi, Dubai and Riyadh are leading the way in this transformation. According to the 2024 Smart City Index, Dubai and Abu Dhabi have both secured positions among the world’s top 12 smart cities. Riyadh climbed five places to 25th, while the holy city of Makkah and Jeddah came 52nd and 55th, respectively. Doha rose 11 places to 59th while Muscat was 88th, reflecting the region’s rapid progress in urban technology

But, as we become more connected, new risks emerge. Heavy reliance on xIoT devices (extended Internet of Things) — which includes traditional IoT, OT and other linked devices — creates vulnerabilities that can threaten critical infrastructure. For instance, outdated firmware and poorly configured devices leave gaps for malicious actors to exploit. One compromised sensor can trigger widespread disruptions, much like a single spark ignites a massive fire. Think of a smart city as an orchestra, where everything must work together perfectly. If one instrument is out of tune, it can ruin the whole performance.

Cyber attacks can do more than just disrupt services — they can have

far-reaching consequences that affect public safety and trust. For example, tampering with air quality data might cause unnecessary public panic or delay critical health interventions that rely on accurate information. These types of incidents don’t just damage city systems; they undermine public confidence in the institutions meant to protect and serve them. This loss of trust can be just as harmful to society as the financial costs of the attack. Monitoring these devices and fixing these vulnerabilities isn’t simply a technical challenge — it’s an essential step towards safeguarding the wellbeing and stability of the urban communities.

Smart city xIoT estates: innovation meets vulnerability

Smart cities need to rethink their xIoT systems — the core of their connectivity. These systems bring together essential urban services like transport networks, energy grids, resource management and reducing environmental and public safety mechanisms, to ensure efficiency and sustainability. They also support innovative public spaces that promote community engagement through digital platforms.

Yet, this interconnectedness is a double-edged sword. As stated previously, the sheer number of xIoT devices, many with weak security settings or outdated firmware, creates fertile ground for cyber attacks. Many organisations don’t have a

completely accurate picture of what they have and unlike traditional IT systems, these devices often operate in critical but poorly monitored environments, from busy transit hubs to sensitive healthcare facilities.

For example, cyber attacks on public transportation systems have caused operational disruptions in several cities. Similarly, attacks on water management systems have threatened distribution networks, highlighting the vulnerabilities in OT systems managing critical services. Such incidents underscore the urgent need for robust security in urban IoT deployments.

The power of real-time data in smart cities

Real-time data is just as vital to a smart city. It allows quick responses, better use of resources and keeps the public safe. For example, Dubai’s traffic systems use live data to reduce congestion and emissions, while Riyadh employs environmental monitoring to enhance public health initiatives.

Smart cities rely on a continuous flow of real-time data collected from IoT and OT devices. This data supports essential functions, allowing for quick decisions and rapid responses to changing urban conditions.

However, increasing reliance on realtime data opens up a new attack vector for cyber actors. Without strong security

measures and understanding if the state of a device has changed, the data streams that make city operations efficient could become targets for cyber attacks. It is possible an attacker could manipulate traffic data to create gridlock or falsify environmental readings to disrupt public health responses. Failing to secure these data streams could undermine public trust and compromise the functioning of entire cities.

Emerging trends in IoT security

As the world is becoming more connected, there is a big race towards the adoption of game-changing technologies that can overcome complex new challenges and fulfil the promise of this exciting new era. It is important to unlock the potential of this interconnected world.

One of the biggest cybersecurity challenges is closing the gap between IT (Information Technology) and OT (Operational Technology) environments. IT systems like data centres usually have strict security protocols. In contrast, OT systems often operate with less oversight, creating blind spots for attackers to exploit.

This gap needs to be closed. By using combined xIoT security platforms, cities can make sure IT and OT systems work together safely. In the Middle East, one of the outstanding smart cities projects has adopted a comprehensive cybersecurity strategy. This includes deploying unified xIoT security platforms that monitor device activity in real-time, detect unusual behaviour and manage vulnerabilities automatically. By integrating IT and OT security, regional smart city and giga projects are setting an example of how cities can coordinate various urban functions leading the way for others to follow.

Globally, London has implemented similar measures, focusing on integrating its transportation network’s OT security with broader IT systems. These strategies highlight the critical role of unified security solutions in managing real-time threats.

Advantages of xIoT platform

Adopting a unified xIoT security management platform allows cities to gain complete visibility into their connected devices, continuously assess risks and address vulnerabilities automatically. This approach minimises downtime, simplifies security operations and improves the ability to respond to incidents in realtime. Using best practices like regular password rotations, remote firmware updates and integration with existing IT systems enables smooth coordination across city departments, enhancing overall cybersecurity. Such measures set a new standard for resilience against cyber threats in the region

Practical security measures

It’s unrealistic to believe that city infrastructure can be fully protected from every cyber threat. Instead, acknowledging that cyber attacks are inevitable is key to preparing effective response plans. Smart cities need a proactive strategy to tackle the constantly changing threats they face.

Securing the smart cities of the future demands a multifaceted approach. Policymakers and cybersecurity experts should consider the following strategies: Strengthening Regulatory Frameworks: Enforce strict cybersecurity standards for xIoT devices to reduce risks at their origin.

Investing in Unified Security

Solutions: These platforms offer the visibility and control necessary to manage intricate xIoT ecosystems effectively.

Promoting Public-Private Partnerships: Collaboration between government agencies and private innovators can drive the development of advanced security technologies. Enhancing Public Awareness: Educate citizens about the importance of cybersecurity in smart cities to foster a culture of shared responsibility.

Moreover, regular system audits, rolebased access controls and encrypted backups are vital for maintaining operational continuity and data integrity. By implementing these measures, cities can safeguard their critical infrastructures while building public trust in their digital initiatives.

The journey towards secure smart cities mirrors the evolution of urban fire safety — anticipating risks, innovating solutions and fostering collective vigilance. As cities become more interconnected, cybersecurity must evolve from a technical necessity to a societal imperative.

By adopting unified security solutions, leveraging emerging technologies like AI, and fostering collaborative efforts, we can create a safer, smarter future for urban communities worldwide. Cybersecurity isn’t just an operational requirement — it’s a promise to protect the foundations of modern life. The time to act is now, for in the digital age, every second counts.

www.phosphorus.io

Five pillars of CIAM

Malithi Edirisinghe, Director, Architect – Identity and Access Management, WSO2, looks at customer identity and access management (CIAM), and how it is an indispensable element of success for modern B2C enterprises

The Arab Gulf region is home to a growing number of brands adapting swiftly to meet modern customers’ digital-first expectations. This shift means expanding the range of digital touchpoints that connect customers to a brand. In the UAE, for instance, the e-commerce market is projected to reach US$17 billion by 2025 according to Statista. To keep pace, regional B2C enterprises need to consider how they’ll maintain robust security as customers interact with their brand beyond traditional digital boundaries. A solution to this challenge is becoming clear.

Customer Identity and Access Management (CIAM) brings robust authorisation practices to customer interactions, ensuring that high security standards do not compromise system performance. Effective CIAM solutions enable seamless, secure experiences across web, mobile, kiosks and other digital touchpoints, preserving user experience while safeguarding customer data. CIAM methods can include a range of authentication options — from traditional usernames and passwords to social logins, secure email links, passkeys, multi-factor authentication (MFA) and more.

CIAM is an approach built on five pillars: user onboarding and registration; authentication; authorisation and access management; self-service; and integration with systems of record and businessinsight tools. When an organisation implements its CIAM strategy with the right balance among the pillars, the result is frictionless, individualised customer experiences.

THE FIVE PILLARS

1. User onboarding and registration

Registration takes curious, anonymous consumers and converts them into established users with names, dates of birth and more. Bring Your Own Identity (BYOID) allows these new customers to use social identifiers, email addresses and a variety of other methods for identity verification. E-commerce services like shopping carts, food-delivery, content-streaming and ride-sharing, can use these methods. But when we cross over into government, financial services and commercial aviation, the CIAM approach requires validation of government-issued documents like passports, national IDs and drivers’ licenses. In highly regulated industries, organisations must also fulfill Know Your Customer (KYC) obligations and may be required to use biometric verification when identifying a customer.

During registration, the enterprise must also establish a privacy relationship with the customer through terms of service and user consent. At this point, the business can persuade the user to provide zero-party data such as preferences and favourites to further personalise experiences.

2. Authentication

Account takeovers, password snooping, password stuffing –avoiding these attack methods calls for robust authentication policies. Single sign-on (SSO) and passwordless logins like email links, mobile OTPs, passkeys and social logins will enhance the convenience of authentication while also strengthening it. Organisations also have the option of using adaptive authentication, which tailors the factors used to the context of the login; if a user authenticates from a new device or location, for example, or after a prolonged period of inactivity. Financial organisations like banks may add an extra layer of authentication if users move from reading their statements to transferring funds.

3. Authorisation and access management

Next, we must define privileges. In modern systems, rolebased access control (RBAC) and attribute-based access control (ABAC) models have proved too restrictive for granular control over privileges. Instead, relationship-based access control (ReBAC) has emerged. But regardless of control method, authorisation in CIAM requires granting permissions that neatly fit the user, application and device being authenticated. B2C apps may grant permissions

CIAM pillars and enhanced business outcomes

The five pillars go beyond user satisfaction and compliance. They serve as a turbocharge for operational efficiency when CIAM is integrated with business processes. When data is seamlessly synchronised and

based on loyalty tier. Authorisation will also apply to thirdparty applications that need access to user data. Strong authorisation can prevent data loss, detect account takeovers and deliver secure, compliant access.

4. Self-service

The Gulf’s digital natives expect self-service capabilities. And self-service has the added benefit of reducing operational costs. Classic examples of self-service in an effective CIAM environment would include options of recovering lost credentials through a “Forgot password?” link. Such methods allow users to get things done at their own convenience.

Self-service can also include managing MFA options (authenticator apps, passkeys and so on), security settings, and notification preferences, and viewing and revoking active sessions. The user can also authorise and deauthorise devices. The organisation could also give users access to their own activity logs, which would allow them to identify the devices from which they accessed their accounts. This transparency is an excellent way to build trust between the brand and its customers, because users can audit their activity and make their own independent decisions based on what they find. The EU’s GDPR mandates self-service features that allow users to view any terms and conditions they have accepted and to download data pertaining to them and opt out of services.

5. Integration with systems of record and business-insight tools

This competency involves embedding customer identity into business processes and tools to facilitate seamless cross-application and cross-workflow interactions. Here, we centralise our CIAM system by eliminating silos in favour of unified identity management. We bridge business properties –all its external-facing websites and brands.

We also want to integrate CIAM with other repositories of customer information, like customer relationship management (CRM), customer data platforms (CDP), master data management (MDM), and digital experience platforms (DXP). Not only does this enhance the user experience, it also enhances security through contextual information about the customer. By integrating CIAM with business-insight tools, such as fraud-management systems, you can boost the effectiveness of risk-based authentication and behavioural biometrics.

support tasks are automated, the need for manual intervention is reduced, which allows the enterprise to divert valuable labour to more strategic areas. Next comes agility and market responsiveness.

CIAM has emerged at a pivotal time, addressing the diverse demands of

today’s digital landscape. It strengthens the connection between businesses and their customers while meeting regulatory expectations, making it a vital component for success in modern B2C enterprises.

www.wso2.com

UNIFYING ACCESS. UNIVERSAL READERS FOR ANY APPLICATION.

Our truly universal readers are defined by their agnostic strategy, meaning they can support multiple technologies, frequencies and protocols. They are designed with a universal foundation that includes multi-level interfaces, open standards and supported by a robust software package, ensuring easy integration, customization and interoperability across various systems and applications. ELATEC’s universal readers set the standard, offering seamless integration, remote updates, and the flexibility to meet changing market demands.

ELATEC

Zeppelinstraße 1 82178 Puchheim

Germany elatec.com

YOUR BENEFITS AT A GLANCE

37+ years of experience

Compatible with 60+ transponder technologies

Quality made in Germany, represented at 19 locations worldwide

Remotely configurable and updatable

Compatible with a wide range of physical and mobile credentials

Certified in up to 110 countries

Partnerships with specialized providers such as HID Global, LEGIC, and NXP

MEET ELATEC AT INTERSEC DUBAI January 14-16, 2025 | Dubai, UAE German Pavilion | Booth SA-E16

OPTIMISING CCTV SYSTEM COSTS

Ahmed Hassan, PMP, LEED AP BD+C, Technical Manager in BT Applied Technology - Saudi Arabia, offers

some practical design strategies to reduce system costs while maintaining efficiency of CCTV systems

CCTV systems have become an essential component of building security. However, implementing a CCTV system can be costly. By adopting strategic design approaches, we can significantly reduce CCTV system costs without compromising efficiency. Early planning, expert involvement and strategic resource allocation are key to achieving a cost-effective and efficient security solution.

Understanding client requirements

Thoroughly understanding the client’s specific needs is paramount. Conduct indepth interviews, brainstorm ideas, and explore similar projects to gain valuable insights on requirements and objectives. This knowledge will guide your design decisions and minimise the risk of costly modifications later in the process.

Early involvement of experts

Engaging security specialists, building management teams and IT staff at the early stages of the project can significantly impact design choices. Their expertise can help optimise camera placement, lighting and fencing, reducing the overall number of cameras required without negatively impacting on surveillance.

Risk assessment and prioritisation

Conduct a thorough risk assessment to identify critical and less sensitive

areas within the building. This will enable you to allocate resources effectively, using higher-quality cameras in critical zones, such as entrances, exits and restricted zones, and more cost-effective options in lesssensitive areas. This classification of risk levels will have a great impact on overall system costs.

Camera resolution optimisation

Deploy high-resolution cameras only where they are truly necessary. In less critical areas, lower-resolution cameras can suffice, reducing costs without compromising security.

Field of view optimisation

Selecting cameras with appropriate field of view (FOV) for each location can minimise the number of cameras needed. Using FOV software can help you make informed decisions.

Leveraging IP technology

While IP cameras may have a higher upfront cost, they can ultimately reduce overall expenses. IP cameras offer benefits such as lower cabling infrastructure costs, reduced power requirements and simplified maintenance, impacting on the costs positively long-term.

Storage optimisation

Implement onboard storage (SD cards) in less critical areas to reduce reliance on

centralised storage. Additionally, utilise motion detection and video analytics to minimise unnecessary footage, saving on storage and manpower.

Video compression and recording

Employ modern video compression standards like H.265 to reduce bandwidth and storage requirements without sacrificing video quality. Consider eventbased recording to capture footage only when triggered by specific events (such as motion or object detection), further reducing storage costs.

Network infrastructure

Utilise Power over Ethernet (PoE) cameras to eliminate the need for separate power cables and minimise power equipment, such as panel boards, UPS, raceways. This reduces both material and labour costs during installation. In areas where wiring is complex or likely to be costly, wireless cameras can be a cost-effective alternative. This should be carefully balanced with knowledge of network reliability and security needed.

Standardisation and user-friendliness

Adhering to industry standards like ONVIF compliance ensures interoperability and reduces future upgrade costs. Designing user-friendly systems simplifies training and minimises operational inefficiencies.

For the most powerful, scalable video solutions –connect with IDIS at Intersec

IDIS end-to-end video solutions give systems integrators and end-users everything they need for Middle East applications, from multi-branch retail to oil and gas sites, from luxury casinos, to hospitality. With over 20 years’ proven expertise, IDIS offers an extensive video tech line-up that includes proprietary IP cameras, recorders, and VMS, providing exceptional reliability and high performance with open platform compatibility for seamless integration with other systems.

Deep learning analytics for customers of any size, scope, and scale

IDIS delivers award-winning AI solutions, not only through its proprietary technology but also via strategic partnerships with companies such as IronYun, giving customers comprehensive, gap-free solutions.

At the enterprise level, IDIS Solution Suite VMS provides leading-edge AI functionality. For mid-scale operations, a range of IDIS AI Boxes simply plug into IDIS NVRs to add instant AI-powered analytics to selected cameras. To target specific locations, the extensive range of IDIS Edge AI cameras includes 2MP domes and bullets, 4MP PTZ cameras, and 5MP AI turret models. IDIS Lightmaster NIR cameras achieve unparalleled clarity in the dark, and IDIS cameras come with weatherproofing suitable for the region’s most challenging conditions.

Smarter solutions for multi-branch retail

Over the last year, more major retailers have benefited from IDIS’s profit-boosting retail solutions, such as the NVR plug-in All-in-One AI Box for Retail (DV-1304) integrates with POS systems and devices equipped with ERP software. This delivers smarter end-to-end retail solutions that allow managers to analyse and correlate highly accurate AI-powered video data with sales and inventory information, giving them advanced insight and actionable intelligence and smarter end-to-end solutions for retail.

Industrial grade tech, tailored for Middle East applications

IDIS delivers industrial grade products tailored to the unique demands of the Middle East market, including explosion-proof and mobile solutions. Customized solutions are also developed for specific projects, including the most demanding sites where harsh conditions can occur, making IDIS the ideal partner.

Plus, the IDIS Intelligent Wall Station (IWS) makes building and deploying dynamic video walls of any type and size simple, fast, and convenient. Offering better value than alternative systems, such as matrix video wall products, it allows easy control of 8 to 16 monitors and compatibility with all IDIS products as well as seamless integration and control of third-party cameras.

14-16 January, 2025

A Leap Forward in AI Surveillance: IDIS Edge AI Camera Plus

To be unveiled at Intersec, the IDIS Edge AI Camera Plus range features a host of tools that will add efficiency to both real time surveillance operations and footage search & review. For example, powerful real time image cropping functions, IDIS A-Cut Monitoring, along with new IDLA Pro event functions, now make video surveillance more effective than ever. The new advanced functions with IDLA Pro now include crowd detection, abandoned object, removed object, fall detection and violence detection.

Face (Gender, Age, Hat, Glasses, Mask)

Bag

Colours

Vehicle (Car, Truck, Bus, Bike, Etc.)

The IDIS Edge AI Camera Plus range offers all the advantages of an intuitive, easy-to-use interface, with functions designed for convenient operation such as automatic image cropping and intuitive attribute search. Customers also have the assurance of seamless integration of all new IDIS technology with IDIS end-to-end solutions, and full compatibility with other products.

Turkiye

Watching over business: the future of retail surveillance

Dennis Choi, General Manager at IDIS Middle East & Africa, sheds light on the transformative role of video surveillance technology in the retail sector

In the ever-changing landscape of multi-branch retail in the MENA region, the need for advanced integrated video solutions has never been greater. With a focus on repeatable system design and sustainable long-term value, businesses want to leverage the latest technologies to streamline operations, enhance security and drive strategic decision-making.

The increasingly prominent role of video surveillance technology

For retail chain operators, the ultimate aim has always been to develop winning formulas that can be repeated store by store. The less variation they need, the more they benefit from economies of scale. From stock to staffing, store layouts to loss prevention, standardisation makes everything easier to manage even as businesses expand – and that drive for repeatability includes video surveillance technology.

This is doubly important because video tech enhanced by AI transcends its traditional role of deterring theft and investigating losses or safety breaches. AI intelligence now plays a pivotal role in detecting anomalies, tracking objects and accurately recognising faces. In addition to pre-empting risks and threats, AI is enhancing security and operational efficiency with improved and automated video monitoring. And it’s delivering valuable business intelligence.

This strategic evolution is fuelled by advancements in end-to-end video solutions designed for retail operations;

the sophistication of deep learning algorithms; seamless integration with retailers’ ERP and POS systems; and modular VMS with transparent and affordable pricing models.

Expanding beyond home markets

When retail chains expand across borders, opening branches in new jurisdictions or establishing their brands in new territories, it’s beneficial to have a security infrastructure that eliminates unnecessary complexity and is easily scalable regardless of each store’s location, varying sizes and layouts.

Expanding internationally has many challenges, but managing systems and infrastructure should not be among them.

For example, we are currently working with a major fashion chain across the Middle East and North Africa that’s headquartered in Türkiye. Catering to a broad demographic it retails athleisurewear, children’s clothing, plus sizes and refined and elegant outfits for professional and social settings, it also offers a clothing range that provides more coverage than many Western brands, aligning with cultural and religious dress codes while still being stylish and modern.

As a result, the company is strategically targeting growth across MENA where there is demand for chic yet conservative fashionwear. At the same time, MENA’s young populations are seeking stylish active wear as they become more invested in the importance of healthy living and

exercise, which is being driven, in part, by recent high-profile tournaments and the growing popularity of major sports in the region. Having deployed IDIS video solutions in hundreds of branches in its domestic market, this business is reaping the benefits of being able to replicate the same model in hundreds more in neighbouring countries – making its video infrastructure easier and more costeffective to install and use.

Partnerships for sustainable solutions

With the popularity of e-commerce among these young populations, video vendors and systems integrators across the region are increasingly collaborating with bricksand-mortar stores to compete with online retailers and deliver sustainable solutions that deliver a return on investment.

The focus has shifted from offering low-cost systems with high maintenance and staff training burdens to providing a low total cost of ownership (TCO). The emphasis is on supporting retailers in building and maintaining long-term growth through customer loyalty, providing a reassuring sign of physical retail’s promising future, and the importance of sustainable technology partnerships in achieving this goal.

Cost-effective and repeatable solutions

A new generation of affordable and repeatable AI-enhanced camera systems has emerged, perfectly aligned with

retail chains’ needs. These systems offer potentially limitless benefits, including enhancing security, providing valuable business intelligence, enabling multi-branch oversight, and adding and managing new stores using video management software (VMS) that comes without pricey recurring licensing fees. Moreover, retailers want a VMS platform that supports flexible management styles while ensuring uniform processes across dispersed branch networks.

Scalable and flexible VMS options

Modern video solutions make it easier to delegate security functions to local managers, reducing workloads on central loss prevention teams. This decentralised approach allows, for example, quick local retrieval of video evidence to support investigations by law enforcement agencies. At the same time it empowers head office teams to analyse store performance comprehensively and devise strategic initiatives.

Affordable and powerful video management systems (VMS) give retail chains essential functions such as centralised monitoring, easy camera management, intuitive dashboards and robust reporting tools. These types of flexible VMS provide scalability, allowing businesses to upgrade and integrate seamlessly as their needs evolve.

From loss prevention to boosting profitability

The rise of impressively accurate AIenabled video analytics has expanded the scope of video surveillance beyond loss prevention. Retailers are leveraging more powerful solutions to gain insights into customer behaviour, footfall patterns and staff performance. This data-driven approach enables businesses to focus on areas that require improvement, such as staffing levels, store layouts and customer service, and ultimately turning browsing into purchasing and building consumer loyalty and repeat visits.

Overlaying video footage with POS transaction data enables retailers to detect fraud at check-out points. This capability makes it easier to investigate and deter losses and fosters a positive

culture within the business by maintaining trust and integrity. The ability to quickly identify suspicious activities such as sweethearting through synchronised camera streams further strengthens loss prevention efforts.

The seamless integration of video data with retailers’ ERP software has also unlocked new possibilities for informed decision-making. By combining video analytics with ERP systems, retailers can gain a comprehensive view of their operations, from inventory management to order processing. This integration eliminates the need for separate software solutions and simplifies system deployment across multiple outlets.

Empowering local management

The new generation of advanced video solutions also empowers local branch managers and their teams to make informed decisions based on realtime data. By analysing sales trends, footfall patterns, and other vital metrics, managers can optimise store layouts and promotional activities to drive sales. This localised approach fosters a more flexible and responsive management style than traditional top-down directives from headquarters, allowing locally adapted marketing and sales strategies. Within the repeatability model, it will enable individual branches to be more responsive to their local clientele. This approach helps with staff retention, too, alleviating attrition by ensuring store staff feel they are making a difference in meeting the strategic goals of the broader retail operation.

And as loss prevention teams seek greater efficiency, video surveillance mobile apps have become indispensable tools. These apps enable managers and operations teams to monitor stores remotely, investigate incidents and receive AI-generated, real-time notifications and alerts. The flexibility offered by mobile apps enhances operational agility and responsiveness while reducing the need for staff to travel significant distances to stores to investigate incidents or oversee branch operations.

End-to-end solutions

The availability of all-in-one video solutions with integrated AI-powered analytics and POS and ERP connectivity has streamlined deployment and reduced complexity. Retailers can now benefit from off-the-shelf solutions seamlessly integrating with their existing infrastructure. In addition, the latest plugand-play or click-and-connect functionality allows for easy replication across multiple outlets, enabling centralised monitoring and localised decision-making.

This repeatability of one-stopshop solutions also benefits systems integrators, giving them a single point of contact for technical support and familiarity with surveillance hardware, AI devices and software configuration from a single vendor. In the Middle East and across North Africa, staff regularly work across significant geographic distances, so eliminating the need for engineers to be trained on disparate hardware, software and AI options deliver valuable cost-efficiencies. Working with an end-toend retail solutions vendor also means integrators are better able to introduce new technologies, such as new analytics features and cameras, as they look to remain competitive and evolve in an everchanging retail landscape.

Looking ahead

The evolution of video solutions in multibranch retail signifies a shift towards data-driven decision-making, operational efficiency and sustainable growth. By harnessing the power of AI-enabled video analytics and seamless integration with POS and ERP systems, retailers are finding that they can more confidently navigate the complexities of operating in multiple locations.

Integrating advanced video solutions empowers retailers to optimise operations, enhance security measures, and drive informed decision-making across their multi-branch networks. As technology continues to evolve, it will become even more integral to retail growth strategies –especially where increased accuracy and power is combined with more streamlined deployment and usability. www.idisglobal.com

Integrate Video Anywhere

Altronix has the solutions you need to integrate critical infrastructure and provide power for all your surveillance and security applications.

And our powerful LINQTM network management platform lets you remotely monitor and control all your devices from a single-pane platform.

We’ve got it all covered.

INTELLIGENT INSIGHTS

Assim Khedr, Engineering & Training Manager – Middle East at Axis Communications, explores how metadata can transform video surveillance in the Middle East

Throughout the world, entire industries and sectors are aligning their growth and transformation strategies with the extrapolation and subsequent use of data insights. In the Middle East, data is used to build entire cities and help economically critical industries pivot in response to new market dynamics and evolving customer expectations. This is illustrated by the growth of the region’s data centre market, the result of a growing demand for cloud services, the Internet of

Things (IoT) and artificial intelligence (AI) technologies.

The same is true with video surveillance, which, thanks to innovations in image quality and the application of AI and deep learning technologies, is reaping the benefits of metadata by using it to enhance security and safety enforcement, as well as increase operational efficiency.

To describe metadata as simply being data about other data does not do justice

to its impact. In the context of video surveillance, metadata describes textually what the video surveillance camera captures, including attributes associated with objects or the scene itself. The rise of edge computing and the increased processing power of surveillance devices has made it possible for surveillance devices to run advanced analytics at the edge, with the video and metadata stream then being transmitted to a video management system (VMS) or another

application either for further processing or storage.

With that understanding, how is metadata useful in video surveillance?

According to Mordor Intelligence, the Middle East and Africa video surveillance market is anticipated to be worth US$5.71bn by 2029, growing from 2024’s US$4.32bn. With the Middle East and Africa market experiencing growth driven by the advanced digital surveillance structure in the region, particularly within the Gulf Cooperation Council States, how do businesses and operators leverage this powerful tool to their benefit?

Search with speed and accuracy

Effective security and law enforcement are predicated on the ability to respond to an incident quickly. A common challenge since the advent of video surveillance

has been the ability to search through footage to find a specific moment in time or place, especially when it’s for the purpose of a post-incident investigation. In the case of a city or building site that is equipped with hundreds, if not thousands, of network video cameras, the task of searching footage can be highly laborious and time-consuming, thus pulling valuable time and resources away from the post-incident response.

Metadata enhances the search process in terms of both speed and accuracy. Instead of manually reviewing footage, operators can use simple search parameters to pinpoint specific details or actions captured on camera. These parameters can include points of time and dates, areas or points of interest, and even the speed and direction of moving objects such as vehicles, as accurate

object tracking remains one of the most important tasks for video analytics.

See more in real-time

Monitoring real-time video from multiple surveillance cameras can be a difficult task, especially when there may be resource limitations or not enough people to keep an eye on every single feed. In addressing this, operators need to find ways to augment and support the monitoring process, and metadata is one of those ways.

Using metadata, operators can automatically analyse a scene for specific details or actions, and create automatic responses or alerts for any activity the

cameras pick up. Meta descriptors can be as granular as necessary and describe attributes at varying levels, allowing for the classification of pixels as a specific person or object.

This applies to all sectors. For instance, in a retail venue like a shopping centre with multiple entrances and exit points, operators can manage foot and vehicle traffic more effectively while automatically responding to any behaviour or descriptive elements that are flagged. Another example is a construction site and ensuring that all personnel are wearing the appropriate personal protective equipment (PPE). And, in manufacturing, surveillance cameras equipped with advanced analytics can support quality control processes by enabling precise monitoring and inspection throughout the production process, even down to the finest detail of the product being made.

It is here that metadata unlocks new business value beyond its application in video surveillance. By integrating it into business intelligence (BI) platforms, access control and parking systems, and other cloud and edge-based services, operators can increase their operational efficiency, enforce health and safety, and improve the customer experience. Importantly, any use of advanced analytics and subsequent metadata must also adhere to all necessary standards and regulations, most notably regulations that govern privacy and personal information.

Heighten the ‘senses’ using data

Data is valuable, but it has the potential to become even more valuable when combined with other data. As innovations in video camera technology have made devices more intelligent, effectively turning them into sensors equipped with a lens, the data they generate can be combined with other sensors to deliver impactful results.

Combining data from multiple sensors enables operators to have greater insight and an understanding of the surveyed area beyond the ‘sight’ that a video camera provides. Using cameras enabled with rapid visual verification, operators can create alerts that are triggered when certain requirements are met, thus allowing for an immediate and rapid response. A good example of video data augmentation is to combine with audio data.

Leveraging audio devices equipped with analytics, operators can pick up distinct sounds such as a gunshot, a

person screaming, or the sound of an object breaking, and respond accordingly before even video footage of the event can be retrieved. Another example is combining readings from other devices such as operating temperatures or vibration levels.

With this information, operators can detect whether a machine is overheating or subject to sub-optimal operating conditions, which is highly consequential for industries such as public and critical infrastructure. Furthermore, all this insight can be used as part of any post-incident investigation, providing investigators with even more insight into what took place and the circumstances surrounding the incident.

Discover the bigger picture

Innovation has given way to organisations being able to gather, process and store data at the edges of their networks, specifically at the data’s point of origin. That is the case for today’s surveillance cameras where the creation of metadata takes place on the camera itself, enabling quicker reactions to real-time events while also reducing network bandwidth and storage requirements. Cameras can produce large amounts of metadata which can then be analysed and aggregated over time, leading operators to identify trends and patterns which can then be used to enhance operations based on findings.

The best example of this is using metadata from cameras in a city or urban area to analyse the flow of traffic along roads and highways. By identifying bottlenecks and high-congestion areas, even simply counting the number of vehicles, city managers can factor this information into their urban growth and spatial development plans. Taking it one step further, this metadata can be combined with data from other sensors, for instance, air quality and noise level sensors that inform managers of ongoing pollution levels, which can then be used to improve the quality of life for citizens and businesses.

What comes next

Metadata is not a trend unlike other technologies, in that it won’t just have its moment in the spotlight and then be forgotten.

Already, the next generation of dataenabled services and applications are on the way, designed to extract even more valuable insights from the data they capture, generate or process. Seamless integration will also be a crucial factor,

“Data is valuable, but it has the potential to become even more valuable when combined with other data”

one that will be taken care of by the use of open platforms and standardised VMS integration protocols. The result is a security system that is straightforward to install, maintain and scale.

Additionally, video surveillance customers have to think long-term when it comes to investing in edge and data-enabled systems, with every purchase seen as a platform for future use cases and value. As the role of AI and data in video surveillance continues to grow, cameras grow their potential to become change enablers and a critical component of any growth and transformation strategy.

The Middle East is already benefitting from the data revolution, but what will distinguish the region in terms of its adoption of technology will be how intelligent systems contribute to its urban and socioeconomic growth and prosperity, aided by a growing ecosystem of trusted manufacturers, vendors and developers. By taking a closer look at what the camera sees and transforming that information into actionable insights, we can rethink the role of video surveillance in the digital age. axis.com

RADAR, PERIMETER PROTECTION AND INTELLIGENT SURVEILLANCE: A COMPREHENSIVE APPROACH TO AIRPORT EXTERNAL SECURITY

Airports are among the most complex and sensitive environments in the world. Their vast perimeters, unceasing passenger traffic and critical infrastructure make them prime targets for security threats. Ensuring security while maintaining smooth operations is a challenge that demands cutting-edge technology and strategic planning.

The role of radar systems in airport security

Radar systems are indispensable for robust airport security. Covering extensive areas that traditional surveillance methods cannot, radar provides 24/7 monitoring, even under poor visibility or severe weather conditions. These systems detect and track movement in real-time, offering early alerts for potential security breaches. Whether monitoring runways or external perimeters, radar delivers a reliable layer of protection that strengthens the overall security framework.

A standout feature of radar is its added value in coverage. Radar extends protection over significantly broader areas and stands out for its reduced

false alarms compared to traditional security approaches. Integrated software automates its functionality, taking control of all connected cameras. The software ensures cameras are directed precisely when needed, enhancing overall efficiency and accuracy in identifying and responding to potential threats.

Security cameras as a line of defence

Security cameras remain an important component of airport protection, but their role is redefined when paired with radar systems. Radar’s automated software facilitates seamless instructions to connected cameras, ensuring that high-end security cameras selected for the system receive precise, actionable data on where to focus their monitoring efforts.

This synergy between radar and cameras eliminates redundancies while significantly improving efficiency. Rather than placing the responsibility on the cameras to detect and analyse threats autonomously, radar takes the lead, enhancing the functionality and precision of the entire security system.

Balancing security with operational efficiency

While safety remains the top priority, airports must ensure that security measures do not disrupt daily operations. By implementing radar systems alongside carefully selected cameras, airports can minimise the risk of operational interference. When implemented by experts who are fully compliant with international flight safety standards, it ensures that the security systems integrate seamlessly within the broader operational framework of an airport without compromising other critical safety systems.

Progress Security Systems’ trusted expertise

With years of experience delivering high-end security solutions, Progress Security Systems has established itself as the trusted integrator for expertly designed airport security systems. The company specialises in providing seamless, fully integrated solutions tailored to the unique needs of each facility.

Its trusted reputation and proven reliability have led to significant global achievements, including its recent agreement with two airports in Senegal. By leveraging its industry expertise, Progress Security Systems is deploying advanced radar and perimeter surveillance solutions to enhance the airport’s defences significantly. This project highlights their ability to design and implement security frameworks that align with international standards while ensuring operational efficiency.

Progress Security Systems’ expertise ensures that every solution is carefully crafted to provide unparalleled airport protection, cementing its status as a global leader in the field.

Strengthen your airport’s defences with Progress Security Systems. With proven expertise, we can help you enhance safety, optimise operations and meet the highest international airport protection standard criteria. Reach out to the experts at Progress Security Systems to begin your journey!

THE FUTURE IS SECURE

The security landscape is ever-evolving, and the coming years promise a mix of challenges and opportunities. As we delve into the future, several key trends are emerging that will shape the way organisations approach security. From the impact of AI to the rise of new regulations, staying ahead of the curve is crucial. Read on to hear from leading experts about what they predict for the coming years and the implications for the security industry.

CISOS ENJOY A TENTATIVE “PHEW” MOMENT OVER THE AI THREAT

“Some industries have undoubtedly benefitted from AI. But outside of these specific use cases, even the benefits of the GenAI technologies that made such headlines in the previous two years are now being seen in some quarters as overblown. In 2025, expect to see businesses return to more proven narrow-AI use cases to restore predictability to the ROI of AI projects. Automation and the upskilling of business functions are likely to be among the most common implementations. In parallel, we can expect threat actors, in an attempt to minimise their costs, return to using narrow AI to soften entry barriers. The fear of generative AI catalysing a volume explosion in targeted, bespoke attacks is therefore unfounded.”

INCREASED FOCUS ON DATA PRIVACY AND COMPLIANCE

“With regulations like GDPR and CCPA gaining traction, organisations are under heightened pressure to protect sensitive data. This growing focus on data privacy is exemplified by a significant enforcement action taken in May 2023, when Ireland’s Data Protection Commission fined Meta €1.2 billion ($1.3 billion) for unlawfully transferring personal data from the European Union to the US. This case illustrates the severe financial repercussions organisations can face when failing to adhere to data protection laws.”

FAREWELL WINDOWS 10

“October 2025 will see end-of-life (EoL) announcements for Microsoft Windows 10. Only the most recent machines — those that have both Secure Boot and TPM (trusted platform module) will be eligible for Windows 11 upgrades, meaning everyone else will lose access to updates, including security patches. If this sounds like a recipe for vulnerability that is because it is. Expect to see a fire sale of obsolete PCs in the second half of 2025. The forced obsolescence will be good news for the hardware market, however, especially ARM, which will likely see a volume shift to its mobilefriendly processors. Alternative OSes like Linux and Ubuntu will also benefit from organisations trying to minimise replacement costs.”

SHIFT FROM CLOUD SERVICES TO ON-PREMISES SOLUTIONS

“As organisations reassess their data security strategies, many are moving from cloud services to on-premises solutions to maintain greater control over their data and mitigate risks associated with cloud vulnerabilities. This trend has gained momentum following high-profile breaches like the MOVEit cyberattacks in 2023, where weaknesses in cloud infrastructure were exploited, leading to widespread data exposure. By transitioning to on-premises systems, organisations aim to enhance their security posture, reduce reliance on third-party providers, and better align with compliance requirements.”

GROWING PROMINENCE OF DATA SECURITY

“As AI becomes embedded in more sensitive aspects of business operations, data security will become increasingly paramount. Expanding AI usage requires robust, secure solutions, which will drive demand for startups and consultancies specialising in AI security to help organisations safeguard against data breaches and comply with privacy regulations.

“Prioritising stringent data security protocols is crucial not only for stakeholder confidence but also for meeting evolving regulatory standards. By embedding security into AI strategies, companies can protect valuable data assets while safely scaling their AI capabilities across various functions. Focusing on data security will help organisations manage risks, ensuring trust and compliance as AI continues to reshape operations.”

CYBER

RISK QUANTIFICATION (CRQ) WILL BE A CORE ORGANISATIONAL PRACTICE FOR MOST CISOS IN THE NEXT FIVE YEARS

“Measuring risk is a core capability, not a product. As cybersecurity maturity grows, the integration of financial metrics with technical security data will become critical. The industry calls this ‘cyber-risk quantification’ (CRQ), but I call it cybersecurity risk management. You can’t extract quantitative measurement from the broader domain of cybersecurity risk management — they are one and the same. The good news is that the majority of CISOs will have CRQ capabilities in 2025 — in part or wholly integrated into their cybersecurity risk management programmes.”

“Clear, measurable communication will be essential, allowing CISOs to translate complex security strategies”

Giordano (Gio)

vertiv.com

THE RELATIONSHIP BETWEEN CISOS, THE C-SUITE, AND BOARDS WILL EVOLVE TOWARD MORE STRATEGIC COLLABORATION

“The CISO that focuses on economic and operational efficiency will be fast friends with business focused leaders. The modern CISO will see risk management as minimising business impact without breaking the bank. It’s that simple in theory. In practice, the CISO must do this in a structured manner that is explainable to business stakeholders and executable by operators, which goes back to measurement as a career skill and core security capability. Clear, measurable communication will be essential, allowing CISOs to translate complex security strategies into actionable insights for business leaders. In short, our relationship with business folks who are focused on winning will be improved to the extent we adopt the right concepts, objects and methods of measurement. This approach will foster stronger partnerships with the C-suite, enhancing decision-making and driving business outcomes, while managing cyber risk effectively.”

INDUSTRY EFFORTS TO SUPPORT, ENABLE, LEVERAGE AND REGULATE AI IN DATA CENTRES

“Our experts correctly identified the proliferation of AI and the need to transition to more complex liquid- and air-cooling strategies as a trend for 2024, and activity on that front is expected to further accelerate and evolve in 2025.

“With AI driving rack densities into three- and four-digit kWs, the need for advanced and scalable solutions to power and cool those racks, minimise their environmental footprint, and empower these emerging AI factories has never been higher. We anticipate significant progress on that front in 2025, and our customers demand it.”

BROADENING THE TALENT POOL

“The lack of qualified professionals is largely due to how quickly the cybersecurity industry and cyber threats have evolved. One way around this is to broaden the candidate pool to bring junior candidates into the fold and grow them with on-the-job training. This can include candidates who might not have the specialised skills required but come with analytical potential, problem-solving skills, and technical promise. By also providing proper training to existing employees, organisations can empower them with career mobility and to become the first line of defence against potential threats.

“In addition, AI and machine learning can work as a force multiplier for smaller security teams, which gives organisations a better chance against the newest strains of malware. This is not meant to replace valuable and scarce expertise, but rather augment it by using AI to support overtaxed security analysts and enabling security teams to focus their attention on higher-value tasks.”

for Middle East & Africa, DXC Technology dxc.com

Secure Systems Research Center, TII

THE GENZERO APPROACH

“Integrating generative AI and large language models (LLMs) within Zero Trust autonomous systems is imperative for advancing secure and efficient management of complex robotic networks. By embedding these technologies into a command-andcontrol centre, we can oversee hundreds of diverse robots – including UxVs, bipeds, quadrupeds, robot cameras, human first responders and robot communicators – through Zero Trust secure communication shields across networks like Wi-Fi, LTE, LoRa, and software-defined radios.

“Generative AI enhances predictive maintenance and intrusion prevention via sensor fusion within robots and collective fusion between them, ensuring operational integrity. This approach, which we call GENZERO, is pivotal for creating a secure, reliable, and effective autonomous ecosystem that we can trust to perform critical tasks.”

EVOLVING CYBER ATTACK TACTICS

3D LIDAR TECHNOLOGY TO CAUSE A PARADIGM SHIFT IN PERIMETER SECURITY

“To date, LiDAR has often focused on 2D applications within the physical security ecosystem, notably to create simple virtual fences. But if forecasts are correct, it will be innovation in 3D surveillance that will drive demand and growth. These ‘volumetric detection systems’ challenge the concept of traditional perimeter intrusion detection systems (PIDS) by moving to a more holistic and actionable approach of monitoring and securing entire areas, not just boundaries. The use of LiDAR goes further, introducing the powerful concept of a true digital twin – a digital representation of the real world.”

“Cyber attackers will continue to adapt their tactics in response to evolving security defences. For years, exploiting publicly exposed services like web applications was the primary method of gaining access to internal networks. As software quality improved, and cloud-hosted services segregated sensitive data, attackers turned to social engineering. When two-factor authentication became widespread, phishing attacks lost their effectiveness. The shift to remote work during the COVID-19 pandemic further pushed attackers to target remote access technologies like firewalls and VPN gateways.

“In 2024, we saw a rise in the exploitation of zero-day vulnerabilities, and if vendors don’t improve the quality of their code, 2025 could see a surge of such attacks. On the other hand, if vendors strengthen their defences, attackers will inevitably pivot to new targets – with SaaS providers being the most likely next focus.”

Nicolas Blixell Vice President and Head of Gulf Cooperation Council Countries, Ericsson Middle East and Africa ericsson.com

Andreas Conrad VP of Marketing, Physical Security for Hexagon’s Safety, Infrastructure & Geospatial division hexagon.com

Ziad Nasr General Manager, Acronis Middle East acronis.com

GCC COUNTRIES TO HAVE HIGHEST 5G PENETRATION IN 2030

“The November 2024 Ericsson Mobility Report highlights the pivotal role of 5G Standalone and 5G Advanced in the future of mobile networks, particularly in regions like the GCC, where high mobile penetration and rapid urbanisation are driving demand for advanced connectivity. These technologies are set to enable capabilities such as programmable networks and AI connectivity-driven use cases, creating new opportunities for growth and innovation. As service providers in the GCC and beyond adopt these advancements, they will unlock the full potential of 5G, driving digital transformation and enhancing the way industries and consumers engage with technology.”

LED illuminators that go to the EXTREME for your safety and security

Offers up to 500m (1640 ft) of infra-red and white-light illumination powered by PLATINUM Elite SMT LED technology for peak performance and reliability.

Boasts IP67 and IK09 ratings, operates in temperatures from -50°C to +75°C, and offers enhanced protection against salinity, humidity, and vibration.

Angle of illumination from 10° - 120° can be easily adjusted by changing the VARIO2 holographic lens insert to match the specific camera field.

www.raytecled.com

ICT offers a unified solution for access control, intrusion detection, and building automation - from small business to large-scale enterprise projects with complex requirements.

With native support for mobile credentials, and integrations with VMS, lifts, wireless locks, PSIM, and more, Protege platforms provide your customers with a flexible and secure solution that will also help grow your business.

Contact the ICT Dubai office for more information.

Beyond the Stereotype

Betania Allo, a cyber law and policy expert, explores breaking down barriers in the Middle East to embrace a diverse security workforce

In tech and security, authenticity often feels like rebellion. My journey through these industries has been shaped by the challenge of being ‘the first’ in many spaces — a Latina, a woman, a foreigner in mostly male-dominated rooms. It is a journey that took me from founding a feminist book club during the pandemic to working in Saudi Arabia on projects that were as groundbreaking as they were contentious. Each step reinforced a lesson: progress requires engagement, not retreat.

The security industry, like many others, has long resisted change. Traditionally

seen as hierarchical and exclusive, it is now at a crossroads. Rapid technological advancements, globalised threats and shifting societal expectations demand a more inclusive workforce. In the Middle East, this transformation aligns with the region’s ambitious initiatives like Vision 2030, where innovation and diversity are not just aspirations — they’re necessities.

Why Diversity in Security Matters

Security is about safeguarding the unpredictable, and diverse teams are uniquely equipped to do so. Research from McKinsey shows that companies

with ethnically diverse leadership are 35% more likely to outperform their peers. The reason is simple: diverse teams bring varied perspectives, enabling them to approach problems creatively and adapt more effectively.

In the Middle East, where rapid modernisation meets deeply rooted traditions, a diverse workforce offers the ability to navigate these complexities with nuance. Diversity enhances trust — a critical factor in security. A team that mirrors the populations it protects is better positioned to address their needs with sensitivity and precision.

“Companies with ethnically diverse leadership are 35% more likely to outperform their peers”

During my time in Saudi Arabia, I saw firsthand how diverse voices could reshape the security landscape. Despite systemic challenges, the inclusion of women, and especially foreigners, led to solutions that were not only innovative but deeply impactful. Leaders who valued different perspectives achieved breakthroughs that traditional approaches had overlooked.

Overcoming Barriers to Inclusion

Change, however, does not come easily. The security industry is still plagued by unconscious bias, workplace harassment and structural barriers that limit access and progression for many. In the Middle East, these challenges often intersect with cultural norms, creating additional layers of complexity.

I have felt these barriers acutely. As a foreign woman, my presence in certain rooms was often questioned — not for my expertise, but for the audacity of being there at all. Yet, I also found allies among leaders willing to invest in my voice and ideas. These moments of support proved that even in traditionally exclusive spaces, there is room for change when people commit to seeing beyond stereotypes.

Addressing these barriers starts with recognition. Organisations must implement unconscious bias training, not as a box-ticking exercise but as a genuine effort to challenge ingrained perceptions. Hiring practices must evolve to prioritise fairness, such as through blind resume reviews and standardised interviews. Safe and supportive workplaces are equally essential. Policies against harassment and discrimination need to be backed by clear accountability mechanisms. Employees must trust that when they report issues, action will follow. I have seen retaliation myself. Beyond this, organisations need to actively remove barriers to entry. Many talented individuals, particularly women and minorities, are excluded simply because they lack access to networks or

opportunities. I always felt the pressure to get fancy degrees to objectively prove myself and be taken seriously. And I have faced awkward situations in all continents, just for being a woman trying to get a job I am qualified for.

Building an Inclusive Culture

Diversity is only the first step; inclusion is what sustains it. A truly inclusive culture ensures that every individual feels valued and empowered to contribute.

This begins with leadership. Inclusive leaders model behaviours that encourage collaboration and amplify underrepresented voices. During my time in Saudi Arabia, I worked with leaders who prioritised my contributions despite my outsider status. Their support created opportunities I never imagined — such as speaking at global conferences and leading critical discussions on cybersecurity.

Inclusive practices must also be embedded into company systems. Transparent pay structures, equitable promotion policies and regular diversity audits ensure fairness. Diversity training should go beyond awareness, equipping teams with tools to create inclusive environments tailored to the region’s unique cultural dynamics.

Finally, fostering openness is essential. Employees need spaces to share experiences and provide feedback without fear. During the pandemic, I created a feminist book club to explore systemic issues and solutions in a supportive setting. That same spirit of open dialogue can — and should — be cultivated within workplaces.

Lessons from My Journey

Living and working at the United Nations and then in the Middle East offered me a front-row seat to the complexities of fostering diversity in security. Criticism came from all sides — some questioned my presence in the region, while others viewed my work through the lens of

stereotypes about women. But I believed, and still believe, that being in the room matters.

There were moments of heartbreak and frustration, but also triumphs that reaffirmed the power of persistence. I learned that revolutions in maledominated fields are not waged from the sidelines. They require showing up, challenging norms and daring to envision something better.

One particularly challenging project, earlier in my career, involved integrating gender perspectives into a 99% maledominated workplace. The resistance was palpable, but by engaging with allies and staying focused, we achieved outcomes that surprised even the sceptics. In one year we increased female employees from 1% to 5%. These experiences taught me that progress often happens incrementally, built through engagement rather than retreat.

Let’s Build It Together!

The Middle East is undergoing a transformation, and the security industry must evolve with it. Diversity and inclusion are not optional — they are strategic imperatives for organisations aiming to thrive in a rapidly changing world.

For leaders, this means going beyond rhetoric. Set measurable goals for diversity, invest in mentorship and training, and hold yourself accountable for creating inclusive spaces. For employees, it means recognising the value of your unique perspectives and pushing for systemic change where it’s needed.

The revolution won’t happen overnight, but it will happen. It will be built by individuals and organisations willing to challenge norms, embrace discomfort and lead with vision.

As someone who has lived this journey, I can attest: the future of security depends on our willingness to engage, to persist and to reimagine what’s possible. Yallah!

www.betaniaallo.com

Intertech Vision ME: 25 Years of Pioneering Control Room Solutions

For 25 years, Intertech Vision ME has been at the forefront of control room innovation, redefining how organisations across the Middle East manage critical operations. From our humble beginnings in 1999 to becoming a trusted name in control room technology in the region, our journey is a testament to our relentless pursuit of excellence, innovation and collaboration.

A legacy of excellence

Founded in the UAE, Intertech Vision ME began with a vision to transform how mission-critical environments operate. Under the leadership of our CEO and founder, Khaled Noeman Ramadan, the company has grown from a regional pioneer to an industry leader. With his visionary approach and commitment to innovation, the company has been steered through two decades of growth, ensuring we remain at the forefront of control room solutions.

Our journey has been driven by innovation and an unwavering commitment to quality. Whether it’s enhancing operational efficiency, improving situational awareness, or streamlining workflows, our solutions have consistently pushed boundaries and set new standards.

Technology partnerships that drive innovation

Our success wouldn’t be possible without our incredible technology partners. Collaborations with companies like Barco, ISD, and Antrica have played a pivotal role in enabling us to offer cutting-edge solutions tailored to our clients’ needs.

• Barco: A global leader in visualisation technology, Barco has been an integral partner in delivering advanced videowall solutions. Its TruePix LED video walls and Barco CTRL platforms are transforming how control rooms display and manage critical information.

• ISD: Our software partner, ISD, brings groundbreaking innovations like RAMsys, a comprehensive situational management suite designed for security and operational excellence. With RAMsys Sentrl, Cntrl, View+ and Mobile, ISD is empowering control rooms to operate smarter and faster.

• Antrica: Known for its highperformance video encoders and decoders, Antrica enables seamless video streaming and communication, critical for modern control room operations.

These partnerships have allowed us to stay ahead of the curve, integrating the latest technologies into our solutions and offering unparalleled value to our clients.

A year of milestones

As we celebrate 25 years, 2024 has been a particularly remarkable year for us. This year alone, we’ve launched groundbreaking solutions like DNA, a compact display management device, and ITVision, a versatile all-in-one LED display. These innovations, along with the development of OTG (Ops Tech Gear), have set a new benchmark for flexibility and adaptability in mission-critical environments.

We also received recognition from key partners and industry leaders, underscoring our impact on the control room solutions landscape. Each milestone achieved reflects the dedication of our team and the trust of our clients.

The road ahead

While we’re proud of how far we’ve come, we’re equally excited about the future. The next generation of control room solutions will demand even greater levels of integration, intelligence and innovation. With advancements in AI, data analytics and collaborative technologies, we’re ready to shape what’s next.

Our focus remains on delivering solutions that are not only technologically advanced but also tailored to the unique needs of our clients. By working closely with partners like Barco, ISD and Antrica, we’ll continue to innovate and provide the tools organisations need to thrive in complex, dynamic environments.

A heartfelt thank you

Our success over the past 25 years wouldn’t have been possible without the support of our clients, partners and team members. Guided by Khaled Ramadan, we’re committed to innovation and excellence, shaping the future of control rooms. Here’s to the next 25 years of collaboration and success! itv-me.com

No Limits Integration Exclusivity Elegance

Klass is a new super stylish video intercom completely interoperable with third parties’ systems.

An elegant and precious device with ultra-slim design, tempered glass finished, perfect for high-end applications.

Klass is available with our exclusive IPure technology, supporting main protocols for limitless integration with third parties.

ITALIAN EXCLUSIVE DESIGN AND PRODUCTION

Up to 64 IP video streams and PiP feature with camera switching

Built-in chronothermostat for temperature control

Built-in sensors for integration with third parties’ systems and automation without limits

Remote control via app for maximum comfort & security

Optional Wi-Fi dongle

Apu Pavithran, CEO and Founder, Hexnode, explores why the Middle East can’t afford to ignore zero trust

Cyber threats are undoubtedly evolving throughout the world. Their frequency, sophistication and risk are forcing nations around the world to intensify their security architectures. In the Middle East, where digital transformation is progressing rapidly, the need for robust, proactive cybersecurity frameworks is more pressing than ever.

The double-edged sword of digital growth

The Middle East stands at a fascinating crossroads. On one side, the region’s leap into the digital age is creating a more connected and technologicallydriven society. But with this newfound connectivity comes an ever-expanding attack surface. Every digital connection — whether it’s a remote employee accessing corporate servers or the IoT devices used in oil rigs and smart cities — presents a potential entry point for cyber threats.

One of the biggest risks of this is how it dismantles the traditional network perimeter. In the past, data was primarily stored on-premises within secured corporate networks, protected by firewalls and access controls that assumed anyone inside the perimeter could be trusted. Today, that model is hopelessly outdated. The digital perimeter is now non-existent, with users, devices and applications located across various locations and networks. This new, boundaryless environment opens the door to threats that can bypass outdated security systems and exploit the least protected assets. It’s no wonder, then, that the Middle East faces around 50,000 cyberattacks daily, according to Mohammed Al Kuwaiti, Head of Cybersecurity for the UAE government, speaking at this year’s G[P] RC Summit in Dubai.

The region also faces challenges in balancing digital sovereignty with data protection. As regional leaders push to

maintain control over their citizens’ data and protect it from foreign influence, the stakes for data security grow even higher. Citizens and businesses alike are more aware than ever of their digital footprints, demanding privacy and accountability in how their information is handled. For organisations, the implications of data breaches are not just about financial loss but also about losing public trust and credibility. To navigate these complexities, the Middle East needs a cybersecurity approach that can keep up with the speed and sophistication of the digital world.

Why zero trust is the key to lasting cyber resilience

Zero trust is not just another cybersecurity strategy; it’s a fundamental shift in how organisations think about security. Instead of assuming that entities inside the network can be trusted, zero trust operates on the assumption that every interaction, whether internal or external, is potentially malicious.

The appeal of zero trust, however, goes beyond the theoretical. If a cyber adversary manages to breach a system, zero trust ensures they encounter walls at every turn, limiting the damage they can cause. This is invaluable in an environment where even a small security breach can have far-reaching consequences.

Zero trust also supports the Middle East’s ambition to strengthen digital sovereignty. As governments and businesses process more sensitive data, zero trust helps organisations keep a tight grip on access to that data. This control is essential not only for regulatory compliance but also for upholding public trust in an era where citizens are increasingly aware of their digital rights.

However, implementing zero trust in the Middle East is not without its challenges. Despite more than 70% of

organisations having adopted a zero trust strategy (Entrust’s 2024 State of Zero Trust & Encryption Study), many still face obstacles in practically realising it. In a region where digital transformation is happening at breakneck speed, these obstacles can slow down progress and create vulnerabilities in an otherwise strong defence strategy.

How to get it done right –a roadmap for zero trust

The first step should always be to understand and classify organisational assets. Not all data is created equal, and for zero trust to be effective, organisations need to know what they’re protecting. By categorising data based on sensitivity, they can apply tailored security controls that protect the most critical assets without overburdening the system. For instance, an energy company in the Gulf may prioritise protecting its operational technology (OT) systems, while a financial institution might focus on securing customer financial records.

Once we’ve mapped out and categorised the assets, it’s time to focus on one of the core pillars of zero trust – identity. In a landscape where remote work, third-party collaborations and hybrid environments are the norm, verifying every identity seeking access is critical. A combination of a Zero Trust Network Access (ZTNA) solution and an Identity and Access Management (IAM) solution gets the job done here. By incorporating multifactor authentication and single-sign-on, IAM verifies that users are who they say they are and limits exposure to sensitive data. With ZTNA, even users within a corporate network are granted only as much access as their role requires, reducing the risk of lateral movement if a user’s credentials are compromised.

Securing endpoints

Once you’ve tackled identity, the next focus should be endpoints. A comprehensive Unified Endpoint Management (UEM) solution helps IT administrators to centralise management of the diverse endpoint ecosystem. Furthermore, deploying an Endpoint Detection and Response (EDR) solution is also a wise move. EDR’s role in zero trust is proactive: it doesn’t assume that any endpoint can be trusted. Instead,

“Despite more than 70% of organisations having adopted a zero trust strategy, many still face obstacles in practically realising it.”

it constantly analyses activity to detect anomalies, isolate potential threats and mitigate them before they spread.

Another core pillar of zero trust is network segmentation. By breaking down networks into smaller, isolated segments, organisations can contain threats within specific areas, preventing them from spreading. This is particularly relevant in hybrid environments, where companies are juggling both on-premises and cloud resources. For a smart city in the UAE, for example, segmentation could mean isolating public WiFi networks from systems controlling traffic lights or energy grids, reducing the risk of cross-network vulnerabilities.

Finally, zero trust must align with compliance requirements. As regulations in the Middle East evolve to protect data privacy and sovereignty, organisations

should integrate compliance into their zero trust frameworks. This means implementing data encryption, conducting regular audits and keeping detailed logs of access and activity. By aligning with compliance standards, companies can not only meet regulatory demands, but also demonstrate their commitment to data protection.

In short, zero trust is a smart way forward, protecting everything from sensitive data to critical infrastructure. But to make zero trust work, it’s more than just tech — it’s about fostering a culture of security, getting leaders on board and planning carefully. By truly embracing zero trust and executing it efficiently, Middle Eastern organisations can secure their growth, ensuring that the region’s digital future is as safe as it is innovative. www.hexnode.com

Bricks, Bytes, and Beyond

Unifying physical and digital security can take banking security from siloed to seamless, asserts Simon Whitehouse, CSyP FSyI – Divisional Director of Security Consulting at AESG

The GCC economy has entered the new year with strong tailwinds. The latest ICAEW Economic Insight report projects more than 4.4% growth for the consortium of Gulf nations over the next 12 months, a significant rise from last year’s 2.1%. The report highlights that bolstered by consumer confidence and private investment, the finance sector will be a key driver of the GCC’s economic diversification efforts.

While these developments signal a robust trajectory for the region’s finance sector, they also cast new securityrelated challenges into the limelight. Fuelled by growth and evolving consumer

demands, banks have adopted advanced digital solutions while expanding their physical footprint and workforce. These developments — while undeniably transformative — introduce vulnerabilities that require sophisticated safeguards. Moreover, the accelerated pace of innovation often outstrips the ability of traditional security frameworks to adapt.

The importance of integration

With digitalisation having been the industry’s mandate for over a decade, it follows logically that cybercrime takes precedence when safeguarding banking infrastructure and operations. After all,

the crippling of Iran’s central bank in August, which threw the country’s financial system into disarray, stands testament to the incredibly concerning potential for impact. But while cybercrime deservedly dominates headlines, physical security remains crucially important as well. Banks are high-value targets for terrorism and organised crime and remain susceptible to physical threats. Recent data underscores the urgency of blast-resistant infrastructure and advanced perimeter security systems that combine robust physical measures with sophisticated detection technologies. Innovations such as motion sensors,

AI-driven analytics and drone surveillance now play a crucial role in identifying and countering potential threats.

In today’s complex banking environments, the relationship between physical and digital defences is no longer linear; instead, it operates as an interconnected ecosystem where one vulnerability can expose another. For instance, a breach through a compromised security camera could enable attackers to survey physical operations, collect insider information, or even disrupt critical digital services. Or a vulnerability in an IoT device — such as weak default passwords or unpatched firmware — can serve as an entry point for cybercriminals to access sensitive banking systems.

Onset, not afterthought

The security strategies for banks must therefore evolve to integrate physical infrastructure, technological

“physical security should no longer be confined to perimeter fences or reinforced vaults”

advancements and regulatory compliance. This unified approach is pivotal in a world where risks are becoming increasingly complex and multifaceted.

Moreover, physical security should no longer be confined to perimeter fences or reinforced vaults; to be truly effective in the modern context, the approach must be to embed protection into the very fabric of a facility’s design. If measures such as blast-resistant glazing, discreet hostile vehicle mitigation and access control systems are considered right at the onset, they can be thoughtfully integrated into architectural concepts.

This is critical as while they may be high-risk targets, banks first and foremost are service providers. And in an increasingly competitive environment, they can easily face customer and employee attrition if processes – even those implemented in the best interests of both groups – become too cumbersome. Physical security requires striking the balance between being functional while also being non-disruptive – an outcome that’s difficult to achieve, but certainly easier when considered from the onset.

This approach aligns with evolving regulatory standards. Frameworks like ISO 27001 and the EU’s Digital Operational Resilience Act (DORA) provide the foundation for a security-first ethos, ensuring that banking environments are robust enough to meet modern challenges. By uniting compliance and design, the banking sector can achieve operational resilience while safeguarding its most valuable assets: people, data and reputation.

We are already seeing leading banks in the region making commendable strides in the right direction. One such example is a large banking institution in Abu Dhabi; by designing and implementing security solutions at its HQ level, the organisation enhanced operational resilience, ensuring a secure environment for both employees and customers. Moreover, its dual redundancy control rooms, capable of maintaining functionality during

disruptions, not only stand out as a feature of innovation, but a necessity in a world demanding continuity despite risk.

Security’s beating heart

At the heart of this evolution lies the Security Operations Centre (SOC). Far from being a simple monitoring hub, the SOC of today must synthesise physical surveillance with cyber intelligence, enabling real-time responses to dynamic threats. By combining data from CCTV, IoT devices, access control systems and digital threat intelligence, banks can anticipate and mitigate threats with an unprecedented level of precision and speed.

Advancing security through CPD

The journey toward fortified security is not static; it is an ongoing commitment to professional development, innovation and adaptation. Banking security professionals must continually engage with the latest standards, methodologies and technologies. The role of continuous professional development (CPD) in this process cannot be overstated, providing an avenue for deepening expertise, sharing best practices and fostering collaboration. Security master planning, risk assessment methodologies and the integration of cutting-edge technologies are among the many areas ripe for CPD exploration. By remaining informed and connected, professionals not only enhance their individual practice but also elevate the collective capacity of the banking sector to withstand emerging threats.

The future of banking security

The future of counterterrorism and security management in the banking sector lies in dynamic, integrated approaches that anticipate risk rather than simply react to it. It is a future where technology and design converge, and where security – be it physical or digital – is deeply integrated and woven into the operational DNA of institutions. aesg.com

Top physical security trends for 2025

Genetec’s Firas Jadalla reveals what he thinks will be the most pressing concerns for physical security in the next year

In 2025, the physical security industry will focus on maximising existing investments to enhance security, improve efficiency and foster collaboration between teams. Although excitement about deploying emerging technologies such as artificial intelligence (AI) remains significant, sustainable investments in governance, risk management and compliance will take precedence.

1. Hybrid-cloud adoption will gain traction

As organisations become more strategic in how they approach and implement cloud solutions in their environment, decisionmakers will prioritise hybrid systems. They’ll look for the best ways to centrally monitor remote sites from an on-premises head-end system and reduce on-site maintenance work with lightweight,

quick-deploy hybrid cloud systems. They’ll want to modernise their video or access control systems without scrapping their existing tech investments. Those with deployments fully in the cloud may also want to optimise data processing and storage costs or facilitate broader third-party integrations using on-premises infrastructure.

Software-as-a-Service (SaaS) solutions that are open, unified and support hybrid-cloud environments will offer the most flexible path forward. Beyond adopting flexible deployment models, organisations will be able to combine video, access control, intrusion, intercom and other sensors from a variety of manufacturers. They can also connect existing infrastructure so that they become available via the cloud and install new devices at their own pace.

Cloud-managed appliances will be key for organisations who want to bring their existing hardware to the cloud. They’ll save time on deploying systems and save on the costs of changing non-compatible cameras or access control hardware –making the transition to the cloud easier.

2. AI adoption will balance innovation with responsible usage

Although nearly half of security decisionmakers (42%) are interested in AI-driven solutions, concerns around privacy, ethics and the potential for biased data remain prominent. In response, businesses are placing greater emphasis on adopting AI responsibly, and seeking partners that prioritise ethical AI development and provide transparent governance practices. The 2025 State of Physical Security Report

“As cybersecurity threats and regulatory requirements grow, compliance has become a primary concern for security leaders”

shows that while AI’s potential to improve operational efficiency and accelerate data analysis is widely acknowledged, organisations are also implementing AI governance protocols to ensure that it’s used safely and responsibly.

Responsible AI practices include monitoring for bias, ensuring data integrity and complying with relevant data privacy regulations. AI-based security analytics, for example, can streamline video searches, enhance situational awareness, and improve response times, but organisations are demanding that these tools operate with transparency and prioritise data protection. Vendors that commit to responsible AI practices will have a significant advantage as businesses seek partnerships with ethical, trustworthy AI providers.

3. Organisations will prioritise regulation compliance

As cybersecurity threats and regulatory requirements grow, compliance has become a primary concern for security leaders. According to recent data, the cost of a data breach reached a record high in 2024, underscoring the need for robust compliance measures. Key

regulations like GDPR, NIS2 and HIPAA are shaping how organisations approach data protection, especially as more security systems rely on interconnected networks and cloud storage.

In 2025, organisations will focus on strengthening cyber hygiene practices, improving data encryption, and aligning with international and industry-specific regulatory requirements. This commitment extends to partnering with vendors who have the technical knowledge and resources to ensure compliance across various security systems. Organisations subject to stringent regulations aren’t only prioritising data protection but also investing in compliance-focused solutions to avoid penalties and protect their reputations.

4. Cross-departmental collaboration will enhance security operations

As staffing shortages and budget constraints persist, collaboration between security, IT, facilities and human resources departments will become essential for effective security management. Organisations will implement workforce optimisation tools that empower team

members across departments to take a more active role in security tasks, streamline workflows and eliminate bottlenecks.

Digital evidence management tools simplify the process of collecting, managing, reviewing and collaborating on investigations, while work management software centralises information to enhance communication through work dispatching, resource management and reporting and auditing. By equipping departments with greater information and autonomy, organisations can further reduce stress for security teams and improve operational efficiency. With these solutions, team members – regardless of their role or location – can take greater initiative in completing tasks, boosting productivity and overall organisational output.

5.

Stakeholders will demand more from service providers

Choosing physical security solutions is no longer solely the responsibility of security professionals. IT teams, SecOps and facilities teams are increasingly involved in decision-making processes.

Each group brings its own challenges, requirements and priorities:

• Security professionals focus on streamlining response and investigative tasks.

• IT teams emphasise data and network protection and maintenance efficiency.

• SecOps teams prioritise cybersecurity, process automation and data optimisation.

• Facilities teams and other stakeholders seek simplified operations and actionable business insights.

This shift means that end users will expect more from service providers, including channel partners, consultants and technology vendors. Providers will need to demonstrate a comprehensive understanding of cybersecurity, operational efficiency and data governance while offering cohesive guidance that addresses diverse stakeholder needs. By fostering strong partnerships, service providers can add value throughout various stages of the deployment lifecycle, strengthening security operations and the practical implementation of business intelligence. genetec.com

Hackers’ Playbook

Eric O’Neill, cybersecurity authority and former FBI counterterrorism and counterintelligence operative, unveils the common tactics used to hack us

Casey was a finance manager for a cutting-edge tech startup based in Austin, Texas. His job involved managing vendor payments, overseeing invoices and ensuring every financial detail was precise. Meanwhile, the company’s CEO, Avery, was an energetic visionary with a knack for disrupting industries. Her groundbreaking innovations frequently made headlines, elevating her to a global icon. Casey followed her closely across all social media platforms and even tuned into her weekly podcast. He couldn’t deny having a slight admiration for her.

One Friday night, Casey’s dream of direct interaction with his idol came true. A message pinged on his phone from

Avery, requesting a Zoom call. Although they’d never spoken one-on-one before, Casey assumed it made sense that she had his contact details, considering his role in the company. Excitedly, he accepted the video call, and soon, Avery’s familiar face filled his screen. Their conversation flowed smoothly. Avery enquired about his life in Chicago, commenting on her love for the local jazz scene and the energy of Navy Pier. Casey was over the moon.

Finally, Avery got to the purpose of the call: an urgent need to wire US$4.5 million to a critical supplier. Although Casey had never dealt with this particular recipient before, he didn’t hesitate — Avery herself had made the

request with that same charismatic smile. Trusting her completely, he processed the transfer.

By morning, Casey’s world turned upside down. Avery had never contacted him. Investigators later uncovered that cybercriminals had carefully studied Avery’s digital footprint, replicating her voice through advanced AI tools and creating a hyper-realistic deepfake. The attackers had closely monitored the company’s internal dynamics through professional networks like LinkedIn, identifying Casey as someone who admired the CEO. Armed with his phone number, they executed a highly convincing social engineering attack that cost the company millions.

How cybercriminals are attacking corporations

As cybercrime grows, it’s crucial for corporations to understand the evolving methods cybercriminals use. The following are some of the most effective techniques being deployed to siphon trillions from global businesses:

1. Spear phishing: Spear phishing involves highly targeted emails designed to look like they’re coming from trusted sources. Cybercriminals meticulously research their targets, personalising emails to trick employees into revealing sensitive information or initiating fraudulent transactions.

2. AI-based imposter attacks: Cybercriminals now use AI to impersonate corporate leaders, manipulating their voices and even video images to convince employees to take actions they would never otherwise consider. As AI becomes more advanced, these deepfakes will become indistinguishable from real interactions, making it difficult to detect an imposter.

3. Business email compromise (BEC): Hackers gain access to an organisation’s email system, often through phishing, and monitor communications to identify key financial transactions. At the right moment, they impersonate a trusted party and send fraudulent emails to divert payments or steal sensitive information.

Modern day threat

Casey’s experience sounds like a plot from Black Mirror, but it’s real. Worse yet, this is not a future threat — it’s happening now, every day, all around the globe. Cybercriminals are increasingly deploying sophisticated espionage tactics to breach corporations, and the tools they use are evolving faster than most businesses can react. Their goal? To steal, manipulate and vanish with billions from corporate coffers — often undetected until it’s too late. These syndicates, thriving within the Dark Web, collaborate like multinational corporations. Their targets? Not just governments, but the corporations that form the backbone of the global economy.

The cost of cybercrime is skyrocketing. The current cost of Dark Web cybercrime is over US$12 trillion annually. At its current rate of growth, it will exceed US$20 trillion annually. Measured as a national economy, cybercrime is currently the third largest on the planet, trailing only behind the US and China. But beyond the numbers, what’s more alarming is the shift in how cybercriminals operate. They no longer rely solely on brute-force attacks or hacking into poorly

4. Exploiting known vulnerabilities: Despite patches being readily available, many corporations fail to update their systems regularly, leaving the door open to cybercriminals who can exploit these known weaknesses. These vulnerabilities act as the ‘low-hanging fruit’ for cybercriminals seeking an easy way into corporate networks.

5. Failure to use effective privilege control: Many corporations fail to implement robust access controls, allowing low-level employees to have access to critical systems and data they don’t need for their job. This makes it easier for hackers to escalate privileges once they gain a foothold in the network.

6. Ransomware: Cybercriminals deploy malware that locks companies out of their data until they pay a hefty ransom, usually in cryptocurrency. This attack is devastating because it can bring entire organisations to a standstill, costing millions in lost productivity and reputational damage.

7. Supply chain attacks: Hackers target smaller, less secure vendors and contractors who provide services to large corporations. By infiltrating the supply chain, they can compromise the bigger corporation indirectly, often without the victim even realising it.

secured networks. Instead, they’ve mastered the psychological and technical sophistication of espionage to manipulate humans and systems alike.

The Dark Web: a global threat

To understand the enormity of this problem, we must grasp what the Dark Web truly is. Contrary to Hollywood depictions of lone hackers in dimly lit basements, the Dark Web is a sprawling network of anonymous, encrypted computers where cybercriminals, spies and fraudsters conduct business. They trade tools, tactics and stolen data in a marketplace more secretive than any underground economy in human history. The Dark Web is not a niche problem — it is the epicentre of modern cybercrime.

Corporations are now the primary targets of these cybercriminals. Why? Because they hold the keys to valuable intellectual property, financial assets and critical infrastructure. Sophisticated hackers have learned from espionage operatives how to deploy social engineering, identity theft and deepfakes to breach security protocols and

manipulate unsuspecting employees into opening the gates to their organisations.

Securing the corporate future

In today’s world, every corporation must operate under the assumption that it is being watched and targeted by sophisticated cybercriminals. To defend against these increasingly espionagelike tactics, organisations must prioritise cybersecurity as much as they prioritise innovation and growth.

The future of corporate security lies in embracing comprehensive strategies that go beyond simply installing firewalls and antivirus software. It involves educating employees about the dangers of social engineering, implementing AI-driven monitoring tools to detect anomalies, patching known vulnerabilities promptly, and enforcing strict access control measures.

As cybercrime expands its trilliondollar industry, corporations that fail to take these steps will find themselves defenceless against a threat that is no longer just lurking in the shadows — it’s on their doorstep, knocking loudly. www.ericoneill.net

SECURING THE PERIMETER

Ian Keller, a global information technology expert, explores identity management for physical and logical access

The convergence of physical and logical identity management is key to securing your business. The interconnected world, which is constantly evolving and consuming more and more digital and remote working options, is forcing organisations to face a significantly more complex landscape of security threats, spanning both physical and logical domains.

As the digital transformation accelerates, the need for robust, integrated identity management has become paramount. By effectively managing user identities and access privileges, organisations can significantly enhance their security posture, protect valuable assets and mitigate the risk of data breaches.

The traditional security paradigm, which is focused primarily on physical threats, is no longer sufficient in the face of modern cyberattacks. Advanced persistent threats (APTs), phishing scams and ransomware attacks pose significant risks to organisations of all sizes. The blurring of boundaries between physical and digital environments has further complicated the security landscape, making it imperative to adopt a comprehensive approach that addresses both dimensions.

It is critical to acknowledge that integrated identity management serves as the cornerstone of a robust security strategy. It encompasses the processes, technologies and policies that enable organisations to effectively manage user identities and access privileges. By centralising identity information and enforcing consistent authentication and authorisation policies, identity management solutions can significantly enhance security posture across both physical and logical domains.

Let’s explore some of the benefits of an integrated identity management platform. The first benefit is stronger physical access control. Integrating identity management with physical access control systems (PACS) can provide a more granular and secure approach to managing access to physical facilities. By linking user identities to job function and specific access rights, organisations can ensure that only authorised individuals are granted entry to sensitive areas.

“It is critical to acknowledge that integrated identity management serves as the cornerstone of a robust security strategy”

Similarly, there is enhanced logical access control. Here, identity management solutions can help organisations establish robust logical access controls, preventing unauthorised access to network resources, applications and data. With the implementation of strong authentication mechanisms and enforcing least privilege principles, organisations can mitigate the risk of data breaches and unauthorised activities.

Within our heavily regulated world this approach also gives organisations improved compliance. Many regulatory frameworks, such as GDPR and HIPAA, require organisations to implement strong identity management practices to protect sensitive personal information. By centralising identity information and enforcing consistent policies, organisations can demonstrate compliance with these regulations and avoid costly penalties.

All of these benefits culminate in an enhanced user experience. A wellimplemented identity management system can improve the user experience by providing seamless access to resources while maintaining a high level of security. Single sign-on (SSO) capabilities can reduce the burden on users by eliminating the need to remember multiple passwords, while Multi Factor Authentication (MFA) can also add an extra layer of protection against unauthorised access.

Lastly, we have the enhanced visitor experience. Visitor management, as an integrated component of both physical and logical identity management, can significantly benefit organisations and enhance the visitor experience. By centralising visitor information and

streamlining the registration process, organisations can improve efficiency and security. Visitor management systems can automatically generate badges with appropriate access levels, ensuring that visitors only have access to authorised areas. Additionally, integrating visitor management with logical access controls can provide real-time visibility into visitor activity, allowing organisations to monitor for potential security threats. This not only enhances security but also provides a more welcoming and efficient experience for visitors.

As with any operational function there are best practices for effective identity management, and I will highlight a few.

Creation of a centralised identity repository. Establish a centralised identity repository to store and manage user information consistently across the organisation. This repository should include comprehensive data such as usernames, passwords, roles, permissions as well as organisational structure data.

Implement strong authentication and authorisation policies. A strong authentication mechanism, such as Multi Factor Authentication (MFA), is needed to verify user identities before granting access. Enforce least privilege principles to ensure that users have only the minimum privileges and physical access necessary to perform their job functions.

Conduct regular access reviews to ensure that user privileges remain aligned with their current roles and responsibilities. This helps to prevent unauthorised access and mitigate the risk of insider threats.

Continuous monitoring and threat detection by utilising advanced threat detection and response tools to monitor for suspicious activity and respond promptly to security incidents. This includes monitoring for unauthorised access attempts, password breaches and other security threats.

Provide employees with training and awareness programmes to educate them about the importance of identity security and best practices for protecting their credentials. This includes teaching employees how to recognise and avoid potentially harmful situations such as leaving access cards unattended, falling victim to phishing scams, not following strong password practices and the importance of reporting any suspicious activity.

Conduct regular risk assessments to identify potential vulnerabilities in the identity management system and develop mitigation strategies. This involves evaluating the effectiveness of existing security controls and identifying areas for improvement.

The integration with other security controls. Integrate identity management with other security controls, such as the Visitor Management System, Physical Access Control Platform, firewalls, intrusion detection systems (IDS) and data loss prevention (DLP) solutions, to create a comprehensive security framework. This ensures that all aspects of the organisation’s security posture are aligned and working together effectively.

With the understanding of the best practices we must also look at what is needed to make this work, namely identity governance.

Identity governance is a critical component of a robust identity management strategy. It involves the processes, policies and technologies that ensure that users’ physical and

logical identities and access privileges are aligned with the organisation’s risk management objectives. Through the implementation of effective identity governance, organisations can: Reduce risk and ensure that only authorised individuals have access to sensitive data and systems.

Demonstrate improved compliance and adherence to regulatory requirements such as National Critical Infrastructure Regulation, PDPL, GDPR, HIPAA and others.

Enhance efficiency through streamlined identity management processes and the reduction of administrative overheads. Improve user experience by providing a seamless and secure access experience for all users.

Identity governance requires a few key elements to make it deliver on its promises. Only one team must be allowed to effect changes to the Identity Governance Framework. This team is responsible for the following aspects:

Risk assessment: Conducting regular risk assessments to identify any potential vulnerabilities and prioritise mitigation efforts.

Policy development: Development and implementation of clear policies and procedures for identity management, including access provisioning, deprovisioning and certification.

Role-based access control (RBAC): Implementation of RBAC to assign access privileges based on a user’s role or function within the organisation.

Access certification: Regularly review and certify user access privileges to ensure that they remain aligned with their current job responsibilities.

Separation of duties: Implement separation of duties principles to prevent unauthorised creation or modification of access and to mitigate the risk of compromise.

Continuous monitoring: Monitor for suspicious activity and respond promptly to security incidents.

Audit and reporting: Maintain audit trails and generate reports to track identity management activities and compliance with policies.

In today’s complex and evolving threat landscape, effective identity management is essential for protecting organisations from both physical and logical security threats. By implementing robust identity management practices, organisations can enhance their security posture, protect valuable assets and mitigate the risk of data breaches. By following the best practices outlined in this article, CSOs and CISOs can ensure that their organisations are well-equipped to address the challenges of modern cybersecurity.

Additional considerations

Finally, by addressing some additional considerations, CSOs and CISOs can further strengthen their organisation’s identity management strategy and improve overall security posture:

Cloud-based identity management: Consider the benefits of cloud-based identity management solutions, which can provide scalability, flexibility and cost-effectiveness.

Emerging technologies: Stay informed about emerging technologies, such as biometric authentication and behavioural analytics, that can enhance identity management capabilities.

Vendor management: Carefully evaluate and manage vendor relationships to ensure that identity management solutions meet the organisation’s specific needs and security requirements.

Visitor management: Consider utilising an integrated visitor management system to make the experience a lot more pleasant and to provide for the tracking of visitor access to facilities.

Case study

Let look at a real-life case study where a breach was caused by mismatched physical and logical identities. Names and places have been changed to protect the innocent.

The scenario

A large multinational corporation had implemented robust physical and logical security measures, but even with these controls in place a significant data breach occurred due to a misalignment between these two security bastions.

The corporation had the following physical security measures in place:

State-of-the-art access control systems with biometric authentication and card readers at all entrances; Regular security audits and vulnerability assessments; Trained security personnel.

In addition to the physical they also had logical security measures, which included:

Strong password policies and multi-factor authentication; Network segmentation and intrusion detection systems; Regular security awareness training for employees.

The problem

Despite these measures, a significant vulnerability existed in the integration between the physical and logical security systems. A disgruntled employee, who had recently been terminated, was able to exploit this gap to gain unauthorised physical and then logical access.

On termination of employment the staff member still had physical access to the premises due to the fact that the employee was still in possession of a valid physical access card, granting them entry to the building.

Coupled with this the staff member also still had all the logical access which was assigned as the IT department had not updated the employee’s logical access permissions to reflect their termination status. This allowed the employee to access critical systems and data.

These factors lead to data exfiltration. By using their unauthorised access, the employee was able to bypass all the security controls and exfiltrate sensitive customer data, including personally identifiable information (PII).

The impact

The breach had far-reaching consequences. First and foremost was the significant financial loss suffered due to data breach. These costs consisted of loss of revenue due to the lack of trust customers felt post-breach along with response costs, legal fees and potential fines.

Added to the financial losses is the damage to the company’s reputation. Reputation is built over a long time and only takes one mistake for this to be severely impacted.

Then there were the potential legal consequences for violating data privacy regulations and the remediation required by the various regulators. This required monitorship of the corporation’s compliance and security functions for a period of three years.

Lessons learned

1. Full end-to-end identity management programme that included all the required Governance Elements.

2. Conduct continuous synchronisation between the security bastions to ensure that physical and logical access controls are synchronised to prevent mismatches.

3. Robust termination procedures which establish clear procedures for automated revoking of both physical and logical access upon employee termination.

4. Conducting regular access reviews to verify that employees have only the necessary privileges.

5. Implementation of continuous employee education by providing managers and employees with training on the importance of reporting suspicious activity and following security best practices.

This case study illustrates the importance of a holistic approach to security that addresses both physical and logical access controls. By ensuring alignment between these two dimensions, organisations are able to significantly reduce the risk of data breaches and protect their valuable assets.

A roadmap to modern application security

Chrystal Taylor, SolarWinds Head Geek, looks at what organisations can do to embrace modern application development, while at the same time bolstering security

Oil has long fueled the Middle East’s phenomenal growth story. But this being a finite resource, the region’s forwardfocused governments have been working to build knowledge rather than resourcedriven economies. Digitalisation has underpinned these endeavors, evidenced in the UAE’s Digital Economy Strategy which aims to double the contribution of the digital economy to the nation’s GDP within 10 years.

Just as automobiles and heavy machinery, using the region’s abundant oil resources, helped transform desert landscapes into glistening urban skylines, software and the data it depends on (often touted as the region’s ‘new oil’), are transforming industries, government services and everyday life across the Middle East, driving the next phase of innovation and economic diversification. Indeed, software has become the vehicle carrying regional nations forward as they compete in the global race for digital dominance.

And just as cars today place miles ahead (both literally and figuratively) of their counterparts from yesteryear, the evolution of software into what it is today is nothing short of remarkable. Monolithic software hosted on on-premises servers has given way to user-friendly, flexible and scalable modern applications. At the same time, several trade-offs have been related to using modern development processes like microservices, containers and Kubernetes to build applications. Two of the primary trade-offs are complexity and security.

The attack surface increases with modern applications, often decentralised across multiple platforms, environments and infrastructures. These complex, hybrid and multi-cloud application environments are also difficult to visualise. If you don’t know where an issue is coming from or what’s causing anomalous activity, it’s much harder to address. Another potential area of concern is using open-source code in

modern applications. Open-source code is used in nearly every modern application. A Synopsys report earlier this year found “at least one known open source vulnerability” in 84% of commercial code bases.

The solution isn’t to go back to monolithic legacy software. Instead, the industry needs solutions designed to allow us to embrace modern application development in a way capable of ensuring our security. Here’s a roadmap for organisations seeking to build secure modern applications.

1) Build security in with the shift left

Picture you’re an engineer building a car. Before you devote time to this process, you want to test and approve each piece to ensure the car operates safely. This same process should occur in application development through what’s known as the ‘shift left’.

The shift left can improve the development process by embedding

security measures earlier. This helps DevOps teams identify vulnerabilities as the application they’re building is being developed. Traditionally, security checks occur after the build is complete in what’s known as the testing phase. If an issue arises during this phase, DevOps teams must work quickly to identify and fix the problem, ultimately slowing down the process and inhibiting a thorough application review.

DevOps teams can speed up the process by prioritising security in the build process and delivering safe, reliable products. Just as you don’t want to get on the road with a faulty steering wheel, you want to ensure each piece of your application runs properly and safely.

2) Be transparent by utilising a software bill of materials

In an age of unforeseeable cyberattacks by committed nation-state bad actors using novel and sophisticated techniques, the industry needs information sharing more than ever. Being transparent about vulnerabilities and threats is critical to helping ensure the security of our shared cyber infrastructure.

Just as automobile manufacturers can clearly document every component

“The industry needs solutions designed to allow us to embrace modern application development”

in their vehicles, application developers should clearly communicate what goes into their products. This can be done with a software bill of materials (SBOM). An SBOM is a list of all the components and dependencies comprising a particular software application. Its purpose is to provide transparency and visibility into the software supply chain, which helps developers identify and address vulnerabilities.

SBOMs allow organisations to respond more quickly to security threats. For example, when a new vulnerability is discovered in an open-source library, an SBOM can help identify which applications are affected so teams can take steps to mitigate the risk. This can help organisations avoid costly and timeconsuming security breaches by helping developers identify points of concern and major and minor issues and predict the final product’s functionality.

3) Increase visibility into complex IT environments through observability

Returning to our car analogy, imagine you’ve just finished manufacturing a new car that’s safe and ready to be driven. After a while, regardless of the tests that

have been run, the car will inevitably need maintenance and the check engine light turns on. For most of us, this means bringing the car to a mechanic, who will run a series of diagnostic tests to confirm the problem, tell you how it can be fixed, and how much it will cost. This is a timeconsuming and inefficient process.

Instead, imagine you had a check engine light designed to tell you what the problem was and provide step-bystep instructions on how to fix it. This increased visibility and the recommended remediation steps are also needed for modern IT environments, and this is where observability comes in.

Observability can play a crucial role in application development and security by providing real-time visibility to help detect and remediate security issues. By reducing the mean time to detect security issues, observability can help ensure custom web applications’ security and user satisfaction. By monitoring an application in real-time, teams can identify potential security issues before they become significant problems and quickly take corrective action.

Why it matters

Middle East nations have made it clear that digitalisation will only continue to drive greater shares of their GDPs. To align with government visions, companies need to undergo digital transformation and improve productivity. But the complexity of modern applications they create to do this, and their use of open-source code, threaten their security. To help ensure the security of modern applications, organisations must adopt a proactive approach by embedding security measures earlier in the development process, utilising SBOMs to provide transparency, and increasing visibility through observability. By doing so, organisations can build secure and optimised applications while maintaining the speed and innovation of modern development. www.solarwinds.com

THE WEAKEST LINK

With vulnerable supply chains keeping critical infrastructure security leaders awake in the Middle East, Sertan Selcuk, VP for METAP & CIS, OPSWAT, has some thoughts on shoring up the defences

Basic necessities like water, electricity and other critical resources are essential to living an undisrupted life. Yet, potential disruption lurks in corners of the internet. The threat landscape is constantly evolving and is coming up with more sophisticated attacks. It is becoming an industry of initial access brokers (IABs), peddlers of Ransomware-as-a-Service, consultants, support technicians and strategists. Attack vectors are changing because of this; global mass migration to the cloud that occurred between 2020 and 2021; and the rise of the Internet of Things (IoT). Eager to share in the cost and agility benefits of IoT, critical infrastructure organisations embark on their digitalisation journeys to increase data sharing — thus potentially exposing highly secured OT environments to outside threats. The things economies and societies take for granted, the things that must not fail, are at risk like never before.

In March last year, CPX’s State of the UAE Cybersecurity Report 2024 revealed that almost 155,000 remotely accessible digital assets in the United Arab Emirates (UAE) were left vulnerable to misconfigurations and unpatched applications. Other research from SecurityScorecard found that 73% of UAE companies do business with at least one third-party supplier that has been the victim of a breach. Further, 73% had exposure to a fourth-party breach. For too long, internet-facing companies have had to endure an internet overrun with nefarious cabals that want to siphon off economic progress. But now that our critical infrastructure is laid bare to the same leaching effect, we must act.

Last year’s Five Eyes warning about the China-linked Volt Typhoon group told a familiar story of stealthy recon and gaining a grasp only to sit and do nothing. Volt Typhoon was engaged in a living-offthe-land (LOTL) approach where the group seized control of native network tools and services that allowed them to stay under the radar of many unsuspecting critical infrastructure organisations. Nobody knows for sure what the endgame was, but we can speculate. The speculation, and the mere fact that such actors exist and are being found in delicate environments, should be enough to make every CISO in the Middle East secure their software and hardware supply chains.

Make software less of a soft target

The best CISOs never feel completely safe. They know that total security is an unreachable zenith. Even the most cyber-hygienic enterprise will still discover the occasional vulnerability. It is inevitable. Sophisticated threat actors will always find ways of injecting malicious code or exploiting a vulnerable third-party component. This is because, even in the critical infrastructure space, the pressure exists to accommodate public expectations about digital experiences. Open-source development greatly enhances the capabilities of organisations to rapidly deploy these experiences. But, there is a risk — thirdparty code libraries may contain known or unknown vulnerabilities. If these have been exploited, then every version of an application that uses them will be a threat to every user.

To guard against this, security personnel must work with DevOps teams to monitor each dependency and vulnerability. They must also address the complexities of containerisation, which has become a pernicious source of attack-surface expansion. With how images are reused, container repositories can convey malware across the entire application stack. Security and dev teams must therefore work together on frequent code reviews built around a software bill of materials (SBOM).

Harden the hardware

We have gone from an IT-centric world where one PC or laptop per employee was the norm to one in which at least one other device (a smartphone) must be protected. And that is before we factor in all the tablets used in remote sites and all the connected OT machinery. Portable media is especially vulnerable because it interconnects network boundaries. Security teams must know everything about a device, including its country of origin, which can be used to block connections by devices from restricted locations — a regulatory requirement in some jurisdictions. Also, firmware and software version numbers allow the SOC to assess every device for risk and categorise it accordingly.

In this together

Following these secure-by-design principles allows critical infrastructure enterprises to satisfy customers and regulators. They can shield themselves from some of the worst threats, like Volt Typhoon and the 2012 Shamoon attack on Saudi Aramco. When we harden software and hardware, we ensure that any device or process connected to them is also hardened. Every link in the supply chain has a part to play and must share data on known and potential vulnerabilities because every link has the potential to add more vulnerabilities. Many attackers exploit flaws that are introduced in the design phase, so design-time policies must be strengthened by all links to ensure the chain can withstand outside forces.

When we consider Volt Typhoon, we conclude that infiltration at scale is eminently possible. Instead of bracing for its turn, each organisation that finds itself part of a critical supply chain should improve its internal visibility and keep urging other links in the chain to do the same and to share what they find. Contextual knowledge will allow critical industries to build strong IT/OT supply chains.

And yet, obstacles remain for those facing supply-chain complexities. Overcoming these obstacles will require leaning heavily on the SBOM, which empowers dev and security teams with the means to quickly spot emerging vulnerabilities in software. At the same time, organisations can address assetvisibility deficits to protect their hardware supply chains.

If secure-by-design principles are used by everybody, then the threat posture of each link will improve. Zerotrust approaches include technologies like content disarm and reconstruction (CDR), multi-scanning, vulnerability management and data loss prevention (DLP). Each is designed to stop malware in its tracks and reduce the risk of credentials theft. Remember, as any good CISO knows, no system is perfectly secure. The work continues, but with the right foresight and best practices, perhaps the threat actor will be the one who is sleep-deprived in 2025. opswat.com

Smart Security for Resorts and Public Venues: Tackling Threats with Advanced AI-Powered Solutions

Resorts and multi-purpose venues are essential hubs of culture and economic activity. Yet, these vibrant environments face a myriad of security challenges, including criminal threats, operational inefficiencies, and environmental risks. Traditional security systems, with their static devices and human-dependent processes, often fail to meet the demands of these dynamic settings, leaving critical vulnerabilities unaddressed.

AI-driven surveillance systems, combined with centralized command-and-control platforms, are revolutionizing how security is managed in these spaces. These technologies deliver advanced capabilities, enabling comprehensive, real-time monitoring and response, ensuring the safety of guests, staff, and assets.

AI Surveillance: The Next Frontier in Security

AI-powered surveillance systems leverage cuttingedge technologies to deliver unmatched situational awareness. Real-time threat detection allows security teams to identify and respond to suspicious activities, such as unauthorized access or unusual behavior, with immediate alerts. Predictive analytics further enhance security by analyzing historical and live data to anticipate potential risks and enable proactive mitigation.

One of the most significant advantages of AI lies in its ability to integrate data from multiple sources. By connecting surveillance cameras, IoT devices, and environmental sensors into a centralized platform, AI creates a unified view of operations. This centralized

system eliminates blind spots and ensures seamless communication between security tools, empowering teams to act swiftly and effectively.

Centralized Systems: A Unified Approach to Security

At the core of AI-enhanced security is the centralized command-and-control system, often powered by a sophisticated video management system (VMS). This platform provides a comprehensive, real-time overview of the entire premises through a user-friendly interface, allowing security teams to monitor, manage, and respond to threats from a single location.

Centralized systems go beyond passive monitoring. AI-enabled video analytics continuously analyse footage from connected cameras, identifying behavioural patterns and highlighting unusual or threatening activities. These systems deliver realtime alerts for immediate incident response and predictive insights to address potential risks before they escalate.

Integrated Solutions for Comprehensive Safety

AI-enabled surveillance systems are part of a broader security ecosystem designed to tackle the complex challenges of resorts and public venues. These integrated solutions include:

/ Advanced Access Control: Mobile credentials and biometric authentication streamline staff and guest access while securing sensitive areas.

/ Intelligent Parking Management: License plate recognition (LPR) and occupancy tracking reduce congestion and mitigate vehicular threats.

/ Environmental Monitoring: IoT devices track conditions like smoke, temperature changes, and device tampering, ensuring timely responses to potential hazards.

/ Crowd Management: Facial recognition, childtracking, and geo-fencing enhance safety by identifying bottlenecks, monitoring large gatherings, and preventing incidents.

Enhanced Efficiency and Guest Experience

Beyond improving security, AI-driven systems enhance operational efficiency and the overall guest experience. Automation reduces the burden on security teams, allowing them to focus on critical issues. Meanwhile, streamlined access control and parking management ensure smooth operations and convenience for guests, boosting satisfaction and loyalty.

Conclusion

Adopting AI-driven surveillance and centralized security systems is no longer optional—it’s essential. These advanced solutions provide comprehensive safety, operational efficiency, and an elevated experience for guests and staff alike.

By integrating high-resolution cameras, predictive analytics, and centralized command systems, AI-powered security creates smarter, safer environments, setting a new standard for excellence in the industry.

Ready to explore customized security solutions and the latest technologies tailored for resorts? Contact MVP Tech - Convergint to discover how we can enhance safety and guest experiences!

Irina Zinovkina, Head of Information Security Analytics Research at Positive Technologies, explains how to detect security incidents in infrastructures of any scale

We have witnessed a surge in the number of successful attacks on organisations globally in 2024. This increase was driven by multiple factors, including complex global geopolitical situations; mass exploitation of zero-day vulnerabilities in popular software; as well as complexity and sophistication of attacks. Data from the first three quarters of 2024 indicates that the main attack methods were malware use (65%), social engineering (51%) and vulnerability exploitation (34%). The average percentage of malware use has continued to grow since 2022 and increased by five percentage points compared to 2023. Social engineering attacks have also grown significantly compared to last year (with an increase of six percentage points) and in 2022 (with an increase of eight percentage points). This can be explained by a combination of factors: first, attackers use social engineering because it is effective and does not require complex technical implementation; second, phishing attacks are becoming more sophisticated, using new technologies such as AI, which allow more phishing emails to be generated in less time.

Vulnerabilities were successfully exploited in every third attack on organisations. In some cases, vulnerabilities lead to the interception of control over equipment or its denial of service. This can hold serious damage for industries where successful exploitation can lead to a stoppage of production at industrial facilities. Examples of such vulnerabilities can be the flaws discovered by our experts who have identified five vulnerabilities in the processor modules of the MELSEC System Q and MELSEC System L series PLCs. This equipment can be used in the chemical industry, for the production of semiconductors, building automation and in other areas. Over the past five years, industrial sectors have been in the top five most attacked industries, and industrial organisations had the share of nine percent of the successful attacks in the first three quarters of 2024. Modern technological processes implemented at many enterprises involve continuous interaction of physical objects and production equipment with software

65% malware

51%

social engineering

Data from the first three quarters of 2024 indicates these three main attack methods

34% vulnerability exploitation

components and IT processes. Although this approach significantly increases the efficiency of technological and business processes, it also makes systems more vulnerable to cyber attacks from intruders.

Monitoring of security events

To address these challenges organisations should focus more attention on improving the protection of their IT infrastructure, implementing strong security processes and fostering cyber resilience. Monitoring security events and a timely response to information security incidents are among the most important processes that help prevent non-tolerable events from occurring. It is a continuous process of monitoring and analysing the results of event registration and other data from various sources to identify violations, threats and vulnerabilities.

In practice, such a process is a manual or automated collection of events received from various sources (for example, from information security tools, operating

system logs, antivirus software, network equipment), as well as storing events and their subsequent analysis. During the analysis, information security specialists identify anomalies or unusual events in the operation of information systems for a timely response to them. This allows for a prompt response to the actions of an intruder, i.e., to stop the attack.

The sources from which events will be analysed are determined by expert means by the company’s information security specialists, and therefore the connection priority and the list of sources may differ in each company. Among them, we can note:

• security information and event management (SIEM);

• network traffic analysis (NTA);

• next generation firewall (NGFW);

• web application firewall (WAF);

• sandbox;

• endpoint detection and response (EDR)

• extended detection and response (XDR);

• privileged access management (PAM).

To determine monitoring objects, it is necessary to use available initial data on elements of the company’s IT infrastructure, such as:

• current IT asset inventory data;

• current documentation and diagrams on networks and information systems (in terms of information on the composition and architecture, external and internal interfaces);

• information on current tactics and techniques used by intruders in attacks (MITRE ATT&CK), on computer attack patterns (CAPEC), the most dangerous information security risks for web applications (OWASP);

• other documents and information considering the specifics of the company’s activities, including industry.

To effectively measure cyber resilience and assess the success of protective measures, organisations need to use clear and actionable metrics. Time-based metrics are particularly useful in this regard. For example, metrics like the time to respond to an attack (TTR) and the time to implement an attack (TTA): when hardening the infrastructure, TTA increases – it will be more difficult for attackers to penetrate the infrastructure and move from node to node. At the same time, implementing effective monitoring and response tools helps reduce TTR, enabling security teams to detect and contain threats faster. In order to further enhance response times and identify intrusions more efficiently, organisations should invest in modern monitoring and response systems and ensure that they fully cover the infrastructure, collect complete data and regularly scan assets. The creation and implementation of SLA will allow information security teams to clearly formulate tasks and justify the need for work to strengthen the protection of the infrastructure, and IT teams to optimise resource costs for completing tasks taking into account their priorities. It is also worth noting that well-tuned modern monitoring and response systems that require less operator intervention will optimise existing human resources and switch to more optimal monitoring and response modes.

Automation of monitoring and response

Automation of routine SOC tasks will free up specialists’ time to work on more

“To effectively measure cyber resilience and assess the success of protective measures, organisations need to use clear and actionable metrics”

critical tasks, and the implementation of programmes to support and motivate information security teams, including incentive systems and psychological support, will increase the efficiency of specialists and reduce the likelihood of burnout. Autonomous SOCs represent the next step in the evolution of cybersecurity monitoring. The next-generation SOC is expected to solve many of the routine challenges faced by traditional SOCs, reduce Time to Response (TTR), improve analytics and decision-making, decrease analyst workloads, and remedy staffing shortages.

What will next-generation (NG) SOC look like?

1. Automation at the highest level

To increase incident response efficiency, SOCs need tools that automate nearly all analyst actions. The system must understand the current network topology and asset map, be capable of building graphs of possible attacks, and request and analyse additional data from connected sensors. The automation of each subsequent task is closely related to the automation of the previous one, producing a synergetic effect that significantly accelerates incident detection and investigation.

2. Adaptation to game changes

Significant advancements in AI over the past few years have forever changed information security incident monitoring and response. Hackers increasingly use AI to discover entry points into infrastructure, as well as to craft phishing emails, exploits and malware. The number of information security events is rising, as is the cost of not responding to them in a timely manner. We must embrace a new approach in which defenders also

incorporate AI tools into daily information security monitoring.

3. Analytics and decision-making

The NG SOC will feature extensive built-in analytics and expertise required for decision-making. These analytics will rely not only on detection content received from external sources but also — and particularly — on the self-learning capabilities of AI algorithms. Thanks to machine learning and AI, next-generation SOCs will eventually be able to learn from previous attacks and adapt to new ones, which is particularly valuable in combatting today’s cyber threats.

4. Autonomy

The NG SOC aims to achieve complete autonomy in information security monitoring and response. Previously, the development of incident response tools was aimed at creating automation tools to assist SOC analysts (automation-assisted security operations). The current goal is to develop an autonomous system. Decisions made by this system will be checked and adjusted by an analyst if necessary (analyst-assisted security operations), enabling SOCs to analyse information security event data without human intervention, identify incidents, prioritise them, and propose relevant response actions.

The future of cybersecurity depends on adopting advanced technologies, such as AI-powered tools, to keep up with evolving threats. By being prepared and adapting to new challenges, organisations can protect their systems, avoid disruptions and build a stronger foundation for longterm security.

global.ptsecurity.com

The Security Middle East Conference returns bigger than ever before, continuing to deliver the key insights requires for businesses of all sizes to align themselves with the multi-trillion dollar Saudi Vision 2030 initiative. Through our conference sponsorship platform, you have the opportunity to elevate your organisations presence in the region, network with industry and giga-project leaders, build new sales opportunities, and stand out in a crowded marketplace.

Our conference is a proven, unparalleled event, government supported and endorsed, working in tandem with companies such as Saudi Aramco, and Public Investment Fund (PIF) backed organisations like Red Sea Global, Diriyah Company and more. Don’t miss this opportunity to become a pioneer of today, shaping tomorrow.

Guardians of the digital age

Rohith Rajan, Chief Technology Officer at Intello Cyber Technologies, looks at how to protect sensitive data from unauthorised access and breaches

In a world increasingly reliant on digital ecosystems, the protection of sensitive data has emerged as a paramount concern for organisations and individuals alike. With the staggering rise in data breaches, cyberattacks and regulatory scrutiny, the demand for robust security frameworks has never been greater. Sensitive data — whether it be personally identifiable information (PII), financial records, or corporate intellectual property — must be treated with utmost care, as its exposure can lead to severe financial, legal and reputational repercussions.

The

anatomy

of sensitive data

Sensitive data encompasses any information that, if disclosed, could result

in significant harm to an individual or organisation. This includes everything from customer details and health records to trade secrets and financial statements. The digital transformation of industries, combined with the accelerated adoption of cloud computing and remote work, has expanded the digital footprint of enterprises. As a result, the risk of sensitive data falling into the wrong hands has intensified, creating an urgent need for robust defence mechanisms. Cybercriminals, whether motivated by financial gain or espionage, continuously develop sophisticated tactics to infiltrate organisations. According to recent studies, the average cost of a data breach in 2023 was US$4.45 million,

underscoring the high stakes involved in protecting sensitive data.

Understanding the threat landscape

Data breaches and unauthorised access typically arise from two primary sources: external attacks and internal vulnerabilities.

1. External threats: Cyberattacks, such as phishing, ransomware and advanced persistent threats (APTs), are often orchestrated by criminal syndicates or state-sponsored actors. These attackers seek to exploit vulnerabilities in systems, networks or human behaviour to gain unauthorised access to sensitive data.

2. Internal threats: Often overlooked, insider threats can pose a significant risk to data security. These threats may stem from malicious employees, careless handling of data or even third-party vendors with inadequate security measures.

Building a fortress

To effectively safeguard sensitive data from unauthorised access and breaches, organisations must adopt a multi-faceted approach that integrates both technological solutions and humancentered policies. Effective strategies for an evolving threat landscape include:

1 Encryption: The first line of defence

Encryption remains one of the most powerful tools in data protection. By converting data into an unreadable format, encryption ensures that even if data is intercepted, it cannot be deciphered without the appropriate decryption key. Organisations should prioritise:

Data-at-Rest Encryption: Encrypting data stored on devices, databases and cloud environments to prevent unauthorised access if the storage media is compromised.

Data-in-Transit Encryption: Utilising encryption protocols like TLS (Transport Layer Security) to secure data while it moves across networks, ensuring the integrity and confidentiality of the information.

2 Implementing strong access control measures

Access control is critical to ensuring that only authorised individuals can access sensitive data. Organisations should enforce a least privilege model, ensuring that employees and third parties only have access to the data necessary for their roles. Effective access control mechanisms include:

Multi-Factor Authentication (MFA): MFA requires users to provide two or more forms of verification to access systems. This can include something the user knows (a password), something they have (a mobile device),

or something they are (biometric data such as fingerprints).

Role-Based Access Control (RBAC): Implementing RBAC ensures that users are granted permissions based on their job function, reducing the risk of unauthorised data exposure.

3 Data masking and tokenization: minimising exposure

Data masking and tokenization are techniques that help protect sensitive information by replacing or obscuring key data elements. In data masking, sensitive information is replaced with realistic but fictional data, allowing systems to function while minimising the risk of exposure. Tokenization, on the other hand, replaces sensitive data with a randomly generated token that is meaningless without access to the corresponding tokenization system.

These methods are particularly useful when sensitive data must be shared or processed by third-party applications, reducing the risk of data leakage.

4 Proactive monitoring and incident response

The ability to detect and respond to security incidents quickly can mean the difference between a contained threat and a full-blown data breach. Proactive monitoring tools such as Security Information and Event Management (SIEM) systems aggregate data from various sources to identify anomalies and potential security incidents in real time. Coupled with robust incident response protocols, these systems allow organisations to swiftly contain and mitigate breaches.

Regular vulnerability assessments and penetration testing further enhance security by identifying and addressing weak points in an organisation’s defences before they can be exploited by attackers.

5 Employee education: the human firewall

No matter how advanced a security system may be, human error remains

one of the greatest risks to data security. Ensuring that employees are educated on the importance of data security is vital to building a culture of cybersecurity awareness.

Phishing awareness:

Teaching employees to recognise and report phishing attempts to reduce the likelihood of falling victim to social engineering attacks.

Data handling best practices:

Ensuring that employees understand how to securely store, transfer and dispose of sensitive data helps minimise accidental exposure.

Navigating regulatory compliance

Beyond the technical and operational strategies for protecting sensitive data, organisations must also navigate an increasingly complex regulatory environment. Regulations such as the General Data Protection Regulation (GDPR), the Health Insurance Portability and Accountability Act (HIPAA), and the California Consumer Privacy Act (CCPA) impose strict requirements on how sensitive data is collected, stored and shared.

Non-compliance can lead to significant fines and legal liabilities, in addition to the reputational damage caused by data breaches. Organisations should stay informed about the evolving regulatory landscape and ensure that their data protection practices align with relevant laws and standards.

A unified approach to data security

The protection of sensitive data is not a one-size-fits-all solution. It requires a comprehensive, layered approach that integrates cutting-edge technologies, effective policies and a strong culture of security awareness. As cyber threats continue to evolve, so must the strategies employed to safeguard data.

By staying vigilant and proactive, organisations can reduce their risk of unauthorised access and breaches, ensuring the confidentiality, integrity and availability of their most valuable asset — information. intellome.com

CASE STUDY

Mall Management Group

A major mall management group in the Middle East maximised its security operations by installing icetana AI’s Video Analytics platform, facilitating a centralised control room for real-time monitoring and event detection across multiple sites

Overview

The mall management group initially managed over 4,000 cameras across multiple control rooms. As the number of camera feeds increased, it became nearly impossible to monitor all cameras effectively, leading to missed incidents. The setup overwhelmed operators, who struggled to keep track of everything simultaneously. Seeking a more efficient solution, the management turned to icetana AI. The platform’s real-time event detection streamlined its operations by moving from a reactive to a proactive security model, prioritising critical incidents while reducing operator fatigue and workloads.

The Challenges

The mall group faced significant challenges monitoring thousands of cameras across multiple control rooms. With fragmented setups and a high volume of camera feeds, operators struggled to maintain effective real-time oversight, often missing incidents as they occurred.

“It was very difficult to manage so many cameras in different control rooms. We had small teams, and it was practically impossible to monitor everything in real-time. Operators would often miss important incidents, which we only discovered later during post-event investigations,” the Technology Manager explained.

With operators attempting to keep an eye on numerous screens simultaneously, maintaining situational awareness across all locations was nearly impossible. The security team faced the challenge of 24/7 vigilance, monitoring for customer safety during the day and contractor activities throughout the night. This constant surveillance demand meant personnel were required to stay alert around the clock, often leading to fatigue.

This reactive approach delayed responses to critical incidents while also placing a strain on personnel who struggled with the intense monitoring load. The divided focus and busy environment, heightened by the dual responsibilities of day and night operations, made proactive security challenging, creating vulnerabilities in the system that may compromise both safety and operational efficiency.

The Solution

After trialling different AI video analytics platforms, the mall management group selected icetana AI to centralise its security operations. They were particularly impressed by icetana’s powerful algorithms, which effectively addressed their main pain points while requiring less manual configuration, as the system adapts to its environment. With icetana AI’s real-time anomaly detection the team could concentrate on high-priority video feeds, significantly reducing operator workload and enhancing efficiency. This streamlined approach allowed their team to respond swiftly to critical events across all sites, improving security coverage.

“Once we centralised the system and adopted icetana AI, efficiency increased drastically. The main feature was the black screen, which is there in the software. The operator does not have to always see all the videos at the same time, it is just a box of the important key events to the operator,” the Technology Manager shared.

This enabled icetana’s AI to instantly alert operators when unusual activity occurred, allowing security guards to reach incidents within minutes and strategically position themselves in areas with the highest alert frequency — a substantial improvement over its usual practice of addressing incidents the next day.

The Result

Implementing icetana AI across multiple malls has yielded transformative results in operational efficiency, realtime responsiveness and predictive monitoring, improving security management, resource allocation and situational awareness.

Enhanced Efficiency and Centralisation: By consolidating monitoring operations into a centralised control room, the team achieved greater resource efficiency, reducing the need for redundant systems across sites. “We now operate with 12 to 14 operators overseeing thousands of cameras across multiple locations,” explained the Technology Manager. Previously, maintaining adequate staffing required separate teams in each location, which strained resources. Now, centralised monitoring enables the team to reduce operating costs while improving overall vigilance.

Real-Time Alerts for Swift Response: The real-time alert system has been crucial for security operations, allowing the team to intervene quickly before minor incidents escalate. The AI detects unusual events, such as people fighting or running, and notifies operators in real-time, allowing for preemptive action.

Proactive and Predictive Monitoring:

The team has shifted from a reactive to a proactive security model.

Previously, the team relied on post-event investigations, often only becoming aware of incidents after receiving complaints or reviewing old footage. “Now, we can identify and address issues like property damage or misuse of restricted areas as they happen,” said the Technology Manager. This proactive approach reduces the time and cost associated with incident investigation, contributing to a safer, more efficient environment across all locations.

The

Technology

icetana AI offers a comprehensive video analytics platform designed to redefine real-time event detection across largescale surveillance networks. Its selflearning AI core continuously adapts to new environments, enabling it to detect unusual or potentially significant events and alert operators promptly. This capability connects seamlessly with existing camera and VMS systems, allowing users to harness advanced technology without the need to overhaul their infrastructure.

At the heart of icetana AI’s suite is its Safety and Security solution, providing 24/7 real-time AI surveillance to monitor

and safeguard spaces effectively. This product is powerful in reducing false alarms, where operators are alerted to events that truly require attention. Configuration is straightforward, making deployment and management of the solution user-friendly, while its scalable design makes it ideal for extensive camera networks, setting it apart from competitors in large-scale environments.

icetana AI offers a suite of AI products to meet a range of surveillance needs:

Analytics: This tool transforms vast amounts of surveillance data into actionable insights, empowering organisations to make data-driven security decisions and identify trends at scale.

Forensic Quick Find: This feature allows operators to locate individuals of interest quickly across all monitored sites, significantly reducing the time and effort involved in investigations.

Licence Plate Recognition (LPR): Realtime detection of licence plates aids in efficient vehicle monitoring and identification.

Facial Recognition: This feature adds another layer of identification, using AI to recognise individuals, which is especially valuable for high-security environments.

icetana GPT: A unique AI tool that enables users to define specific events of interest without custom algorithm development, providing flexibility in responding to unique security needs. www.icetana.ai

Shaping the future of security and safety

Ahmed Ismail Albalooshi, Chairman, Professional Security and Safety Alliance (PSSA) is delighted to announce the relaunch of the Security Professionals Association (SPA) as it morphs into the PSSA

As we navigate an increasingly complex and interconnected world, the importance of security and safety measures cannot be overstated.

It is with great pride and anticipation that I announce the re-launch of the Security Professionals Association (SPA) as the Professional Security and Safety Alliance (PSSA) — a platform dedicated to empowering individuals and businesses through timely and insightful updates on the dynamic world of safety, security and innovation.

PSSA is more than just an organisation; it is a movement focused on elevating the standards of security and safety practices worldwide.

What do we do? and why do we do it?

Our mission is clear: to become a trusted partner in shaping the dialogue around the challenges and opportunities in our industry through collaboration, knowledge sharing and professional development. We aim to create a thriving community where members can connect, learn and grow together.

As we prepare for our first major appearance at Intersec, the premier international exhibition for security, emergency services and safety, our vision and purpose come into sharper focus. In today’s interconnected world, the safety and security landscape is evolving at an unprecedented pace. From cuttingedge technological advancements to the ever-growing importance of sustainable solutions, staying informed is no longer optional — it’s essential.

At PSSA, we are committed to bridging the gap between knowledge and action by delivering content that matters.

How PSSA will empower you

At PSSA, we aim to empower members and enhance their contributions to the security and safety field through a shared vision and strategic initiatives. We also strive to create an environment where professionals can thrive, innovate and lead the charge in shaping the future of the industry.

PSSA offers a multitude of benefits for its members:

• Knowledge Sharing: Engage in thought-provoking discussions, participate in webinars and access a wealth of resources to expand your knowledge base.

• Networking Opportunities: Connect with like-minded professionals from around the world and build valuable relationships.

• Professional Development: Take advantage of our training programmes, certifications and mentorship opportunities to advance your career.

• Industry Influence: Contribute to the development of industry standards, guidelines and best practices.

• Global Reach: Expand your network and gain international recognition for your expertise.

Why Intersec?

Launching our voice at Intersec is both a privilege and a statement of intent. This globally recognised event embodies innovation, collaboration and excellence

Our Vision

Our vision is to drive innovation and excellence in the security industry and create a world where security and safety are seamlessly integrated into every aspect of society.

Our vision is built upon three core pillars:

1. Informed Communities

Providing accurate, up-to-date news and insights.

2. Engaged Stakeholders

Creating a platform for dialogue between industry leaders, innovators and the public.

3. Empowered Actions

Guiding practical steps to enhance safety and security worldwide.

— values that resonate deeply with our purpose.

As we move forward, I invite you all to join us on this journey to shape the future of security and safety. Together, we can redefine the standards of the safety and security industry, ensuring that every individual and organisation is equipped to face the challenges of tomorrow with confidence and clarity.

On behalf of the PSSA Committee, thank you for your trust and support. We are excited to embark on this journey with you. pssa.global

Industry Interview

Exploring

key themes in

aviation

security, Meshal Aljohani, CPP, PSP, PCI, Security Operations Specialist sat down with Adnan Alghamdi, Advisor to the Executive Vice President for Aviation Security at the General Authority of Civil Aviation (GACA) in

Saudi Arabia

Tell us about your journey in aviation security.

It began over 20 years ago when I transitioned from military service to the aviation sector. My experience spans various roles, from operational responsibilities on the ground to strategic advisory positions at the highest levels. Currently, as an Advisor to the Executive Vice President for Aviation Security at the GACA in Saudi Arabia, I provide strategic guidance and expertise to ensure our aviation security measures meet global standards.

My journey has been one of continuous learning, where I’ve been privileged to contribute to the safety and security of millions of passengers, as well as engage with international stakeholders in shaping the future of aviation security.

What are the challenges and opportunities facing the aviation sector in Saudi Arabia?

Saudi Arabia’s aviation sector is undergoing rapid expansion, driven by the ambitious goals of Vision 2030, which aims to transform the Kingdom into a global logistics hub.

A major challenge is ensuring that our security infrastructure can keep pace with this rapid expansion. This includes upgrading facilities, enhancing training programmes and integrating advanced technologies to manage the increased flow of passengers and cargo while maintaining the highest security standards. Additionally, the global dramatic risk changes, such as evolving cyber threats and the use of unmanned aerial systems (UAS) for malicious purposes, further complicate the security landscape. Regional military conflicts also necessitate heightened security measures to protect our aviation assets and operations.

However, this growth also offers substantial opportunities. It provides a platform to implement cutting-edge security technologies, foster international collaboration and set new benchmarks for aviation security in the region. By focusing on innovation and excellence, Saudi Arabia is well-positioned to lead in the global aviation security domain, ensuring that these ambitious targets are met safely and securely.

What do you see as the most pressing threats to aviation security today, and how is Saudi Arabia addressing them?

The most pressing threats include cyber threats, the use of UAS for malicious purposes and insider threats. In Saudi Arabia, we are proactively addressing these risks through a multi-faceted approach. We have invested in advanced cybersecurity measures, conducted rigorous training programmes to mitigate insider risks and are developing regulations to manage the safe integration of UAS into our airspace. Additionally, continuous collaboration with international aviation security organisations ensures that we remain aligned with global best practices and are prepared to respond to evolving threats.

How have technological advancements impacted aviation security in Saudi Arabia?

The integration of biometrics, AIpowered surveillance systems and advanced screening technologies has improved both efficiency and accuracy in threat detection. These technologies enable us to process passengers more quickly while maintaining high security standards. Moreover, the adoption of big data analytics allows for better risk assessment and decision-making. As we continue to embrace these innovations,

we are not only improving security but also enhancing the overall passenger experience for all.

What specific regulatory challenges does the sector face?

The rapidly evolving nature of global security threats presents a significant regulatory challenge. The dramatic changes in global risk landscapes, including cyberattacks and the increasing use of drones for malicious purposes, require continuous review and adaptation of our policies. Additionally, military conflicts in the region pose unique challenges, necessitating heightened vigilance and the development of responsive security measures.

Aligning national regulations with international standards while addressing these dynamic and region-specific threats is an ongoing task. We are actively working to overcome these challenges by fostering collaboration between regulatory bodies, industry stakeholders and international partners to ensure that our aviation security framework remains robust and resilient in the face of these evolving risks.

LEADING THE WAY

INSIGHT, INNOVATION, INFLUENCE

The epicentre of global innovation in security, safety and fire protection SHOWCASED

Intersec Dubai takes centre stage in 2025

Explore cuttingedge technologies and solutions shaping the future

A GLOBAL PLATFORM FOR SECURITY INNOVATION

Intersec 2025, scheduled to take place from 14-16 January 2025 at the Dubai World Trade Centre, is poised to be a pivotal event for the global security industry. This exciting exhibition and conference brings together a diverse range of stakeholders, including security professionals, government officials, industry experts and technology providers

Held under the patronage of HH Sheikh Mansoor Bin Mohammed bin Rashid Al Maktoum, Intersec’s silver jubilee event last year hosted 47,506 trade buyers, convening from 141 countries.

As the leading global platform for the security, safety and fire protection industry, Intersec has been a cornerstone event in the Middle East for over two decades. Since its inception, Intersec has evolved into a premier showcase for cutting-edge technologies, innovative solutions and industry best practices. Attendees have the opportunity to network, collaborate and explore the latest trends shaping the security landscape.

A comprehensive

overview of the security landscape

Intersec 2025 offers a comprehensive overview of the latest advancements in security technology and solutions. From traditional security systems to cuttingedge AI-powered tools, visitors will have the opportunity to explore a wide range of products and services.

Futuristic technologies are revolutionising the security landscape, and Intersec aims to be ahead of the curve in showcasing them. Artificial

Intelligence (AI) and Machine Learning (ML) are transforming security operations, enabling advanced facial recognition, behaviour analysis and predictive threat intelligence. The Internet of Things (IoT) is integrating seamlessly into security systems, providing real-time monitoring and control of devices and environments. Additionally, the rise of sophisticated cyber threats necessitates robust cybersecurity solutions to safeguard sensitive data and critical infrastructure. Visitors to the show will be immersed into tomorrow’s world, with new technology

to explore and consider how it could enhance their roles.

Fire & safety solutions

Intersec 2025 offers a comprehensive showcase of fire safety and security solutions. Visitors can witness the latest advancements in fire detection and suppression systems, ensuring rapid response and minimising damage. The exhibition will also feature innovative emergency response and evacuation systems designed to protect lives and property. Additionally, attendees can

explore the latest trends in building security, including access control, video surveillance and perimeter security, to safeguard critical infrastructure and assets.

Homeland security and law enforcement

Intersec 2025 will delve into the critical aspects of homeland security and law enforcement. Attendees can explore the latest technologies for securing borders and critical infrastructure, such as advanced surveillance systems and biometric identification tools. In addition, the exhibition will showcase the latest law enforcement tools and tactics, including body-worn cameras, less-lethal weapons and forensic technologies. Experts will discuss the evolving landscape of counterterrorism and intelligence, sharing insights on emerging threats and effective countermeasures.

Physical security and access control

Physical security and access control remain essential components of a comprehensive security strategy. Intersec 2025 will feature the latest advancements in biometric access control, including fingerprint, facial recognition and iris scanning technologies. Attendees can explore innovative perimeter security solutions, such as intelligent video analytics, intrusion detection systems and access control systems. By leveraging these technologies, organisations can enhance their security posture and protect their assets.

Intersec Policing Conference

New for 2025 is the Intersec Policing Conference – the only dedicated law

enforcement thought-leadership platform. It offers a unique platform for law enforcement professionals to explore the latest advancements in technology, tactics and strategies. By bringing together global experts, the conference aims to address pressing challenges faced by police forces worldwide. Attendees can expect to learn about cutting-edge solutions in areas such as cybersecurity, digital forensics and AIpowered policing in a bid to improve their own policing efforts.

Networking opportunities

Intersec is renowned for its unparalleled networking opportunities and the Dubai 2025 show in January promises more of the same. Attendees can connect with a diverse range of industry professionals, including security experts, government officials, technology providers and endusers. Engaging in thought-provoking discussions, sharing insights and exploring potential partnerships can lead to valuable collaborations and business opportunities. The event’s strategic networking sessions, dedicated lounges and social events provide ample opportunities to forge new relationships and strengthen existing ones. By attending Intersec 2025, you can position yourself at the forefront of the security industry and build a strong professional network.

Intersec awards

The Intersec Awards is an annual event recognising excellence and innovation in the security industry. The awards celebrate outstanding achievements in various categories, including security solutions, projects and companies. This year, over 1,400 entries were received across the 15 categories,

Why Attend Intersec 2025?

• Stay Updated: Be the first to know about the latest trends and innovations in the security industry.

• Source Innovative Solutions: Discover cutting-edge products and services to enhance your security operations.

• Network with Industry Leaders: Connect with key decision-makers and build valuable relationships.

• Gain Industry Insights: Attend insightful conferences and workshops to learn from industry experts.

• Experience Immersive Demonstrations: See the latest technologies in action and learn how they can benefit your organisation.

intersec.ae.messefrankfurt.com

including three new categories for 2025: Excellence in Testing, Evaluation and Certification Award; Chief Information Security Officer (CISO) of the Year; and Consulting Leadership in Fire Safety, Security and Cybersecurity Award. Grant Tuchten, Portfolio Director at Messe Frankfurt Middle East, show organisers, said: “The Intersec Awards 2025 features a broad range of categories, truly reflecting the diversity and scope of the industry. This year, we are offering even more opportunities for businesses to showcase their innovative services and solutions across multiple sectors, including cutting-edge advancements in cyber security, fire protection, and perimeter security. The awards highlight the outstanding contributions and achievements that drive the security, safety and fire protection landscape forward.”

The 2025 finalists represent the best and brightest in the industry, game-changers who are setting new benchmarks and innovating like never before. The finalists have all showcased their commitment to advancing security and safety standards, with the winners being unveiled on the 15 January during the Intersec 2025 Awards Gala Dinner. Register now for Intersec 2025 and experience the cutting-edge innovations that will shape the industry for years to come.

INTERSEC CONFERENCE SESSIONS

Security professionals focused on gaining the professional edge would do well to check out the numerous sessions happening at the Intersec Conferences. Every session gives you the chance to earn CPD credits as well as enhance your skills and knowledge in a welcoming, professional manner. Intersec is renowned for hosting the world’s foremost experts on their stages, and the 2025 event is no different, with thought leaders and experts drawn from across the globe and all areas of specialism.

Each conference has a different focus, but each will help showcase cutting-edge solutions and strategies as well as giving attendees the opportunity to network, build beneficial relationships and stay ahead of the curve.

For security professionals the following conferences should be on your list to check out:

INTERSEC POLICING CONFERENCE

DATES: 15-16 JANUARY 2025

VENUE: AL MULTAQA BALLROOM, DWTC

New for 2025 is the Intersec Policing Conference, a unique event recognising the need to showcase policing best practices and new approaches to police work. The inaugural event will include leadership talks on diverse topics like redefining digital policing; the future of road safety; transformation in law enforcement; as well as a UK perspective of technology-enabled law enforcement. Across the two days, fireside chats will bring leading experts to the fore to discuss quantum-led crimes and how criminals are preparing for the next game changer, and the challenges of deepfakes. In addition, panels will be exploring how AI and automation are transforming police investigations and how today’s drone operations can be expanded to tackle the threats of tomorrow.

High-profile speakers secured for the conference include Anuja Thakur, Director of Compliance, Digital Assets Oasis, Goverment of Ras Al Khaimah; Burhan Rasool, Author of Technology in Policing; Shaikha Al Ali, Head of the Artificial Intelligence and Advanced Technology Unit and Director of the Digital Data Center for Ajman Police General Command; and First Lieutenant Nasser Alneyadi, Head of the Digital Security Department, Ministry of Interior UAE.

SECURITY LEADERS’ SUMMIT

DATES: 14-15 JANUARY 2025

VENUE: TRADE CENTRE ARENA, DWTC

The Intersec Security Leaders’ Summit is a high-level forum designed for C-suite executives, government officials and security decision-makers. It offers a unique platform to network with peers, gain insights from industry experts, and explore the latest trends and technologies shaping the future of security. Participants will address the evolving challenges and opportunities in the security landscape empowering attendees to make informed decisions and drive positive change in the security sector. The summit offers a unique opportunity to engage in insightful discussions, share best practices and explore innovative solutions.

The event will feature a variety of sessions, including keynote speeches from renowned industry leaders; panel discussions featuring experts from diverse backgrounds; and presentations.

Contributions will come from figures including Lt. Col Abdulrahman AlTamimi, Deputy Director of the International Affairs Bureau Ministry of Interior (UAE); Eng. Major Abdulla Ahmed Saif Alafkham Alhammoudi, Head of Operational Communication, Dubai Police; and Carlo Loveri, Head of Risk & Business Continuity, Abu Dhabi Airports.

Some of the topics that will be discussed include New Security Battleground: Deep Fakes & Deep Media; Leaders to Think Beyond their Corporate Playbook: Futureproof Amidst Uncertainty; and Security Dilemmas: Balancing Innovation, Privacy & Risk.

THE SIRA FORUM

DATES: 16 JANUARY 2025

VENUE: TRADE CENTRE ARENA, DWTC

Delivering a global commercial security community for exchanging ideas, sharing knowledge and collaboration, the SIRA Forum will return once again to Intersec. Taking place over the course of a day, the Forum will be serving up presentations promoting practical implementations and Q&A sessions with audience participation.

SIRA is committed to providing Dubai with the highest levels of safety and security through the implementation of international best practices in smart security systems, services and guards.

The SIRA forum will open on 16 January, with H. E. Khalifa AlSaleis, CEO, SIRA, giving the opening keynote to the audience. This will be followed by a presentation on the new law, expertly delivered by Eng. Mohammed Saleh, Director of Security Engineering Department at SIRA.

The morning will also showcase two informative presentations sharing key information and advice. First is a presentation from Eng. Khalid Alhammadi, Director of Metrology and Inspection Department at SIRA, who will be talking about the most common notes on security inspections. He will be followed by Jamal AlAmri, Director of Corporate Communications for SIRA, who will be exploring in closer detail SIRA’s new releases.

The final session for the SIRA Forum is a Q&A session, with the floor opened up to questions from the audience. This will be moderated by Adel Abdelhadi.

THE THOUGHT LEADERSHIP PAVILION

DATES: 14-16

JANUARY 2025

VENUE: SHEIKH

SAEED HALL 2, DWTC

Anyone invested in the security sector will want to book their place to attend the Thought Leadership Pavilion, happening over three days while Intersec is in full swing. Global industry experts will convene for lively discussions, boosted by networking opportunities.

The busy sessions will cover a huge range of topics, including on day one: A live podcast recording with the Access Control Executive Brief to start proceedings, followed by presentations on strengthening security through end-user engagement, from Rick Caruthers, President, Galaxy Control Systems; the intersection of consumer technology into the enterprise market, from Matt Bennett, VP – mobile access, Alert Enterprise; and a use case discussion on critical infrastructure, moderated by Lee Odess, CEO, The Access Control Collective.

Day two is equally as informative with sessions on the power of wallet, biometrics and other modalities, from Robert Lydic, president, Wavelynx; a panel discussion on the AI revolution in access control; and another on the future of digital transformation. Day three will explore innovation spotlights and solutions overview, with multiple busy panels and a presentation on redefining mobile access, from Sanjit Bardhan, VP and Head of Mobile, HID Global.

CISO BUSINESS BRIEFING

DATES: 14 JANUARY 2025

D MEETING ROOM, DWTC

The region’s top Chief Information Security Officers (CISOs) and security heads will gather for this pivotal component of Intersec. This briefing will deliver a unique platform so they can connect with peers, build new working relationships and broaden their knowledge.

The Intersec CISO Business Briefing will investigate the key trends, threats and opportunities in information security, offering tangible, actionable advice. In addition, it will explore cuttingedge technology, threat intelligence, regulatory compliance and best practice through high-level discussions and contributions from industry experts and thought leaders.

This one-day event will commence with a scene-setting keynote from Faheem Siddiqui, Director – Information Security at Majid Al Futtaim Holding. He will be discussing the number one strategic threat facing the audience: the rise of Agentic AI. Later panels will dissect the need for proactive defence through crisis management simulations; how board-friendly ROI can increase a security budget; and navigating cybersecurity in the age of AI. Contributions will come from a number of experts including: Abdulrahman Al Musfir, Regional Cybersecurity Officer – MEA, Schneider Electric; Dr Hussain Aldawood, Cybersecurity Innovation Director, NEOM, Member of the Global Centre for Cybersecurity, World Economic Forum; Ali Al Kaf Alhashmi, Vice President – Cyber Security and Technology, Mubadala; and Amit Mehta, VP Cybersecurity Services, EEMEA, Mastercard

The CISO Business Briefing is a must-attend for anyone looking to gain business-driven insights on how they can support and drive business needs, growth and continuity.

VENUE: SHARJAH

PROGRESS SECURITY SYSTEMS

PROGRESS

Progress Security Systems is a renowned high-end turnkey security, detection, safety and audiovisual systems solution provider. With operations spanning five cities and a team of certified engineers and technicians, it is dedicated to delivering innovative, tailored solutions that exceed client expectations.

The company’s success is built on three foundational pillars. First, it adopts a customer-centric approach, ensuring that client needs remain at the core of every project while fostering long-term relationships based on trust and confidence. Second, it focuses on employee development, investing in training and creating an environment that encourages creativity and excellence. Finally, strong partnerships with leading technology providers enables it to deliver advanced, reliable solutions and stay ahead in a rapidly evolving industry.

At Intersec Dubai – 2025, Progress Security Systems will be showcasing its expertise at various partner stands. Join it in shaping the future of safety, security, and innovation. progress-security.com

JOHNSON CONTROLS

Visit Johnson Controls and you can explore all the latest products innovations and technologies of its business lines.

Discover its IStar G2 cloud-friendly access control, offering easy integration with existing systems, and the powerful Edge AI video surveillance, or the new unique IQ intrusion service management platform designed to streamline the monitoring, management and diagnosis of multiple alarm systems.

Additionally, experience the new Simplex Small Audio Panel, featuring voice evacuation capabilities for the first time in Johnson Controls’ compact panel range and explore SafeLINC Cloud, its cutting-edge fire detection solution that allows you to monitor your fire and life safety system data through the cloud. Stay connected and ensure faster, more accurate responses. johnsoncontrols.com

IDIS

ELATEC is a leading global provider of user authentication and identification solutions. ELATEC’s universal readers are defined by their agnostic strategy, supporting multiple technologies, frequencies and protocols. Designed with a universal foundation that includes multi-level interfaces, open standards and a robust software package, they ensure easy integration, customisation, and interoperability across various systems and applications. ELATEC’s universal readers set the standard, offering seamless integration, remote updates and the flexibility to meet changing market demands.

Together with its global partners, ELATEC develops innovative and future-proof access systems that include pioneering multifrequency readers, advanced authentication software and worldclass service and support. These solutions enhance experiences in a wide range of applications like access control, machine authentication, secure printing and EV charging. Founded in 1988 and headquartered in Munich, Germany, ELATEC is represented at 19 locations worldwide. Visit ELATEC in the German Pavilion to learn more about its innovative technologies and how they can support your business needs. elatec-rfid.com/int/

The IDIS Edge AI Camera Plus range is the latest addition to IDIS’s AI line-up offering users a host of tools that will add efficiency to real-time surveillance operations and footage search and review. For example, IDIS A-Cut Monitoring enables automatic image cropping and intuitive attribute search, and new IDIS Deep Learning Analytics (IDLA) Pro event functions now drive even greater operational efficiency.

Advanced functions with IDLA Pro include crowd detection, abandoned object, removed object, fall detection and violence detection, enabling a proactive approach to security and public safety.

The IDIS Edge AI Camera Plus range offers the advantages of an intuitive, easy-touse interface with a choice of free or enterprise-class VMS, with functions for fast and convenient operation. Customers also have the assurance of seamless connectivity with the latest IDIS products and comprehensive end-to-end solutions for a range of applications enhanced by easy integration with third-party technologies. idisglobal.com

ICETANA

VICON INDUSTRIES

Vicon will be bringing its NEXT modular surveillance ecosystem to the forefront of the Dubai World Trade Centre for this year’s Intersec Dubai event.

Explore icetana AI at Intersec 2025! Visit icetana at the Milestone and Rasilient booths to see live demonstrations of its self-learning AI designed for real-time event detection. icetana AI seamlessly integrates with your existing security camera infrastructure to identify unusual or interesting events, enabling your team to focus on what matters most. Built for large-scale surveillance networks, the solutions are ideal for industries with extensive camera deployments.

icetana will be showcasing its AI product suite, including Safety And

Security, Analytics, Facial Recognition, Forensic Quick Find, Licence Plate Recognition (LPR), and GPT Integrations. Experience the benefits of icetana AI, such as reduced false alarms, easy configuration and a scalable design tailored to grow with your security needs.

Stop by its partner stands to discover how icetana AI helps security teams monitor smarter, respond faster and ensure safer environments. See firsthand how icetana AI uses artificial intelligence to keep people safe. icetana.ai

NEXT represents a new, bold era in security. The world is not a safe place without modern security systems, and that’s what drives Vicon forwards. Its NEXT systems stand strong with every feature needed to keep your business secure. The advanced AI-driven analytics combine with full remote flexibility, offering you more than passive security responses.

Vicon is in the business of safeguarding your people, assets and spaces. The systems click into place with hot-swapping components, letting you mix and match as your needs evolve. The system’s modular design holds its own in any environment, from smoggy transportation hubs to high-pressure healthcare facilities.

Visit the Vicon stand SA-I23 at Intersec Dubai 2025 for a hands-on look at its innovative features, like hands-free image tuning and LED alert systems. Discover how Vicon Industries is redefining security technology, with the challenges of tomorrow in its vision.

Stop by stand number SA-I23 to see why NEXT is leading the way in intelligent surveillance for a safer future. vicon-security.com

Zenitel Connect Pro is a unified platform that enables seamless communication for safety, security and operational teams. It ensures faster decision-making, smoother coordination, and efficient resource allocation during emergencies and daily operations. This powerful yet simple platform allows you to set up, deploy, monitor and maintain your communication system through a single user interface. Built on security-by-design principles, it minimises vulnerabilities and enhances resilience to cyberattacks.

By leveraging open standards like SIP and REST APIs, Zenitel Connect Pro integrates effortlessly with existing systems and leading security providers, adding robust audio capabilities. Its future-ready, open software architecture — based on containerisation and microservices — adapts to evolving demands. The integration of Node-RED offers a low-code environment, enabling customers to create custom applications with ease. Empower your teams with secure, uninterrupted connectivity.

Stop by to experience the power of unified communication with Zenitel Connect Pro. zenitel.com

SEE OUR PRODUCTS ON STANDS: MILESTONE: SAEED HALL 1; I17
SYSTEMS: SAEED HALL 2; F23

Salto is a leading global access solutions provider, part of the SALTO WECOSYSTEM. It develops pioneering facility access, identity management and electronic locking technology that ensures seamless, reliable and secure experiences.

Through close customer relationships and innovative solutions, Salto’s global team of experts create timeless and meaningful products that positively impact people and planet.

SALTO WECOSYSTEM

The SALTO WECOSYSTEM is more than a group of companies and individuals. It is a community born out of a common goal: empowering access, in every sense - access to places, experiences and opportunities.

The expert global teams collaborate closely, driven by a dynamic spirit and a shared passion that mean every part of its Wecosystem is fully connected.

Each of the companies - Salto, Gantner and Vintia, embrace the latest technologies and prioritise the open exchange of ideas to unlock new ways of working - So they can keep pushing, keep innovating and keep delivering solutions that enable people to access more together. saltosystems.com

INTERTECH VISION ME

Intertech Vision ME is a leading provider of advanced control room solutions, proudly serving the Middle East for over 25 years. Established in 1999 and headquartered in the UAE, the company specialises in designing, integrating and delivering cuttingedge technologies for mission-critical environments, including security, transportation, energy and utilities.

Through strategic partnerships with industry leaders such as Barco, ISD, and Antrica, Intertech Vision ME offers state-of-the-art videowall systems, innovative software like the RAMsys suite, and high-performance video encoders and decoders. These collaborations ensure clients benefit from scalable, reliable and future-ready solutions tailored to their unique needs.

With a steadfast commitment to innovation, quality and customer satisfaction, Intertech Vision ME continues to push the boundaries of control room technology. The company’s expertise and forward-thinking approach empower organisations to achieve operational excellence and thrive in complex, dynamic environments. itv-me.com

Discover how Altronix is redefining power and connectivity at Intersec Dubai, Stand S2/D18. As a global leader and US-based manufacturer of power and data transmission solutions, Altronix delivers innovative products that secure and connect critical infrastructure, enhancing safety and efficiency worldwide. From advanced power supplies and network switches to robust pre-wired integration access and power products Altronix designs products to simplify installations, reduce costs and ensure seamless operation.

Explore its latest solutions, including the award-winning Trove™ Access and Power Integration Series, NetWay™ Spectrum Hardened PoE Switches, Pace™ Long-Range Ethernet Solutions and more! Learn how Altronix’s LINQ™ Network Management Technology provides remote power diagnostics and control, ensuring optimal system performance.

Visit Stand S2/D18 to meet the team, discover customisable solutions for your projects, and experience why professionals around the world trust Altronix for reliability, lifetime warranty, and industry-leading support! altronix.com

CTF CONSOLES

This year at Intersec Dubai 2025, CTF will be launching its brand-new redesigned console range, featuring an innovative eco-friendly design crafted with sustainability in mind. With tabletops that are made from 100% recycled palm tree leaves, paired with recycled mild steel, the company is showcasing its commitment to both quality and the environment.

Known for designing, manufacturing and installing world-class technical furniture for Control Rooms and Meeting Spaces, CTF ensures unmatched craftsmanship from its state-of-the-art factories in Dubai.

The consoles meet ISO 11064-4 ergonomic standards and include features like integrated PDUs, monitor arm brackets, state-of-the-art cable management and wireless charging pads.

With delivery times as fast as three weeks in the UAE and a 10-year warranty on the metal frames, CTF continues to redefine efficiency and sustainability. Visit CTF at Intersec Dubai 2025 and see why CTF is the go-to choice for control room solutions in the GCC! ctfconsoles.com

HOCHIKI MIDDLE EAST

Hochiki Middle East, a leading provider of innovative fire safety solutions, will be showcasing its cuttingedge products at Intersec 2025. Renowned for its expertise and trusted product range, Hochiki will highlight its latest advancements, including the advanced Latitude fire alarm system, the intelligent FIREScape Nepto, the versatile Ekho, and the world-renowned ESP range. These products, backed by global compliance and approvals, including Civil Defence certifications, ensure the highest standards of fire safety.

Hochiki’s commitment to excellence is evident in its successful projects across the Middle East, including the prestigious Dubai Metro and the state-of-the-art Outpost Al Barai installation. By participating in Intersec 2025, Hochiki aims to strengthen its position as a trusted partner in the fire industry, offering reliable and innovative solutions to safeguard lives and property. hochiki.ae

The Middle East’s physical security market is experiencing significant growth, driven by increased investments in critical infrastructure protection, smart city initiatives, and advanced surveillance and access control technologies. According to the 2025 Genetec State of Physical Security Industry Report, the integration of AI and cloud-based solutions will further accelerate technology adoption in the region.

At Intersec 2025, as a global technology company that has been transforming the physical security industry, Genetec will spotlight the latest innovations in unified security and cloud-ready solutions. This includes its flagship platform, Security Center 5.12, which was recently approved by Dubai’s Security Industry Regulatory Agency (SIRA), featuring enhanced map capabilities and authentication improvements for streamlining operations at large, complex facilities.

Genetec will also present Operations Center, a cloud-based work management solution transforming physical security operations, and Cloudlink™ 110, a compact, cloud-managed security appliance enabling seamless hybrid and cloud transitions. Genetec remains committed to future-proofing businesses with cutting-edge solutions and looks forward to connecting with its customers and partners and further reinforcing its commitment to shaping the future of security. genetec.com

RAPISCAN

Rapiscan is an industry leader in security checkpoint technology, providing screening systems to help borders, ports, airports, military, high-threat locations and law enforcement combat terrorism, smuggling and trade fraud. Its broad array of scanning systems leverage X-ray inspection, optical inspection and radiation detection technologies to address each customer’s unique security application requirements. Customers can further enhance inspection capabilities and operational efficiencies with the analyst assist tools and data integration platform. With this technology, information can be collected and combined from multiple sources in the inspection operation to automate manual processes, control workflows and deliver targeted, actionable intelligence.

Visit Rapiscan at Intersec where it will be demonstrating a range of its checkpoint security technology, including facial recognition, vehicle classification, vehicle and baggage X-ray screening, under-vehicle inspection, metal detection and more. Rapiscan’s commitment to quality and innovation ensures its solutions help customers find threats and contraband with ease and confidence.

rapiscan.com

INTEGRATED CONTROL TECHNOLOGY

PERCO

PERCo equipment will be presented at the Intersec international security exhibition on January 14-16, 2025 in Dubai, the UAE. At the Intersec international security exhibition, PERCo will showcase access control solutions demanded both in the Middle East and worldwide.

• ST-01 Speed gate with a barcode scanner

• ST-11 Compact Speed Gate with a face recognition terminal

• RTD-14 Full height rotor turnstile featuring IP66 protection rating

• TTR-11A Motorized tripod turnstile with automatic anti-panic function

• WMD-06 Motorized swing gate

• IRP-01.9Q Reader post

PERCo is a leading manufacturer of turnstiles and access control equipment. It has 37 years in the security market and exports to 95 countries worldwide. With an office, showroom and warehouse in Dubai, UAE, it also offers a five-year warranty on the whole of its product range.

perco.com

Integrated Control Technology (ICT) will be exhibiting at Intersec Dubai, demonstrating Protege GX, its enterprise platform, with unified access, intrusion detection and building automation features. The scalable and open system integrates with third-party solutions and recent developments will be showcased at the event. This includes the dual integration with Milestone XProtect, which allows users to manage VMS events and commands within the Protege platform, or manage access and intrusion events within the XProtect smart client. Integration with lift manufacturers will be another highlight, with the soon-to-be-released Kone Office Flow integration.

ICT provides a complete solution, including physical and mobile credentials and card readers. A new range of slim, secure, multi-technology readers, that are able to read a wide variety of third-party credentials and equipped for over-the-network updates, will be demonstrated live at the event.

ict.co

22–24

DMEX

securex.kz

dmex.najat.ae 30

SECURITY

securitymiddleeast

intersec-ksa.ae.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.