For subscriptions and advertising enquires, or for further information on the magazine visit our website at: securitymiddleeastmagazine.com
UP FRONT
Welcome to the February issue of Security Middle East, a month that finds us energised and inspired by the resounding success of Intersec Dubai 2025. Our team was on the ground, connecting with industry leaders, innovators and visionaries, capturing the vibrant energy and cutting-edge solutions that defined this landmark event. If you couldn’t join us in person, don’t worry – our exclusive Expo Lives are now available online, offering you a front-row seat to the discussions and demonstrations that are shaping the future of security. Find out more on page 21. This issue delves into the critical challenges and opportunities facing our region. We explore the essential role of encryption in strengthening data access security, providing insights into how organisations can safeguard their most valuable assets in an increasingly digital world (page 28). In the healthcare sector, we examine the vital need to protect Internet of Medical Things (IoMT) devices, ensuring the integrity and reliability of critical patient data (page 16).
Furthermore, we uncover the power of citizen development in empowering employees and bolstering business security, a crucial strategy for organisations of all sizes (page 32).
As we look ahead, we’re thrilled to announce that the Security Middle East Conference 2025 is just months away, and this issue is packed with exciting updates on what you can expect. We’re building on the momentum of previous years, promising an even more impactful and insightful event. Take a look at page 12 to find details on new developments and initiatives for this year’s event and exclusive opportunities to connect with the region’s leading security professionals.
Cora Lydon Editor
cora.lydon@securitymiddleeastonline.com
ISSUE 142 FEBRUARY 2025
MONITOR
03 Up front
Foreword from the Editor
07 News Monitor
The latest regional and international security news
08 Market Monitor
A roundup of the latest security products and solutions
10 Cover story: Bosch
Find out more about how Bosch’s AI-enabled video security is transforming security intelligence in the Middle East
FEATURES
12 Security Middle East Conference 2025
We’re excited to unveil some of the new features and plans for the forthcoming annual Security Middle East Conference – find out what you have to gain when you join us in Riyadh
21 Intersec 2025 Expo Lives
Held in January in Dubai, Intersec 2025 proved to be another highly successful event. Security Middle East magazine was in attendance, meeting and interviewing leading experts from the world of security for our Expo Live showcases
22 Profit & protect:
AI’s data dividend
Christian Stechel, Partner, and Gustave A Cordahi, Principal, of Strategy&, Middle East, part of the PwC network, explore the option of monetising data to support governments with effective and efficient public safety solutions at scale
24 Why smart surveillance is sustainable surveillance
Sustainability is no longer just an environmental goal; it’s reshaping industries — including security, says Louise Bou Rached, Sales Director, Middle East, Turkey and Africa, Milestone Systems
26 How the Middle East is redefining access control
Vishal Khullar, Director of Business Development – META, Wavelynx, considers the industries driving demand, cultural and regulatory influences and the operational challenges that are defining the future of security
28 Locking down data
Ali Muzaffar, Assistant Professor at School of Mathematical and Computer Sciences, Heriot-Watt University Dubai, explores the role of encryption in strengthening data access security
32 Power to the people
Dinesh Varadhrajan, Chief Product Officer at Kissflow, shines a light on shadow IT and explores how citizen development can empower employees and protect businesses
36
Winning customers, safeguarding data
Andreas Hassellöf, CEO of Ombori, takes a closer look at why excellent identity management is essential to keep ahead of the loyalty game
CYBERSECURITY
16 Protecting patients
Osama Alzoubi, Middle East & Africa Vice President, Phosphorus Cybersecurity, explores IoT healthcare devices; their role, risks and the solutions needed to keep systems safe in 2025
34 Building a resilient supply chain
Ensuring the resilience of your supply chain is critical in today’s volatile business environment. Dan Norman, ISF Regional Director, EMEA, explores the steps that are needed to monitor the risks associated with your supply chains
INDUSTRY MONITOR
40 Case study: Scati Cloud
When a leading European company in wireless telecommunications infrastructure needed support for a protection pilot project in some of its base stations it selected Scati Cloud’s video surveillance platform
42 Pioneering a safer future through innovation and excellence
The Professional Security and Safety Alliance (PSSA) is excited to share its plans to improve global security and safety
45 Interview: mega events
Helmut Josef Spahn, FIFA Director Safety, Security and Access, discusses his role and the security challenges that come with mega events
46 Diary
Diary dates for forthcoming security exhibitions, conferences and events
THIS ISSUE’S PARTNERS & CONTRIBUTORS
Vishal Khullar
Head, Wavelynx
Vishal Khullar is head of Wavelynx’s operations in the region, where he works on tailoring the company’s innovative access control solutions to address the unique requirements of local commercial organisations.
Daniel Norman
Regional Director, EMEA, Information Security Forum (ISF)
Daniel Norman’s role at the ISF is to help organisations manage their current and emerging cyber risks.
Christian Stechel
Partner, Strategy&, Middle East
Christian has 18 years of experience in IT and management consulting. His main areas of expertise include strategy formulation, operating model development and large-scale business transformation for technology clients.
Gustave A Cordahi
Principal, Strategy&, Middle East Gustave has a civil and environmental engineering background and is a versatile strategy consultant with expertise in transportation engineering, disruptive technologies and strategic planning.
Sponsors
Geutebrück represents high-performance video management solutions that meet the highest security requirements. Our solutions offer flexible integrations with existing systems and enable seamless processes. With our premium service, we are at your side worldwidereliably, quickly and individually.
Rely on Video Security Made in Germany for your security and process optimization.
www.geutebrueck.com
Matrix achieves SIRA certification in Dubai
Matrix has announced that its Network Cameras and Video Management Software have been certified by the Security Industry Regulatory Agency (SIRA) for the Dubai region.
SIRA Certification is a comprehensive evaluation process that involves stringent quality checks, compliance with local regulations and performance benchmarking. To achieve this, Matrix demonstrated its Network Cameras and Video Management Software deliver reliability, data security and functionality under Dubai’s environmental and operational conditions.
The SIRA Certification allows Matrix to access critical markets in Dubai, including government projects, large-scale infrastructure, retail, healthcare and hospitality.
The Middle East is facing a growing number of cyber attacks and data breaches, raising concerns about national security and data privacy. According to reports, various sectors, including healthcare and government, are being targeted, leading to significant disruptions, such as the Israeli Health Ministry’s incident that affected patient care.
Due to this, governments are reassessing their cybersecurity strategies, with the UAE implementing training programmes for officials to combat attacks. Political analysts have vocalised that the rise in cyber attacks could be related to regional conflicts.
GOOGLE DELIVERS US$15M TO SUPPORT CYBERSECURITY EDUCATION IN MEA
Google recently announced that more than 20 universities have been selected to receive Google.org support to expand access to cybersecurity education on campuses.
The programme will include higher education institutions across the Middle East and Africa to help tailor programmes and curriculum to best serve the cybersecurity landscape via emerging technology and policy nonprofit Virtual Routes.
The universities will also be open to receiving internships, mentorship from cybersecurity professionals, and hackathons as a part of the scheme. This initiative aims to protect more than 3,500 local community organisations across the different communities from cyber attacks.
IN BRIEF
KUWAIT’S EMIR DISCUSSES TIES WITH UAE NATIONAL SECURITY ADVISER
The Emir of Kuwait discussed the country’s ties with the UAE during a meeting with the Deputy Ruler of Abu Dhabi and National Security Adviser and wished the nation further progress and prosperity.
DUBAI USES NEW AI SOLUTION
The Security Industry Regulatory Authority (SIRA) launched the Tawash system, unveiled at the Intersec 2025 exhibition, an AI-powered digital solution designed to transform the security of gold and jewellery transportation in Dubai.
UAE REVEALS MORE THAN 200,000 CYBER ATTACKS PER DAY
The UAE Cyber Security Council revealed that cyber attacks targeting strategic sectors in the country have hit more than 200,000 daily attacks by cyberterrorist groups across 14 countries.
TUNISIA AND SAUDI ARABIA DISCUSS STRENGTHENING SECURITY TIES
Tunisian President Kais Saied met with Saudi Interior Minister Prince Abdulaziz bin Saud bin Nayef bin Abdulaziz at the Carthage Presidential Palace to discuss bilateral relations and security cooperation focusing on strengthening security ties between the countries.
SAUDI ARABIA FINDS PHISHING BIGGEST RISK
Phishing has been noted as a significant cybersecurity threat in Saudi Arabia, according to a report released by Sophos. The Kingdom of Saudi Arabia Cybersecurity Awareness Survey 2024, conducted by Ken Research, talked to 300 IT experts based in Saudi Arabia, finding that 74 per cent of respondents experienced phishing attacks.
Secure Logiq expands team in Saudi Arabia
and Bahrain
Secure Logiq has revealed the appointment of Hossam Abouzeid as Business Development Manager for the Kingdom of Saudi Arabia and Bahrain.
“I am honoured to be part of a team that is pioneering innovation in this space,” said Abouzeid.
“I am looking forward to driving success, fostering partnerships and contributing to safer, smarter communities. Projects here are immense and I am certain that the Secure Logiq product portfolio is perfectly positioned to offer the very best engine to any hyper scale electronic security solution.”
6CLICKS LAUNCHES OPERATIONAL RESILIENCE SOLUTIONS
6clicks has introduced its new custom registers to support Middle Eastern organisations in meeting key regulatory requirements. This solution is designed to align with local requirements, such as the Saudi Central Bank’s Cybersecurity Framework and the Dubai Financial Services Authority’s (DFSA) Rulebook for Authorised Market Institutions. It features:
1. Strengthened operational resilience. You can create off-the-shelf registers tailored to various data sets such as information assets, cybersecurity events and incidents, service provider contracts, and business continuity plans to organise and track key metrics for operational resilience, ensuring compliance with SAMA and DFSA mandates.
2. Streamlined compliance management that enables organisations to configure data fields and workflow stages according to your existing risk and compliance processes to ensure consistency.
3. Advanced data security to assign detailed permissions to authorised users to limit access to each register or register item, enhancing governance and security.
4. In-depth insights enabled by data linking across the platform and generating turnkey reports to gain critical insights into the effectiveness of risk mitigation and operational resilience measures.
6clicks.com
Vegvisir unveils virtual command station
Vegvisir made waves in the military technology sector, with the unveiling of its Vegvisir Virtual Command Station at IDEX 2025.
This VR-based command solution promises to transform fleet management and command and control operations by replacing traditional screens with a compact and interactive virtual workspace. The system aims to enhance decisionmaking and operational efficiency within diverse command environments, from infantry fighting vehicles to large command centres.
Ingvar Pärnamäe, CEO of Vegvisir said: “With Vegvisir Core, we gave manned platforms a see-through-armour capability. With Vegvisir Remote, we brought this innovation to unmanned and optionally manned assets, enabling first-person view capabilities for ground vehicles. Now, with the Vegvisir Virtual Command Station, we are advancing fleet management and multi-domain integration by seamlessly fusing different data streams.”
Qualys, Inc. has announced TotalAppSec, its new AI-powered application risk management solution enabling organisations to monitor and mitigate cyber risk from critical web applications and APIs.
Qualys TotalAppSec unifies API security, web application scanning and web malware detection across on-premises, hybrid and multi-cloud environments, providing companies with a comprehensive view of their application security risk and posture.
This allows organisations to immediately assess and prioritise their most critical application risks across the entire enterprise and further streamlines remediation efforts to quickly reduce their risk.
“Enterprises are increasingly prioritising the security of web applications and APIs as threats grow in complexity. Safeguarding these assets is now a fundamental requirement for maintaining trust and operational resilience,” said Katie Norton, Research Manager, DevSecOps and Software Supply Chain Security at IDC. “Solutions like Qualys TotalAppSec can help break down organisational silos between infrastructure, web applications and API risk, providing the context and visibility security teams need to collaborate effectively. By delivering a holistic view of application security, teams can prioritise the most critical threats and take decisive action to mitigate risk more efficiently.” qualys.com
ATERMES unveils latest solutions at IDEX 2025
ATERMES presented its SURICATE product – an advanced multispectral threat detection system.
SURICATE is a next-generation smart surveillance camera system integrating state-of-the-art multispectral sensors with embedded artificial intelligence and edge computing. This fusion enables real-time object detection, classification and tracking with unparalleled accuracy, even in the most demanding environments.
The system’s AI capabilities continuously evolve through deep learning, ensuring adaptability to specific operational needs and security landscapes. It enhances situational awareness and empowers military and law enforcement agencies to prevent illegal crossings, smuggling and border security breaches.
For airport protection against bird strikes, it provides a solution to aviation’s persistent challenge through its ability to detect and track birds with precision which enables early warnings and actionable data, reducing operational disruptions and enhancing flight safety. atermes.fr/en
AVIATION SECURITY STRENGTHENED FOR UAE
ADASI, a UAV system manufacturing company, has announced its adoption of two advanced autonomous flight technologies by Abu Dhabi’s VentureOne.
The solutions are Perceptra, a new GPSless navigation technology, and Saluki, a high-security flight control technology for autonomous systems. These technologies have been optimised for UAV manufacturers, offering enhanced security for autonomous aerial operations.
The agreement between VentureOne, ADASI and TII was seen at IDEX 2025, where Saluki and Perceptra were unveiled.
Dr Najwa Aaraj, CEO of TII, said: “Perceptra, with its GPS-less capabilities, and Saluki, with its sophisticated Zero Trust architecture, represent a significant leap in autonomous navigation with the potential to transform multiple sectors. From supporting safe travel in commercial flights and search-and-rescue missions with precise navigation, to enabling efficient urban drone logistics for deliveries in densely populated cities, these technologies have broad real-world applications.
“Their adaptability also makes them invaluable in defence, ensuring secure and resilient operations in even the most challenging environments. This collaboration reflects our commitment to developing advanced, dual-use technologies that serve both civilian and defence needs while positioning the UAE as a leader in next-generation autonomous systems.” adasi.ae
EMERSON SHOWCASES ADVANCED AUTOMATION TECHNOLOGIES AT EGYPES 2025
Emerson showcased its technologies and software at the Egypt Energy Show (EGYPES) 2025, held February 17-19 at the Egypt International Exhibition Centre in Cairo.
Emerson featured a range of innovative automation technologies designed to enhance operational excellence, digitalisation and sustainability for Egypt’s energy sector.
This aligns with the country’s energy security and digital transformation objectives, as outlined in its Vision 2030 and the recently launched National AI Strategy 2025-2030.
“With Egypt unveiling its National AI Strategy 20252030, this year’s EGYPES has never been more relevant, especially when it comes to showcasing how industrial technology and software can support transformation in the energy sector,” said President of Emerson Middle East and Africa, Mathias Schinzel. “As energy companies undertake their own digitalisation efforts, Emerson’s solutions, software and expertise can help them strengthen their technology infrastructure with solutions like digital twins, AI-driven analytics and asset management software that optimise operations and enhance business performance.” emerson.com/en-ae
BeyondTrust reveals new AI-powered identity security solution
BeyondTrust has announced True Privilege™, an AI-powered solution within BeyondTrust’s Identity Security Insights.
True Privilege reveals the actual, effective access an identity – whether human, machine, or workload –holds within complex IT environments. By using AI-driven graph analysis, True Privilege exposes hidden attack paths and the effects of misconfigurations, offering visibility and risk reduction beyond traditional privileged account management (PAM). John Lambert, formerly of the Microsoft Threat Intelligence Center, said: “Defenders think in lists, attackers think in graphs.” beyondtrust.com
Anticipating threats, securing the future: how AI-enabled video security is transforming security intelligence in the Middle East
The Middle East is evolving at an unprecedented pace with rapid urbanisation, expanding critical infrastructure and increasing security risks. The complexity of these challenges demands more than just traditional surveillance – it requires intelligent, data-driven security solutions that predict, prevent and respond in real-time.
How can AI-enabled video security help tackle these challenges?
By shifting from passive monitoring to proactive threat detection, security systems equipped with AI can analyse vast amounts of video data, detect anomalies and trigger instant alerts –empowering security professionals to act before incidents escalate. The result? Smarter cities, safer critical sites, and stronger perimeter defence.
Bosch is at the forefront of this evolution, offering a range of AI-enabled video security solutions that can transform the security paradigm from reactive observation to proactive prevention.
Harnessing the power of visual intelligence
AI is not just about identifying threats –it’s about unlocking valuable insights that enhance overall security operations. AI is improving safety in urban environments, enabling cameras like the FLEXIDOME 8100i to extend beyond traffic monitoring and function as sensors that help keep vehicle and pedestrian traffic flowing efficiently with automated incident detection and alerts. By streaming metadata, these intelligent sensors empower urban planners and engineers to make informed, data-driven decisions that improve safety and operational efficiency. Team this with IVA Pro Traffic, and you have a proven solution that achieves an impressive accuracy rate of over 95% for real-time event detection. You can further elevate the power of data by adding cloud-based software services, to offer invaluable insights that pave the way for strategic decision-making.
For those seeking even greater data capture capabilities, the IVA Pro License Plate and IVA Pro Make Model systems bring a new layer of detail to the metadata stream. The IVA Pro License Plate feature excels in low-speed vehicle access control, toll booth applications and even medium-speed environments such as city surveillance and unfettered traffic monitoring. These tools ensure that security professionals can access
comprehensive vehicle information –license plate, make and model – at their fingertips.
Likewise, thermal imaging solutions, such as the DINION thermal 8100i camera, excel in challenging conditions, offering exceptional performance in low-light and adverse weather. It provides critical situational awareness, even in the most demanding environments, including complete darkness, thick smoke or challenging lighting scenarios.
Marking a step forward in thermal imaging technology, this camera can achieve an impressive 99% detection rate with very few false positives, giving users peace of mind. It can analyse video content from up to 550 metres away and is tough enough to endure the harsh environmental conditions that can occur in the region.
By capturing a wealth of metadata simultaneously, our cameras equip security teams with the insights they need to make proactive, informed decisions. Greater situational awareness helps anticipate security incidents and plays a vital role in fostering secure environments without causing disruption.
Beyond technology: a strategic transformation
Embracing AI-enabled security is more than just a technological shift – it’s a strategic move towards greater efficiency, reduced costs and enhanced situational awareness. Predictive analytics, intelligent video surveillance, and automated threat detection allow organisations to move from a reactive stance to a proactive security ecosystem.
Looking ahead: a commitment to innovation and customer success
As the Middle East continues to evolve, so do the threats it faces. AI-driven security is no longer a luxury – it’s a necessity. With ongoing investments in AI and an expanding suite of Intelligent Video Analytics Pro (IVA Pro) offerings, we remain committed to enhancing the capabilities of our security solutions.
“AI is not just about identifying threats – it’s about unlocking valuable insights”
MEET THE AUTHORS
Daniel Fernández
Daniel Fernández is Vice President of Sales & Marketing, Bosch Video Systems and Solutions in the Middle East, Turkey, Africa & Iberia. He has 25 years of international leadership experience with a strong focus on strategy deployment and business development in the region. A firm believer in a people-first business culture, Daniel is passionate about prioritising customer experience while driving results and fostering impactful growth.
Mushtaq Raza
Mushtaq Raza is Managing Director, Middle East & Turkey, Bosch Security and Safety Systems. He has over 20 years of techno-commercial experience working in the field of communication and security systems. He achieves targets through relationship building and maintaining strategic alliances and is committed to professional excellence.
We recently shared some important news at Bosch Building Technologies. Bosch plans to sell most of its product business to Triton, including our video, access control, intrusion alarm and communication systems. Working with Triton is an excellent opportunity for us and will bring significant benefits to our customers. Triton’s expertise will help us grow and innovate in security and communications while maintaining our quality.
Our vision extends beyond current technological boundaries, constantly pushing the limits of what’s possible in security intelligence. Our team is excited about this new direction and remains dedicated to being a reliable partner for our customers, ensuring that organisations across the region have the tools, technology and intelligence to stay ahead of emerging risks.
In a fast-moving market, growth comes to those who act decisively, adapt quickly and push beyond limits. By embracing AIdriven intelligence, we can build a safer, more secure future for the region.
ELEVATE YOUR SECURITY STRATEGY: SECURITY MIDDLE EAST CONFERENCE 2025
Pioneers of today, shaping tomorrow. Join the exclusive gathering of security leaders in Riyadh
Step into the future of security at the Security Middle East Conference 2025, an exclusive, invite-only gathering of the region’s top security executives, consultants and influencers. This isn’t just another conference; it’s a strategic platform designed to empower you with the knowledge, connections and cuttingedge solutions needed to thrive in today’s dynamic security landscape.
By attending this one-day conference you can gain unparalleled insights into the world of security to ensure you
have the tools you need to succeed in the industry.
We will be diving deep into critical security challenges with high-level discussions, keynote addresses, and expert panels featuring leading regional stakeholders and global industry experts. And your ticket will put you right at the centre of this.
We’ll be tackling how to master strategic security with a wide range of topics being discussed in a variety of formats. The topics range from enhancing
ROI through security functions to securing the region’s mega events, cybersecurity and more.
With up to 500 powerful security professionals in the room you’ll also have plenty of opportunity to network and forge powerful connections to turbo-charge your career. It’s the perfect opportunity to build valuable relationships, engage with leading solution providers and discuss key challenges with like-minded individuals.
This year we’re bringing even more value to your ticket with handson workshops led by industry veterans including Icon Training Co and the International Foundation for Protection Officers, supporting you to gain vital practical skills and professional development.
Plus, our new Tech Stage will ensure you can experience innovation firsthand.
This is your opportunity to discover the latest security technologies and solutions, with live demonstrations and presentations from leading vendors.
Our promise to delegates
This year we’ve worked hard to improve on our Security Middle East Conference ensuring that all of the content aligns with one of our three promises to delegates: networking, knowledge and future-
proofing. Whether it’s mingling with new faces at one of the break-out coffee sessions or working alongside esteemed colleagues at a workshop; absorbing practical information and best practices gained at one of the presentations or panel discussions; or gaining practical and valuable insight from leading security experts at a presentation to future-proof your role in the industry, your attendance will ensure a day focused on what will benefit you the most.
And all of the discussions and presentations align with Saudi Vision 2030 making it a must-attend for anyone working in the region, to equip them
NETWORK: BREAK-OUT SESSIONS
When connections are everything, this one-day event delivers.
We have multiple sessions throughout the day for informal and formal networking. The day will start at 8am, where we will welcome delegates and provide them space to meet and greet their peers. This hour-long session will allow for connections to be forged, details to be exchanged and to meet like-minded people who are as invested in the security arena as you are.
Our second networking session will perfectly break up the panel discussions taking place on stage. As we break for a chance to get refreshments, there is also the opportunity to pick up on the vital conversations being discussed and to align yourself and identify suitable partners you’d like to be in touch with.
We’ll then have a final networking session after lunch, giving you that final opportunity to cement new connections, extend a business invitation or pass on contact details for future discussions.
Our conference App will also be facilitating these connections by enabling you to share contact details with other delegates you wish to. New for 2025, our App will ensure that the networking opportunities are elevated, supporting sponsors, speakers and delegates to view other attendees, build their own custom agendas, find out what’s happening where on the day, and make new connections. It will host bios for all of our speakers, maps,
with the tools and knowledge to contribute in their own way to the region’s ambitious goals.
FUTURE-PROOF:
The presentations
To keep the day feeling fresh and exciting we’ll be hosting a number of different discussions through a range of mediums – each carefully tailored to reflect the best possible way to impart vital knowledge.
agendas, contact lists, image galleries and more with the goal of providing a seamless, intuitive experience for all who attend.
The Security Middle East Conference is a powerful vehicle for facilitating new connections and business relationships. At last year’s conference, a strategic partnership between Forte Secur Group and Icon Training Co was conceived, with the two companies fostering a new connection as a direct result of their involvement with the conference.
With a focus on shared goals and expertise, participants at the 2024 event found common ground in their commitment to advancing security practices and developing a skilled workforce. By facilitating these dialogues, the Security Middle East Conference not only highlights the current needs of the industry but also plays a vital role in shaping the future of security in the region.
We have four of our ever-popular panel discussions, where regional and global experts will take to the stage to consider, dissect and advance some of the region’s most pressing security challenges. As in previous years, our audience will be directly involved, with plenty of opportunity to propose their own thoughts and ideas, ask questions or suggest potential solutions.
This year’s panels will include:
Security as a Profit Centre:
Unlocking ROI Through Safety & Security
Are you ready to transform your security and safety functions from cost centres to strategic assets? This panel delves into the powerful connection between security and business value, revealing how proactive strategies, cutting-edge technologies, and best practices can directly enhance your ROI and operational resilience. Join our experts as they unpack how to align security with core corporate objectives, turning potential risks into tangible rewards and future-proofing your business in today’s dynamic landscape.
Mega Event Security: Master the Art of Global Protection
Want to know the behind-the-scenes strategies that ensure the safety of the world’s most anticipated events? With Saudi Arabia hosting the World Expo, Asian Winter Games and FIFA World Cup, this panel offers a rare glimpse into the complex world of mega-event security. Discover how cultural nuances, cuttingedge technologies and collaborative frameworks are used to protect attendees, infrastructure, and national interests – giving you the insider knowledge to secure your own high-profile events. Plus we’re already discussing with our Advisory Board, panel of experts and readers of the magazine the other vital topics that we need to be covering, including cybersecurity and the tools that will be required in the future.
Alongside our panel discussions we’ll also have a number of keynote speakers lined up to address the audience on their specialist topic. Plus we’ll be introducing our Live Podcast sessions – on-stage discussions on a one-to-one basis where we can really get to grips with specialist topics in an informative, friendly manner. The Live Podcasts will be recorded on stage and then shared with our wider
audience immediately after, adding even more value to the wider security community by sharing the insights direct from the stage.
KNOWLEDGE:
The workshops and Tech Stage presentations
We’re committed to building knowledge and working together to tackle the state of security collaboratively. Which is why this year we’re introducing additional workshops, supporting delegates to further their skill sets, as well as Tech Stage presentations, allowing delegates to get a glimpse of what leading vendors are working on and how they’re supporting the security service to advance and innovate.
This year our delegates have the opportunity to join one of the workshops that will be taking place in the afternoon, giving them the choice to focus and hone in on the topic that will most support their career advancement. We’ve already confirmed a workshop with Icon Training Co plus, in association with the International Foundation for Protection Officers, we will be hosting a two-day masterclass on Sunday 12 and Monday 13, with exclusive invites going to 25 carefully selected delegates. These workshops and masterclasses will provide ample opportunity to ask questions, learn new skills and go home with actionable insights and information.
In addition, our new Tech Stage presentations will showcase cutting edge innovation and technological marvels with leading vendors on hand to answer your questions, demonstrate the potential of their technology and explain how key security issues can be tackled with ease. We have lined up 20-minute presentations from some of our supporters, and our delegates will be able to experience for themselves technology from Limitless Technologies; Magnet Forensics; NEDAP; Allied Telesis and PureTech Systems.
Shaping the Security Middle East Conference
Our goal with the Security Middle East Conference is to continue to innovate to ensure we deliver an event that is a worthy investment of your time. To ensure the highest quality content and address the most pressing industry challenges, we’ve assembled a distinguished Advisory Board comprising leading global
experts in the world of security. Our board members bring a wealth of knowledge and experience to the table, shaping the conference agenda and contributing to insightful discussions.
We’ve worked closely with our Advisory Board to introduce new features, streamline what we offer and ensure every single session delivers strongly on networking, imparting knowledge and future-proofing your career.
This year’s Advisory Board is made up of:
Cora Lydon – Editor: Security Middle East Magazine
Turki Alshalhoub – Safety & Security
Senior Manager: Diriyah Gate Development Authority
Sami Altowaini – Director of Security, Safety, Transportation: KAPSARC
Daniel Norman – Middle East Regional Director: Information Security Forum
Tawfeeq Alsadoon – Group Head of Security: Red Sea Global
Nadeem Iqbal – Middle East Regional Director: International Foundation for Protection Officers
Luke Bencie – Managing Director: Security Management International
Rasheed Alzahrani – Safety & Security Director: King Salman Park Foundation
MEET THE SPONSORS
Eagle Eye Networks
Eagle Eye Networks Cloud Video Management System delivers modern, easy-to-use cloud video surveillance paired with advanced features on the world’s most flexible, open platform. Eagle Eye VMS seamlessly integrates with hundreds of security partners allowing customers to add Eagle Eye to their established security portfolio. www.een.com
Convergint MEA
Convergint is a renowned global systems integrator with expertise in designing, installing and servicing electronic security, cybersecurity, fire and life safety, building automation, and audio-visual systems. The company is expanding its reach into Saudi Arabia to meet the increasing demand for cutting-edge technologies and smart city solutions. www.convergint.com
CTF Consoles
The only specialised control room console production facility in the GCC, with highly skilled in-house designers, ergonomic experts, and engineers, CTF Consoles found a gap in the market in terms of delivering control room technical furniture in two weeks. www.ctfconsoles.com
Threatlocker
ThreatLocker® improves enterprise-level server and endpoint security with zero trust controls, including Allowlisting, Ringfencing™, Elevation, Storage, Network Control, Configuration Management and Operational Alert solutions. www.threatlocker.com
Magnet Forensics
Magnet Forensics develops digital investigation solutions that acquire,
analyse, report on, and manage evidence from digital sources, including mobile devices, computers, IoT devices and cloud services. Magnet Forensics’ products are used by more than 4,000 public and private sector customers in over 90 countries and help investigators fight crime, protect assets and guard national security. www.magnetforensics.com
Limitless Parking
Limitless Parking is redefining parking with AI-powered, cloud-born, ticketless and cashless solutions. Its mission is to streamline parking by creating a seamless, efficient, and secure experience for clients – individuals and businesses. The company’s smart parking technology eliminates congestion, significantly reduces waiting times, and enhances user convenience.
www.limitlessparking.com
ONVIF
Founded in 2008, ONVIF is a leading industry forum promoting interoperability for IP-based security products. With a global membership of camera, video management, and access control companies, it supports over 30,000 profile-conformant products.
www.onvif.org
PureTech Systems
PureTech Systems Inc. was established in 2004 and develops, markets and supports its patented location-based AI-boosted video analytics software, PureActiv®, for real-time safety and security applications. Its primary emphasis is on autonomous perimeter intrusion detection of ground and aerial targets for country borders, coastlines, facility perimeters and critical infrastructures.
www.puretechsystems.com
Of course, the Security Middle East Conference couldn’t happen without the support of our sponsors.
Information Security Forum (ISF)
The ISF specialises in delivering industryleading bespoke guidance and services to businesses, to allow them to navigate the challenges of the digital landscape.
www.securityforum.org
A dynamic VIP conference with keynote addresses, panel discussions, TED-style talks, and live podcasts.
A dedicated exhibition area showcasing cutting-edge security solutions.
Intimate roundtable networking opportunities with industry peers.
Tech Stage sessions featuring live demonstrations and presentations.
In-depth afternoon workshops for professional development.
An exclusive Information Security Forum Middle East chapter meeting for leading CISOs.
Join us on Tuesday May 13th 2025, at the VOCO Hotel Riyadh and become a pioneer shaping the future of security in the Middle East.
Don’t miss this opportunity to be part of an exclusive gathering of security leaders. Secure your invitation today!
PROTECTING PATIENTS
With 67% of healthcare organisations facing ransomware in 2024, how can we secure the future? Osama Alzoubi, Middle East & Africa Vice President, Phosphorus Cybersecurity, explores IoT healthcare devices; their role, risks and the solutions needed to keep systems safe in 2025
A new era is unfolding in healthcare thanks to Internet of Medical Things (IoMT) healthcare devices. With the IoMT market projected to reach a staggering US$861.3 billion by 2030, according to a report by Grand View Research, Inc, it’s clear that these devices are not only technological tools but foundational pillars for patient care and the future of healthcare. These smart devices enable real-time data collection, remote health
monitoring and even predictive analysis to address potential health issues before they arise.
However, like any technological leap, these advancements come with significant risks. As reliance on IoT and IoMT devices grow, so does the healthcare sector’s exposure to cyber threats. Sensitive patient data, considered one of the most valuable assets in the digital age, has become a prime target for cybercriminals.
What are IoT healthcare devices?
IoT healthcare devices, often referred to as the Internet of Healthcare Things (IoHT) or IoMT, are smart, connected tools designed to improve the quality and efficiency of medical care. These devices include wearables like fitness bands, smartwatches, and even advanced solutions such as heart rate monitors, glucose monitors and remote patient monitoring devices. They bridge the gap
between traditional healthcare and digital innovation by continuously monitoring patient health, automating tasks and providing real-time insights.
From fitness bands to smart pills
IoHT is not limited to advanced hospital settings — it touches lives in everyday situations. Wearable fitness trackers, for instance, monitor heart rate, activity levels and sleep patterns, encouraging healthier lifestyles. For patients with chronic conditions, devices like continuous glucose monitors provide consistent updates, reducing the need for frequent doctor visits.
On a more advanced level, smart pills equipped with sensors can track medication adherence, ensuring patients follow prescribed regimens. These pills transmit data to healthcare providers, helping them adjust treatments in
real-time. Similarly, remote monitoring systems for post-surgical patients allow doctors to track recovery without the need for extended hospital stays.
Additionally, IoT devices excel in providing real-time monitoring that triggers alerts for immediate intervention. For instance, heart monitors can detect irregularities and notify healthcare professionals instantly, preventing cardiac arrests.
One of the most transformative aspects of IoHT is its predictive capability. By analysing patient data over time, IoT devices can identify patterns and warn of potential health issues before they escalate. For example, wearable devices that monitor blood pressure and oxygen levels can predict the likelihood of a stroke, enabling early preventive measures.
Traditionally, healthcare systems have been reactive, addressing issues only
after they arise. IoHT flips this model by leveraging data to move towards preventive care. Devices collect and analyse vast amounts of health data, enabling doctors to tailor treatments and recommend lifestyle changes that mitigate risks. This shift reduces hospitalisations, lowers healthcare costs and significantly improves patient outcomes.
While IoT healthcare devices revolutionise patient care, they also bring an unsettling reality: their vulnerability to cyber threats. These life-saving devices come with hidden security risks that impact patients, healthcare providers and the entire industry.
Why cybercriminals want healthcare data
Healthcare data is unlike any other. It is detailed, sensitive and enduring — making it a treasure trove for cybercriminals. As a result, IoT devices could be used as gateways for stealing sensitive data if not properly secured. A single patient record can fetch a higher price on the black market than financial data due to its use in identity theft, insurance fraud and ransomware schemes. For cybercriminals, healthcare patient data is the ultimate jackpot.
Big risks, big costs
Healthcare operates on a delicate balance of legacy systems, critical operations and vast amounts of sensitive data. Unlike other industries, the margin for error in healthcare is slim — disruptions can directly impact lives. This highstakes environment makes healthcare institutions a prime target for cyberattacks seeking maximum leverage.
Despite the transformative potential of IoMT and IoHT, cybersecurity risks remain a significant challenge. In 2024, 67 per cent of healthcare organisations were targeted by ransomware, up from 60 per cent the previous year. Alarmingly, the average cost of recovery has surged to US$2.57 million per attack, underscoring the financial strain on healthcare providers. Furthermore, only 22 per cent of affected organisations were able to recover fully within a week, a sharp decline from 47 per cent in 2023.
Mind the gap
There are a number of common security gaps that make healthcare vulnerable:
Legacy Systems: outdated and unprotected
Many healthcare facilities rely on outdated devices that lack modern security protocols. These legacy systems present easy entry points for attackers.
Third-Party Risks:
The weak link in the chain Third-party vendors often access hospital networks but may lack robust security measures, creating vulnerabilities that attackers can exploit to infiltrate entire systems.
Shadow IoT Devices: The invisible threat
Unregistered devices connected to hospital networks often bypass security protocols, leaving hidden vulnerabilities that attackers can exploit to compromise systems undetected.
Securing IoT healthcare devices requires tailored solutions to address the unique vulnerabilities of this sector. Developing secure IoT hardware and software is one piece of the puzzle for addressing this challenge. Equally important, however, is ensuring that IoT devices in healthcare are managed properly to protect against data from unmonitored devices falling into the wrong hands. A proactive approach incorporating comprehensive visibility, automated remediation and seamless integration is essential to safeguard patient care and operational integrity.
Achieving full network visibility
Complete network visibility is the foundation of IoT security. Using advanced discovery tools, healthcare providers can identify all connected devices, including legacy and shadow IoT systems that often lack adequate security protocols. This detailed inventory enables organisations to pinpoint risks, such as outdated firmware or weak credentials, and prioritise mitigation efforts.
Moving towards automated remediation
Manual security updates are impractical in healthcare’s dynamic environments. Automated remediation addresses vulnerabilities at scale by applying updates, rotating credentials and patching devices without disrupting daily operations. For example, ensuring a patient monitoring device is running a
“As
cyber threats evolve, the healthcare industry must act decisively”
current version of firmware or ensuring a device is properly decommissioned after it’s no longer needed ensures continuity in patient care, even amid evolving threats.
Seamless integration with healthcare systems
Another key to strengthening IoT security is ensuring that security solutions integrate seamlessly into existing healthcare infrastructure. Effective security measures should align with existing healthcare workflows and infrastructure. Solutions that integrate with established systems allow for rapid deployment, minimal disruption and streamlined compliance. This ensures healthcare organisations can enhance their security posture without a costly operational overhaul.
Strengthening security through a proactive approach
Transitioning to proactive security strategies enables healthcare providers to mitigate risks before they escalate. Real-time monitoring, intelligent device discovery and automated remediation build resilience and reduce downtime, ensuring uninterrupted patient care.
Enhancing compliance and reducing risk
Compliance with regulations such as HIPAA, GDPR and other region-specific standards is not just a legal obligation for healthcare providers but a cornerstone of trust and operational integrity. Effective security strategies simplify the path to compliance by ensuring that devices and networks adhere to robust security protocols, reducing the risk of penalties and reputational harm. However, the benefits extend far beyond regulatory alignment. Proactively addressing vulnerabilities fosters a culture of resilience within healthcare organisations, where safeguarding patient data becomes integral to daily operations. By automating security processes,
integrating advanced protective measures and continuously improving systems, healthcare providers can build defences that prevent threats before they escalate. This approach minimises the financial and operational strain caused by cyberattacks, allowing organisations to focus resources on what matters most — delivering safe, uninterrupted patient care while maintaining long-term data integrity.
AI: transforming cybersecurity in healthcare
AI-driven security platforms offer real-time monitoring of IoMT devices to assess risks and detect vulnerabilities. Rather than waiting to respond after a breach occurs, they proactively identify and address weaknesses to prevent potential attacks.
A significant advantage of AI platforms is their adaptability. By learning from evolving threats, they can quickly detect anomalies such as unauthorised access or unusual data transfers and intervene before the situation escalates. Furthermore, these systems automate tasks like updating device firmware and configurations, ensuring even older devices remain protected against modern threats.
A partnership for progress
Securing IoT healthcare systems requires more than just advanced technology; it calls for a collaborative approach that advances the entire industry. By adopting proactive security measures, leveraging automation, and ensuring seamless integration, healthcare organisations can create a roadmap to navigate the complexities of IoT security with confidence.
As cyber threats evolve, the healthcare industry must act decisively. By adopting advanced security measures, fostering cross-industry collaboration, and prioritising patient data protection, IoMT can deliver on its promise to revolutionise healthcare safely and effectively. The time to act is now. www.phosphorus.io
Integrate Access Anywhere
Altronix manufactures the largest and most versatile portfolio of power solutions supporting controllers, peripherals, and lock hardware from the leading industry brands. Providing seamless integration that’s scalable for any size access control application. And adding our powerful LINQ™ network management platform lets you remotely monitor, control, and report power diagnostics from anywhere. We’ve got it all covered. altronix.com
Elevate Your Surveillance Operations
The new IDIS Edge AI Camera Plus range takes security and safety to a new level of efficiency for real-time monitoring and incident review
Supercharge your security and safety operations with the IDIS Edge AI Camera Plus range. It features IDIS A-Cut Monitoring and IDIS Deep Learning Analytics (IDLA) Pro event functions - including crowd detection, abandoned object, removed object, fall detection, and violence detection. These new functions enable faster investigations and response times thanks to automatic image cropping, intuitive attribute searches, and advanced automated alerts, as standard.
EXPO LIVE AT INTERSEC 2025
Held in January in Dubai, Intersec 2025 proved to be another highly successful event, uniting the industry and providing opportunities for collaboration, innovation and discovery
The 26th edition of Intersec showcased a record number of exhibitors, representing 61 countries, with the largest edition of the event occupying 61,000 sqm of space, a 20 per cent year-on-year increase at the Dubai World Trade Centre (DWTC).
The event, held under the patronage of His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, welcomed 47,300 visitors from 142 countries, showcasing cutting-edge technologies and critical solutions across five key sectors: Commercial & Perimeter Security, Fire & Rescue, Safety & Health, Cyber Security, and Homeland Security & Policing, in line with the show’s theme ‘Mapping the Future of Security, Safety, and Fire Protection’.
Security Middle East magazine was in attendance, meeting and interviewing leading experts from the world of security for our Expo Live showcases.
Intertech Vision ME
Our Expo Live with Intertech Vision’s Peter Maung explored its latest product offerings to the Middle East market. www.itv-me.com
Vicon Industries
We heard from Guy Nixon on the company’s progress and ambitions for the regional market, as well as the launch of its new NEXT modular camera system, presented by Muawai Kahla, Vicon’s Regional Sales Manager. www.vicon-security.com
Align Tech
Align Tech Founder, Norma Bitar, discusses how the company has transformed since its inception, its latest offerings and the value of strategic partnerships for success.
www.aligntechme.com
Progress Security Systems
CEO, Joseph Faraj, joined Progress’ partners Axis Communications to discuss ambition, progress and achievements in the Middle East region. www.progress-security.com
Icetana AI
Showcasing Icetana AI’s newest technology and innovations, Security Middle East magazine caught up with Muhammad Sheikh.
www.icetana.ai
Genetec
Andrew Elvish, VP of Marketing at Genetec shares the company’s approach to business growth in the market.
www.genetec.com
March Networks
March Networks’ Regional Director, Trevor Sinden, and Chief Product Officer, Jeff Corrall, provide a comprehensive introduction to March Networks’ latest solution ‘Smart Search AI’. www.marchnetworks.com
IRIS ID
Mohammed Murad, Vice President of Global Sales and Business Development at IRIS ID, shares a look at the recent IRIS ID product line, and insights on how the company is planning to expand its offerings in the Middle East market.
www.irisid.com
Salto WECOSYSTEM
Security Middle East spoke with Victor Hage about the company’s latest rebrand and how it seeks to combine the very best businesses from across the industry to deliver high-quality products, services and solutions.
www.saltosystems.com
Johnson Controls
Johnson Controls’ Stuart Bettle discusses the newest additions to the JCI product range, the company’s impressive presence in the Middle East Market, and provides exclusive insights into what Johnson Controls has in store for the market.
www.johnsoncontrols.com
CommPort
Security Middle East Magazine met with Philip Brennan of CommPort Europe during Intersec Dubai 2025, to discuss the company’s latest updates, product developments and ambitions in the Middle East region. www.commport.com
As GCC countries become increasingly urbanised, attractive to tourists, and host significant global events, governments need effective and efficient public safety solutions at scale. Christian Stechel, Partner, and Gustave A Cordahi, Principal, of Strategy& Middle East, part of the PwC network, explore the option of monetising data
The convergence of artificial intelligence and vast data streams is creating a new era for public safety, offering unprecedented opportunities to prevent crime, respond to emergencies more effectively and optimise resource allocation. But the transformative potential of AI extends beyond simply predicting the next crime hotspot; by intelligently analysing the data generated by these systems, cities and organisations are discovering new avenues for revenue generation, creating a powerful incentive for investment in cutting-edge security technology.
One solution is AI-enabled video monitoring, which governments globally are deploying in public spaces. These systems improve public safety costeffectively. Although they require costs to install and operate, our analysis shows that governments can monetise the data from CCTV systems, thereby reducing the overall investment by up to 40 per cent.
These systems can help municipal and national governments create smarter, safer cities for residents and visitors while reducing government agency funding requirements.
The growth in visitors to our region has been remarkable, demanding new security requirements. Saudi Arabia’s Vision 2030 set a goal of 100 million tourists which it has already surpassed –seven years ahead of schedule. Similarly, the UAE seeks 40 million tourists by 2031. At the same time, there is a push to host high-profile events. In addition to the 2022 FIFA World Cup in Qatar and several Formula One Grand Prix races each year, the GCC now holds professional golf, tennis, motorsports and basketball events. In addition, Saudi Arabia will host the 2034 World Cup.
But it’s not sports alone that is drawing in the crowds. There has been Expo 2020 Dubai and LEAP in Riyadh. Saudi Arabia
also has annual pilgrimages, which will involve close to 29 million people in 2025.
AI power
While video technology to manage public safety is not new, it has previously required active, manual monitoring by employees. Today, AI can support that process, with algorithms detecting anomalies and automatically triggering the appropriate response. These systems also serve as a deterrent, preventing crimes before they can happen.
The challenge is to deploy this technology in a scalable and effective manner. AI-enabled security requires considerable capital investment to install, and ongoing spending for operation and maintenance. For example, a system of approximately 200 cameras in a small area can cost US$650,000 to US$1 million over the entire lifetime of the system — equating to US$3,000 to US$5,000 per camera.
The solution is to monetise the data streams from these systems in line with three priorities. If GCC authorities take these steps, our research shows that several applications already used in other markets could reduce the funding requirement for deploying and operating AI-empowered CCTV solutions by 30 per cent.
Managing traffic
First, authorities should use traffic and municipal applications as a baseline. Initial frameworks are already in place that allow governments to monetise public surveillance data — though they will likely be refined over time. Use cases include detecting traffic violations such as speeding or driving through red lights, along with municipal violations like public littering or illegal waste dumping.
Most systems can automatically issue citations and levy fines, which generate income that funds system implementation
and operation. In Saudi Arabia, local authorities have deployed various AIenabled systems to detect traffic violations.
Traffic management is another monetisation opportunity. AI-powered CCTV systems can collect tolls through automatic number plate recognition systems, detect traffic incidents and determine liability for insurance companies.
For example, Transport for London generated approximately US$2 billion between 2003 and 2017 by installing CCTV cameras to impose fees on vehicles that are driving or parking in the most heavily congested parts of the city.
Retail applications
Second, authorities should consider retail applications. Beyond traffic applications, the information gathered and processed by AI computer vision algorithms, combined with big data analytics, can enable new use cases for the retail sector.
Currently, tech players like StrataVision are using AI-powered computer vision platforms to build insights based on public CCTV video feeds, enabling retailers to track customer journeys and tailor product selection and marketing efforts based on demographics and behaviour patterns.
Such use cases create economic opportunity and can stimulate innovation if governments release anonymised data sets in compliance with proper data governance.
One eye on privacy
Third, authorities should proactively address privacy implications. For these and other AI applications, governments need to address the implications of monetising public data. Concerns vary widely by market.
At a minimum, authorities should comply with existing or newly implemented data privacy regulations and standards and adapt as those regulations develop.
In addition, authorities should strengthen their defences against cybersecurity attacks, particularly given the wealth of information they are collecting and the government’s responsibility as a steward of data.
GCC countries are growing fast and are significant destinations for international visitors. Through proper data monetisation, governments can deploy AI-enabled public safety systems at scale and in a cost-effective way — creating safer cities throughout the region. www.strategyand.pwc.com
Sustainability is no longer just an environmental goal; it’s reshaping industries — including security, says Louise Bou Rached, Sales Director, Middle East, Turkey and Africa, Milestone Systems
Sustainability is one of the central focuses in the Middle East, particularly in the UAE and Saudi Arabia, where national agendas such as Vision 2030 and UAE Net Zero 2050 emphasise environmental responsibility across industries.
The UAE and Saudi Arabia are at the forefront of integrating sustainability into security practices, too. By integrating the use of AI-powered analytics, modern data-driven video management systems are capable of analysing both live and archived video data, revealing valuable patterns and insights that might otherwise go unnoticed – and thus contribute to a range of sustainable solutions like energy efficiency and smarter urban planning.
Traditional surveillance systems were largely dependent on CCTV
cameras with manual monitoring. Over time, technological advancements have advanced security solutions, incorporating digital transformation, artificial intelligence (AI), and the Internet of Things (IoT). These innovations have significantly improved operational efficiency and accuracy.
Sustainable surveillance practices in the Middle East
Several key trends highlight the focus on sustainable solutions within the security industry:
1 Energy-efficient surveillance systems
Countries in the Middle East are looking at increasing the deployment of solar-powered CCTV cameras in urban
environments and remote locations, minimising reliance on traditional power sources. In Saudi Arabia, the NEOM smart city project aims to integrate AI-powered solutions with 100% renewable energy sources.
2 Smart cities and sustainable security
Along with the many hours of data from video footage, today’s smart cities leverage AI and IoT to create more sustainable environments and develop smart urban planning. This includes intelligent traffic management, facial verification for secure and seamless access control, and drone surveillance that minimises human resource dependencies.
This goes for Dubai’s Smart City strategy, which integrates AI-driven surveillance with real-time data analysis. Additionally, Saudi Arabia’s Vision 2030 targets 50% smart city implementation across major urban areas, incorporating sustainable security practices.
3 Green infrastructure and integrated security systems
Surveillance is no longer just about security — it’s also becoming an important element of sustainable urban planning. Building developers are embedding AI-driven video surveillance into green-certified structures, ensuring minimal environmental impact while enhancing safety.
The UAE’s Estidama Pearl Rating System mandates sustainable security solutions in commercial and residential projects.
Saudi Arabia’s Public Investment Fund (PIF) is investing in green security solutions as part of its sustainable tourism and smart city developments.
Regulatory framework and industry standards
The regulatory landscape in the Middle East supports the adoption of sustainable surveillance solutions. In Dubai, UAE, the Security Industry Regulatory Agency (SIRA) enforces sustainable security technology adoption, ensuring energy efficiency and smart integration.
SIRA regulations mandate the use of AI-driven surveillance in commercial and residential buildings to reduce overall security costs.
In Saudi Arabia, the Makkah Region Development Authority (MRDA) is implementing smart security measures for Hajj, integrating low-energy AIpowered surveillance.
The future of sustainable surveillance in the Middle East
As sustainability becomes a priority, security technology will continue evolving to align with environmental objectives. Future trends to watch out for include: AI-powered predictive analytics: Enhanced machine learning algorithms will improve proactive threat detection while optimising energy usage.
Optimisation of Machine Learning models: The computing and energy uses of generative AI models can be reduced using continuously-evolving optimisation techniques (quantisation, pruning, distillation, etc.).
Evolving video standards: Advances in video compression reduce network use and storage requirements, and hence power consumption (e.g. AV1 versus h265).
Eco-friendly security hardware: Biodegradable materials and energyefficient processors will become standard in security hardware.
The integration of sustainability into security solutions marks a transformative shift in the Middle East’s surveillance industry. With regional investments in smart cities and sustainable infrastructure growing rapidly, security leaders must adapt. The question is no longer if surveillance can be green — but how fast the industry can make it happen.
www.milestonesys.com
How the Middle East is Redefining Access Control
Vishal Khullar, Director of Business Development – META, Wavelynx, considers the industries driving demand, cultural and regulatory influences and the operational challenges that are defining the future of access control in the Middle East region
The Middle East is experiencing a remarkable transformation in its approach to security, driven by rapid advancements in technology and ambitious infrastructure projects. The demand for modern security solutions, particularly in access control, is surging across the region. This shift is propelled by the adoption of advanced technologies like biometrics, artificial intelligence (AI) and cloud-based systems, which are reshaping the security landscape.
Businesses, governments and industries are increasingly turning to integrated security solutions to protect assets, enhance operational efficiency and create interconnected environments where security is seamlessly embedded into daily operations. Scalable and integrated access control systems have become essential — not just to address security risks, but to foster connected ecosystems that fuel the region’s growth and innovation.
These systems enable organisations to seamlessly integrate security into their operations, creating smarter, safer and more efficient environments. As the access control market in the Middle East continues to grow, understanding the factors shaping this transformation is critical.
What is shaping the Middle East’s access control market?
The increasing demand for advanced access control systems in the Middle East is driven by key sectors such as government, oil and gas, and data centres. Each of these industries brings unique requirements and challenges, making them central to the evolution of security solutions in the region.
Oil and Gas Sector
As a cornerstone of the Middle East’s economy, the oil and gas sector places a high priority on safeguarding its critical infrastructure. The high value of assets and the risks associated with security breaches make sophisticated access control systems indispensable.
Organisations in this sector are adopting proactive strategies that integrate physical security with advanced cybersecurity measures.
These approaches not only address immediate threats, but also create resilient environments that ensure operational continuity and security.
Smart Cities and Urban Development
Ambitious projects like Saudi Arabia’s smart cities, the UAE’s expansive
construction initiatives, and Egypt’s new administrative capital highlight the need for robust, integrated security solutions. These urban developments, underpinned by technologies such as the Internet of Things (IoT) and AI, require scalable systems capable of managing large user volumes and securing diverse entry points.
Biometric and mobile-based authentication methods have emerged as the preferred solutions for these environments. By enhancing both safety and operational efficiency, these technologies align with the sustainability and innovation goals of these visionary cities.
Data Centres
The rapid growth of data centres in the UAE, Saudi Arabia and Egypt has amplified the need for cutting edge security solutions. With the increasing volume of data being generated, processed and stored, protecting these facilities has become a top priority.
Advanced access control systems, including biometric authentication, mobile credentials and integrated monitoring solutions, are essential for mitigating both physical and cyber threats. These technologies
“Organisations have opportunities to adopt phased approaches to modernisation”
help organisations safeguard their infrastructure while supporting the scalability and efficiency required in this fast-evolving sector.
Regulatory and cultural factors
While the adoption of advanced access control technologies in the Middle East is accelerating, it comes with unique regulatory and cultural considerations.
Privacy is highly valued across the Middle East, particularly concerning the storage and use of biometric data. Technologies like facial recognition and fingerprint scanning offer significant security benefits but face challenges due to cultural sensitivities surrounding data handling. Consequently, many organisations prefer fingerprint and mobile-based credentials, balancing privacy concerns with security needs.
The absence of a unified regulatory framework for biometric data storage adds complexity. Businesses must navigate diverse local laws, each with unique requirements for managing sensitive information. This fragmented regulatory landscape necessitates meticulous planning and compliance strategies.
To address these challenges, security providers are delivering region-specific solutions that align with local regulations while maintaining robust security standards. These customised approaches not only ensure compliance but also build trust among stakeholders, enabling organisations to create culturally aware and secure environments.
Overcoming operational challenges in access control implementation
Implementing advanced access control systems in the Middle East is not without its challenges. Legacy systems and the region’s rapid urban development pose significant hurdles, but they also present opportunities for innovation.
Many facilities in the Middle East continue to rely on outdated security technologies, complicating the integration
of modern solutions. The coexistence of older systems and cutting-edge technologies often increases costs and delays seamless implementation.
Additionally, rapid urban development means organisations frequently manage facilities at different life-cycle stages. Deploying access control systems across buildings with varying technological maturity can lead to inefficiencies and challenges in achieving a cohesive security infrastructure.
Despite these challenges, organisations have opportunities to adopt phased approaches to modernisation. Retrofit solutions, which allow for incremental upgrades to existing systems, are gaining traction. These strategies enable organisations to enhance security while minimising disruptions and costs. By leveraging interoperable technologies, businesses can create future-ready environments that adapt to evolving demands.
Key trends shaping the market
As the access control market in the Middle East evolves, several transformative trends are defining its trajectory:
Integrated Security Systems
The shift toward integrated security systems is reshaping the market. Unlike siloed solutions seen in some global markets, the Middle East is embracing comprehensive systems that centralise access control, surveillance and other security functions.
This trend aligns with the development of smart cities in Saudi Arabia, the UAE, and other parts of the region, where interconnected technologies enhance efficiency and security. Integrated systems not only streamline operations but also support the region’s vision of creating innovative, future-ready environments.
Retrofit Solutions
Retrofit solutions are becoming a preferred approach for organisations looking to modernise without completely
overhauling their infrastructure. By replacing outdated components incrementally, businesses can achieve competitive security capabilities while controlling costs.
For building security executives, retrofit strategies offer an efficient way to address evolving needs while ensuring operational continuity.
Cloud-Based Access Control
The growing preference for digital-first solutions has made cloud-based access control systems increasingly attractive. These platforms allow for remote management, streamlined operations, and reduced upfront costs compared to traditional on-premise systems.
The Middle East’s rapid adoption of cloud-based technologies reflects its commitment to innovation and agility. These solutions are particularly valuable in an era where hybrid and remote work environments are becoming the norm.
The road ahead
The access control market in the Middle East is poised for significant growth over the next decade, driven by infrastructure development, smart city initiatives and increasing demand for integrated systems. To thrive in this dynamic landscape, organisations must address cultural sensitivities, navigate complex regulations and modernise legacy systems. By embracing tailored solutions and leveraging trends such as integrated systems, retrofit strategies and cloudbased platforms, businesses can create smarter, safer and more connected environments.
With its commitment to ambitious projects and advanced technologies, the Middle East is well-positioned to lead a new era of security innovation. Security leaders who align with these trends and prioritise the region’s unique needs will secure not only the present but also the future of access control in this rapidly evolving market. www.wavelynx.com
LOCKING DOWN DATA
Ali Muzaffar, Assistant Professor, School of Mathematical and Computer Sciences, Heriot-Watt University Dubai, explores the role of encryption
in strengthening data access security
Encryption has emerged as a cornerstone in data access security in today’s digital world, where data breaches and threats from the cyber world are so common. Since it converts sensitive information into some unreadable form of text — also called encrypted text —
encryption works to ensure that even when unauthorised parties access the data, it will not be harmed.
Data violation incidents have become more frequent and severe over the last few years. Data breaches now cost an average of US$4.88 globally, an increase
of 10% compared to the previous year, as stated by IBM’s 2024 Data Breach Report. That has hit the healthcare segment particularly hard; for instance, as reported by Reuters, a cyberattack on UnitedHealth’s technological unit, Change Healthcare, resulted in a breach
of personal information belonging to 100 million people, considered the most significant healthcare data breach in US history.
Building obstacles
Encryption acts as a significant obstacle to such breaches. It masks data in such a way that even when it falls into the wrong hands it remains safe. Even when hackers break into a system, encrypted data is not readable without proper keys for decryption. This forms a critical layer of security that shields sensitive information, including PII, financial records and intellectual property.
But despite its importance, the adoption of encryption technologies has been spotty. According to a report by FutureCIO, 83% of businesses do not encrypt their data in the cloud, leaving vast volumes of sensitive information open to attack. On the bright side, there is hope on the horizon: according to GlobeNewswire, 87% of companies planned to increase their investment in encryption technologies in 2024, showing a growing recognition of its importance.
“Companies that implement encryption show their commitment to protecting customer data, which then builds trust and constructs brand reputation”
Advances in tech
Encryption technologies are in a development race, stimulated by the demands of the information-driven economy. Current encryption modes, such as AES, RSA and ECC, are very sophisticated and generally recognised as secure standards. For example, AES is widely used worldwide to protect everything from financial transactions to military communications with unparalleled reliability and speed.
The advantages of encryption go beyond the mere security of data. Companies that implement encryption show their commitment to protecting customer data, which then builds trust and constructs brand reputation. For instance, in a 2023 survey by PwC, 64% of consumers are willing to give more business to a company that takes data security seriously.
Range of applications
The markets for encryption are also becoming diverse. Vendors such as AWS, Microsoft Azure and Google Cloud offer EaaS, making enterprise implementation
easier. Hardware-based encryption is increasingly available, from modern SSDs to TPMs, providing good protection at the hardware level. As the ecosystem continues to grow, it allows tailored solutions to be developed and utilised by enterprises of any size.
End-to-end encryption (E2EE) has also begun to emerge in consumer applications. For instance, WhatsApp and Signal offer E2EE to enable only the sender and the recipient of the message to access its content, setting a benchmark concerning privacy in communications.
Challenging times
Of course, there are challenges to implementing encryption: many organisations struggle with the complexity of systems, performance-related concerns, and a lack of skilled people. In addition, there is a need to manage keys with due care; poor management may lead to data that cannot be accessed anymore or vulnerabilities. However, despite these setbacks, the merits of encryption for data security outweigh the demerits.
83%
OF BUSINESSES DO NOT ENCRYPT THEIR DATA IN THE CLOUD
SOURCE: FUTURECIO
64% 87%
OF COMPANIES PLANNED TO INCREASE THEIR INVESTMENT IN ENCRYPTION TECHNOLOGIES IN 2024
SOURCE: GLOBENEWSWIRE
OF CONSUMERS ARE WILLING TO GIVE MORE BUSINESS TO A COMPANY THAT TAKES DATA SECURITY SERIOUSLY
SOURCE: PWC
Among the setbacks, the computational overhead produced by encryption is considerable. Encryption and decryption of data introduce latency into a system, especially if their volumes are high, hence impacting the performance of that system. For example, in real-time applications, which include video streaming or financial trading systems, there is usually a need for lowlatency environments. Hence, integrating encryption in such a system requires sophisticated optimisation techniques.
Focus on key management
Key management within encryption is also critical for creating their list of challenges. Secure generation and the storage and distribution of encryption keys remain paramount. A missing or compromised key makes encrypted data unavailable or susceptible. To tackle this problem, key management solutions that are pretty advanced need to be adopted by organisations; this is typically resource-intensive and requires specialised knowledge.
Human influence is a pivotal factor that has helped make the encryption process overwhelming. Employees might involuntarily influence the encrypted systems through such mediators as
phishing attacks or using weak passwords and messing with the keys. One crucial way to avoid this is for organisations to invest actively and vigorously in cybersecurity training. Still, the training procedure usually consumes very high costs and an alarming period.
Future threats
Further, the dawn of quantum computing introduces a new, more perpetual threat to classical encryption, where powerful computing can neutralise the current and one of the most popular secure encryption algorithms, such as RSA and ECC. Quantum-resistant algorithms are in development; once ready, deployment requires that cryptographic systems be replaced wholly, which may become very expensive and time-consuming.
Remarkable growth is forecast for the encryption software market. Straits Research says the market will grow from $17.06 billion in 2025 to $57.91 billion by 2033, growing at a CAGR of 16.5%. This is indicative of the fact that encryption has indeed become an intrinsic part of cybersecurity strategies.
Encryption efforts
Future technologies will no doubt continue to alter the encryption
landscape. Quantum-resistant algorithms are developing in response to the eventual threat of quantum computing, which may render traditional encryption null and void. These developments ensure that encryption remains a trusted defence in the ever-evolving threat landscape. Moreover, with the rise in companies’ utilisation of decentralised systems, such as blockchain, encryption will be key in securing transactions and ensuring that data is not tampered with. That blockchain is based on principles of cryptography shows how emerging technologies and encryption go hand in hand.
As we move ahead in a phase of life where data is treated as liquid assets, it becomes very important to protect it from unauthorised access. Encryption is one of these very important tools in that regard, as it ensures that sensitive information within those data packets will nonetheless be well-protected when such a breach occurs. As threats change, businesses will have no option but to implement tight encryption practices if they are set on keeping their data safe, along with the trust given to them by their stakeholders.
www.hw.ac.uk/dubai
Dinesh Varadhrajan, Chief Product Officer at Kissflow, shines a light on shadow IT and explores how citizen development can empower employees and protect businesses
SOURCE: PWC, 2025 STUDY 40%
SOURCE: KISSFLOW SURVEY 92% OF TECHNOLOGY LEADERS IN THE REGION NOW SEE DATA PROTECTION AS THEIR TOP INVESTMENT TARGET
OF TECH LEADERS AGREE THAT CITIZEN DEVELOPMENT IS A PIVOTAL STRATEGY
There are many ways an organisation is exposed to security risks — if you look at enterprises, decentralised tech is one of the top contributors to these security concerns. The spike in shadow IT had (and still has) deep implications for security as governments across the region seek to encourage and catalyse the growth of their digital economies while at the same time actively policing the rights and safety of consumers.
Keeping the lights on
So what factors drive the rise of shadow IT? Recent Kissflow research shows that a whole third (33%) of organisations face resource constraints in custom app development, and as a result the vast majority (80%) of tech leaders in the region see a pressing need to refine the app development process for effective digital transformation. Until this refinement is achieved however, what enterprises often end up with are a daunting backlog of app development requests, overworked IT teams, and frustrated business users.
This consequence chain, from the work pressures on the user at one end, to the subpar delivery of the technology function on the other, is not the fault of any of the players involved. After all, most employees who indulge in shadow IT are unaware of how it connects to non-compliance and data breaches. It is, however, important to come to terms with the risks and to adopt new methods to overcome them.
Risky business
The first and most obvious risk is the impact on visibility of the technology environment. IT and security professionals cannot protect what they cannot see, and unsanctioned apps can come with a range of vulnerabilities.
prevent things from spiralling out of control, organisations must work to bridge the understanding gap between IT and business users.
To do this effectively, there are three factors to consider: business complexity, technical complexity and security and compliance requirements. An application use case that scores particularly high on any one of these factors should be managed by the IT department, while the remaining can be taken care of by the business teams. Sounds simple, right? But this collaboration is not possible without a low code no code (LCNC) platform.
LCNC platforms allow non-technical employees to become citizen developers. Platforms are designed in a way that allows business-oriented domain experts to visually build apps that fulfil all of their requirements with little need to involve IT. These development platforms automate code construction to ensure only nativefriendly, secure, compliant and efficient solutions are built. Critical to addressing the challenge of shadow IT specifically, leading LCNC platforms include integrated governance layers, which means IT and security teams can impose their discipline on citizen developers without the need for constant personal involvement.
Among the Middle East findings of PwC’s 2025 Global Digital Trust Insights study was the continued upward movement of cybersecurity on the C-suite’s agenda. Some 15 per cent of regional organisations reported data breaches costing in excess of US$100,000. Two in five (40%) technology leaders in the region now see data protection as their top investment target.
Also, a shadow asset could go offline, and data could be lost because of a lack of understanding of its storage. Even if the IT department is called in to address the issue, they may not be able to fix it because of a lack of documentation. Regular audits and better collaboration between IT and business can help to unearth shadow IT issues and establish a stronger governance layer.
Citizen
development
for the win
Shadow IT can quickly escalate into a serious issue, jeopardising the security posture of the entire organisation. To
Kissflow’s recent survey with enterprise CIOs also highlighted the positive outcomes of citizen development. Ninetytwo per cent of tech leaders agree that citizen development is a pivotal strategy in achieving digital transformation goals and helping reduce the IT backlog by 65 per cent. Citizen development unlocks the ability to leverage employees’ creativity, expertise and opinions to drive innovation and address growing business needs. Resisting it would only lead to missed opportunities, slower response times, and piling technology backlogs as IT needs to catch up with the increasing demand for apps.
Out of the shadows
While it is still all but impossible to entirely eliminate shadow IT, this challenge and its associated risks can be controlled to a greater extent by choosing the right LCNC platform. And with Gartner already having estimated that in 2024, 80 per cent of the tech stack would have been built by non-technical developers, it is the prudent way to embrace the inevitable and gain an edge against the competition. www.kissflow.com
BUILDING A RESILIENT SUPPLY CHAIN
Ensuring the resilience of your supply chain is critical in today’s volatile business environment. Dan Norman, ISF Regional Director, EMEA, explores the steps that are needed to monitor the risks associated with your supply chains
In today’s interconnected global economy, supply chains are more complex and vulnerable than ever before. Disruptions to the supply chain can have a devastating impact on businesses, from production delays and financial losses to reputational damage. Ensuring the resilience of your supply chain is critical in today’s volatile business environment. One of the most crucial aspects of building a robust supply chain is effectively assessing and mitigating the risks associated with your suppliers. This involves a comprehensive evaluation of potential threats, including cybersecurity vulnerabilities, geopolitical risks and social and environmental concerns. It is impossible to operate a business without having a supply chain. In the increasingly globalised environment, suppliers help to keep daily operations moving in every organisation. But this also introduces cyber risk: supplier vulnerabilities are an increasingly common cause of compromise. Keeping a watchful eye on the security status of suppliers – always knowing the risk they present – is an important part of building resilience and maintaining operations. Supply chains are often huge and complex – better described as a tangled web than a chain. In addition to their own customers, large organisations have multiple thousands of suppliers, who in turn have their own suppliers, and so forth. Moreover, the growth of services and technologies such as cloud computing and the Internet of Things (IoT) means that organisations have more suppliers connected directly to their systems and information than ever before. High profile incidents such as the spread of the NotPetya malware in 2017 demonstrate the devastating impact that can be caused by supplier vulnerabilities. Regulations such as NIS2, DORA and PDPL have put a significant focus on managing cyber risk across an organisation’s supply chain; and unfortunately, every organisation is on a different level in their maturity journey.
There is an incredible amount to consider when building a robust supply chain risk management capability: How do we integrate security requirements into existing and future contracts? How do we classify our suppliers in terms of criticality to the business, or potential impact if they are compromised by a cyber attack? How do we risk-assess our suppliers? How do we continuously monitor them to provide assurance to the business that they are secure? Do we have the right tools in place to accelerate the entire process of effective supply chain cyber risk management? And the list goes on.
The large number of suppliers that organisations work with makes it challenging to regularly assess each one individually. Security assessments are often static snapshots that are rarely updated and do not reflect how quickly the information risk landscape changes, as new threats emerge and existing ones evolve. Without a continuous view of supplier security, businesses cannot fully understand the risks they face.
Continuous supply chain assurance means being able to present owners and decision makers with up-to-date information and evidence on the security of suppliers. It requires an understanding of which suppliers present the greatest risk, on which to focus monitoring; flexibility to use a range of different tools and techniques to more regularly assess supplier security; and the adoption of automation to enable continuous reporting.
For many companies, moving to a pattern of continuously monitoring supplier security is likely to be a significant challenge. It will require a shift in focus from infrequent point-in-time assessments to more regular data capture throughout the relationship with any given supplier. There are no one-size-fits-all solutions on how to continuously monitor supplier security and every acquirer should adopt a way of working that meets their own requirements. However, there are a variety of tools and techniques that
any acquirer may choose to make use of: Open Source Intelligence (OSINT) –information that can give an indication of a supplier’s security posture. Security ratings – services that automate the collection and analysis of OSINT to provide a data-driven assessment of an organisation’s technical security performance. Information sharing mechanisms –a mixture of techniques for suppliers to share information directly with acquirers, and industry groups that enable acquirers to share information with each other in relation to common suppliers. Supplier security self-assessments – questionnaire-based assessments used by acquirers, asking suppliers to assess their own security arrangements. Security certifications – certification of systems and security controls against recognised national, international or industry-specific regulatory standards. On-site security assessments/ audits – assessments of a supplier’s security arrangements conducted by an acquirer’s employees or experts from an accredited third party, who have authorised access to the supplier’s premises.
Now, the reality is, an organisation will likely have thousands of suppliers, and assessing each supplier robustly using all of the above techniques is unrealistic and unmanageable. Suppliers must be classified into tiers of criticality and a monitoring capability must be integrated into a repeatable process, and refined over time. Many businesses may choose to outsource all of their supplier risk assessments to vendors that promise 100% coverage of a supplier’s vulnerabilities from OSINT, but this may not help in the long-run. A blended, pragmatic approach that considers a range of sources of information will provide sustainable and meaningful information to security leaders. www.securityforum.org
Winning customers, safeguarding data
Andreas Hassellöf, CEO of Ombori, takes a closer look at why excellent identity management is essential to stay ahead of the loyalty game
Did you know that in 2023, businesses on average lost approximately AE$11m to cyberattacks, according to the UAE Retail Report 2024 from Adyen? With Saudi Arabia’s e-commerce sector experiencing a 17.47% growth and the UAE’s market projected to surpass AE$48.8bn by 2028, the urgency to protect data is more critical than ever.
Both the UAE and KSA are spearheading digital transformation under Vision 2030, aiming to diversify their economics beyond oil and gas. Abu Dhabi has launched MGX, a $100bn
AI-focused investment fund, while Saudi Arabia’s Project Transcendence, matches with another $100bn initiative, prioritising AI-driven infrastructure like data centres and startups. While these advancements are revolutionising industries, greater connectivity also means greater concerns.
Why data protection is essential for customer loyalty
Earlier this year, a leading UAE-based retailer faced a data breach allegedly exposing the personal information of around 196,000 customers. Such
incidents can significantly damage brand trust and credibility, which are often difficult to rebuild.
To address these risks, the UAE and Saudi Arabia have enacted comprehensive data protection laws. Saudi Arabia’s Personal Data Protection Law (PDPL) was fully enforced in September 2024, and regulates the use of personal data both within the Kingdom and abroad. Violations can result in fines of up to AE$1.34m, doubling for repeat offenses. Similarly, the UAE’s Federal Personal Data Protection
SOURCE: PWC
Law (No. 45 of 2021) mandates organisations to secure personal data, obtain processing consent and offer mechanisms for correction or restriction.
Boosting customer experience through secure identity management
PwC’s Digital Trust Insights 2024 –Middle East findings revealed that 45% of businesses in the Middle East have revealed that mitigating cyber risks remains a top priority. However, equally important is the need to streamline
experiences and transactions, which not only accelerates processes but also delivers a more personalised and efficient customer experience.
Today’s customers expect more than just secure transactions; they demand seamless shopping interactions tailored to their unique preferences, including product choice, browsing habits and purchasing history.
Building loyalty through data protection
Now that the importance of data protection is clear, how can brands effectively implement it within their operations?
1. Communicate Clearly: Brands should prioritise transparency by clearly explaining how customer data is collected, stored and used. Providing straightforward privacy policies and regular updates builds trust and reassures customers about their data’s safety.
2. Offer Opt-in Choices: Empower customers by offering opt-in options for data collection and usage, ensuring they have control over their personal information. This not only complies with privacy regulations but also fosters a sense of autonomy and trust among users.
3. Educate Customers: Educating customers about data protection practices helps them understand the value of secure transactions and their role in maintaining safety, while also demonstrating the brand’s commitment to safeguarding their data. This can be achieved through informative content, such as tutorials, FAQs, or campaigns.
4. Invest in Secure Technology: Brands should invest in advanced technologies like encryption, biometric authentication and secure cloud solutions to safeguard customer data. Regular system updates and audits ensure robust protection against evolving cyber threats.
The average cost of data breaches in the Middle East is US$8.75m, according to Statista. By prioritising data protection and identity management, businesses can not only avoid these high costs and fines but also make it easier for both employees and customers to securely access services. Brands that effectively
implement these systems are more efficient, credible and gain a competitive edge in a crowded marketplace.
Overcoming the challenges of implementing identity management
Implementing robust identity management systems is not without its challenges. Businesses may face high initial costs, technical complexities and resistance from employees who are accustomed to old processes. These obstacles can make it difficult to adopt such systems, but there are solutions that can be easily executed to overcome them.
1. Invest in Scalable Technology: As the business grows, this ensures that the identity management system can expand to meet increasing demands without accumulating major additional costs.
2. Prioritising Staff Training: This is a crucial step, as it helps employees understand the importance of secure access systems and how to use them effectively, which can minimise resistance and ensure smooth adoption.
3. Partnering with Experts: Partnering with specialists in identity management can provide the necessary guidance and technical support to navigate complex implementations, making the process more efficient and less daunting. This collaboration ensures that companies can manage data protection confidently while maintaining compliance with privacy standards.
What’s in store for the future?
Looking ahead, there will be more AIpowered identity management tools, a stronger focus on real-time data protection, and a greater emphasis on privacy as consumers seek more control over their personal data. These changes encourage businesses to go beyond just following local laws and aim to set new benchmarks for secure operations and transparency. Moving from simply complying with regulations, businesses can turn identity management into a competitive advantage. This means making privacy a central focus and positioning themselves as leaders in shaping the future of digital security and trust. www.ombori.com
Enhancing security through advanced ANPR technology in the Middle East
ANPR technology has evolved beyond traffic management to become a critical component of modern security and law enforcement infrastructure. With increasing urbanisation, complex security threats and a heightened need for real-time monitoring, ANPR plays a pivotal role in ensuring the safety of cities, road networks and strategic assets across the Middle East.
MAV’s advanced ANPR solutions, including the MAV AiQ, are designed to meet the most demanding security and enforcement challenges. As the MAV AiQ completes all technology approvals, including SIRA, to ensure full compliance with regional security standards, interest from security system designers continues to grow. Designed to offer flexible security solutions, the MAV AiQ supports traffic enforcement, law enforcement, Intelligent Transportation Systems (ITS) and parking management, forming a cornerstone of integrated city-wide security frameworks.
AI-powered ANPR for law enforcement and national security
The integration of artificial intelligence (AI) into ANPR technology has revolutionised its ability to support security operations. The MAV AiQ system leverages AI to enhance accuracy, identify security threats and streamline enforcement activities. The system’s advanced features are numerous and include:
GhostPlate™ Detection – Identifies fraudulent and tampered plates, detecting illicit activities such as plate masking.
AI Accurate™ Recognition – Ensures precision in plate identification, even under challenging conditions such as poor lighting, high-speed motion or environmental obstructions.
PlatePath™ Data Intelligence –Provides law enforcement agencies with real-time and forensic analysis capabilities, allowing authorities to track suspect vehicles, analyse movement patterns and prevent criminal activity before it escalates.
MAV’s AI-driven technology ensures that ANPR systems continuously learn and adapt, making them resilient to evolving security threats and dynamic urban environments.
Real-time traffic and criminal activity enforcement
Ensuring public safety requires robust surveillance and enforcement mechanisms. The MAV AiQ is designed to seamlessly integrate into security command centres, providing real-time intelligence and automated enforcement capabilities. Key applications include:
Traffic Violation Enforcement –Detects and records offences such as speeding, red-light running and illegal lane usage, enhancing compliance and reducing road-related incidents.
Criminal Investigations – Aids in locating stolen vehicles, tracking wanted suspects and responding to security alerts such as terrorist threats or organised crime activity.
Emergency Response Support – Integrates with national alert systems to assist in high-priority situations, including Amber Alerts and counterterrorism operations.
The ability of the MAV AiQ to autonomously detect, analyse and report violations makes it an essential tool for law enforcement agencies seeking to maintain security across vast urban landscapes.
Securing strategic infrastructure and high-risk areas
To support the security of all critical infrastructure within the Middle East, including government buildings, border crossings and transportation hubs, the MAV AiQ provides real-time perimeter monitoring and security enforcement in restricted areas by:
Monitoring Vehicle Movements in Sensitive Zones – Ensuring that only authorised vehicles gain access to secured facilities.
Detecting Suspicious Behaviour –Identifying vehicles with altered plates, unauthorised access attempts or unusual movement patterns.
Enhancing Border Security –Supporting customs and immigration agencies in monitoring and tracking cross-border vehicle movements.
The combination of AI, real-time analytics and data-driven decision-making enhances the ability of security forces to pre-empt and neutralise potential threats.
Data-driven security and intelligence for smart cities
ANPR technology is a crucial element of next-generation smart city security infrastructure. The MAV AiQ system collects and processes vast amounts of vehicle data, empowering security agencies with actionable insights. Conduct predictive analytics to anticipate security threats. Monitor traffic flows to identify potential risks or suspicious behaviour.
Support forensic investigations by maintaining detailed vehicle movement logs.
By integrating MAV’s ANPR solutions into security frameworks, governments and municipalities can enhance surveillance, improve emergency response efficiency and foster safer urban environments.
Future-proofing urban security with MAV ANPR solutions
As urban centres continue to expand and security challenges become more complex, the need for intelligent, AIdriven ANPR solutions is greater than ever. MAV is committed to advancing ANPR technology with innovative solutions like the MAV AiQ, ensuring that cities and law enforcement agencies remain equipped with the most sophisticated tools to safeguard public spaces, enforce compliance and enhance national security. With a focus on AI-powered adaptability, and seamless integration into law enforcement and ITS ecosystems, MAV’s ANPR technology is setting new benchmarks for security and surveillance in the Middle East.
About MAV Systems Ltd
MAV Systems Ltd is a worldleading independent ANPR camera manufacturer with more than 30 years design and development experience. Supporting optimised ANPR infrastructure across sectors and international regions, MAV’s products are a core component within Law Enforcement, ITS, Traffic Enforcement and Parking Management systems.
With innovation, technological advancement and customer needs central to MAV’s ethos, growth has been led by collaboration and quality. Conducting continuous research and development to ensure future customer and market requirements are anticipated, MAV is always positioned to provide the highest quality and benefit-led ANPR technology.
When a leading European company in wireless telecommunications infrastructure needed support for a protection pilot project in some of its base stations it selected Scati Cloud’s video surveillance platform for its advanced, adaptable and scalable capabilities
Overview
As Europe’s leading operator of telecommunications infrastructure, the company provides connectivity in many countries and manages numerous base stations. Some of these critical connectivity facilities are located in vulnerable areas and face continuous risks of component theft. These incidents not only affect service continuity but also generate high replacement and maintenance costs.
The challenges
Implementing a fixed security infrastructure at each base station would be unfeasible due to the high cost and lack of flexibility, as these stations need to adapt quickly to specific threats or situations. Therefore, a flexible and efficient security solution was required that would allow equipment to be relocated in an agile manner, without the need for new installations at each location.
About Scati Cloud
Scati Cloud is an advanced video surveillance solution in the cloud that allows managing and storing images in real-time, facilitating remote and centralised control of all the company’s stations. The solution includes highresolution cameras with IP technology, which offer a fast and accurate response to any incident, as well as a fully adaptable infrastructure for critical stations.
The solution
Scati Cloud supplied each base station involved in the pilot project with a 4-megapixel PTZ IP Dome camera (model SID-36135R-EXY32) on the tower to monitor the perimeter. This camera features 32x optical zoom and infrared technology to capture images in low visibility conditions. In addition, four 2-megapixel Minidome IP cameras were deployed to each base station (model SEM-3513R-EY2): three monitoring the plot area and one in the technical cabin, providing coverage of strategic areas.
For recording management, all cameras are connected to the SL-LXUN04-CLOUD cloud storage platform, which allows up to 16 channels to be managed simultaneously. Motion-detection image recordings ensure fast and remote access in case of incidents.
Operators can view real-time images from all stations from a single centralised platform, and the system is designed for quick relocation between bases without the need for complex configurations.
To ensure connectivity in any location, the solution includes a plug-and-play system (factory preconfigured) with a 4G router and preinstalled SIM, which allows the deployment of mobile surveillance kits, which are easy to install and move between stations according to security needs. This facilitates rapid response to emerging threats and allows easy installation for technicians without requiring additional configurations.
Importantly, the solution is compatible with the rigorous security and cybersecurity standards established by the company’s IT department, ensuring the security of infrastructures, information and the protection of data transmitted in real-time. This guarantees that the solution complies with the required policies, as well as being adaptable, effective and secure for high-risk telecommunications environments.
The results
The implementation of Scati Cloud to the base stations brings a number of key benefits to maximise the security, scalability and efficiency of these critical infrastructures. With remote access and centralised control, Scati Cloud enables operators to monitor all stations in realtime from a unified platform, accessible on mobile devices and web browsers, ensuring rapid response and eliminating
“With remote access and centralised control, Scati Cloud enables operators to monitor all stations in real-time from a unified platform”
the need for physical presence at each location.
Its scalability and operational flexibility allow cameras to be added and managed with agility without incurring costly upgrades, a capability especially valuable in high-risk areas where security must be tailored to the specific needs of each site. In addition, the system offers secure cloud storage via Amazon Web Services (AWS) and 256-bit encryption, protecting the integrity of recordings from theft or tampering.
The solution also ensures resilience to network outages by storing recordings
locally and synchronising them with the cloud once the connection is restored, enabling continuous and uninterrupted surveillance. This reduces operating costs and simplifies installation by eliminating the need for physical storage at each station, minimising hardware and maintenance expenses.
Following the pilot project the telecommunications infrastructure operator is evaluating the performance of Scati Cloud, with a view to future expansion to other high-risk stations in Europe. www.scati.com
PSSA 2025: Pioneering a safer future through innovation and excellence
As we begin 2025, the Professional Security and Safety Alliance (PSSA) is excited to share its plans to improve global security and safety. Building on its recent successes, including the relaunch of the Security Professional Association (SPA), it is setting new goals for innovation, teamwork and excellence in the security field
PSSA is proud to announce a new strategic partnership with Security Middle East magazine, with an MoU signed at Intersec in Dubai. This collaboration aims to amplify the voices of industry leaders, showcase innovative solutions, and drive thought leadership across the region.
Through this partnership, PSSA and Security Middle East magazine will work together to spotlight critical topics, such as emerging technologies, evolving security threats and best practices in the field. By sharing insights and engaging with a broader audience, we aim to elevate awareness, strengthen connections and further the advancement of security standards.
This partnership aligns with PSSA’s mission to empower professionals, enhance industry knowledge and promote global security collaboration.
Recognition of excellence
We are proud to announce that Dr Adil Abdel Hadi, the Deputy Chairman of PSSA, was awarded an elite recognition at Intersec 2025 for his outstanding leadership and contributions to the security sector. This award is a clear reflection of Dr Abdel Hadi’s dedication to advancing global security standards.
In addition, His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum honored the winners of the Security Professionalism and Excellence Awards (SPEA) in its second edition. These prestigious awards recognise the exceptional achievements and contributions of security personnel in the private security sector, highlighting the importance of professionalism and dedication to safety worldwide.
Empowering professionals with practical knowledge
At PSSA, we provide innovative training programmes to equip security
professionals with the latest technologies, like AI and IoT. Our courses focus on risk management, leadership, crisis management and ethical decision-making — skills that help our members become effective leaders and to navigate complex security challenges.
Building global partnerships
PSSA is committed to building global partnerships that allow us to share best practices and innovative solutions. Our collaborations with international organisations have led to advancements in areas such as urban safety and new security protocols. These partnerships allow our members to benefit from a wide range of expertise and resources.
We’ve also signed several Memoranda of Understanding (MoUs) with leading global security organisations, showing our commitment to working on shared goals.
Improving member experience
We’ve revamped our member portal to make it easier than ever to access resources. This platform encourages
collaboration, allowing members to share experiences and learn from one another. With features like networking and mentorship programmes, we ensure that our members have the support they need throughout their careers.
Join us in making a difference
We invite you to join PSSA in recognising and empowering security professionals. Through collaboration, innovation and shared knowledge, we can build a safer, more resilient world. Together, we can shine a light on the dedicated security personnel who protect us every day.
For more information on our initiatives, exclusive member benefits and upcoming industry-leading events, visit www. linkedin.com/company/professionalsecurity-and-safety-alliance/ or contact our information office at Aman Security Training Centre, Al Mamzar, Dubai. Discover how you can be part of a global movement driving innovation and excellence in security. Let’s work together to create a future where security is not just a priority but a cornerstone of progress.
Industry Interview
Helmut
Josef Spahn,
FIFA
Director,
Safety, Security and Access, discusses
his
role and
the
security challenges that come with mega events with Meshal Aljohani, CPP, PSP, PCI, Security Operations Specialist
Can you tell us about your journey in security and what interested you in working in this field?
My career in security began over 40 years ago as a high-ranking officer in the German police force, where I gained extensive experience in public safety and crisis management. I transitioned into sports security as Chief Security Officer for the 2006 FIFA World Cup in Germany. This journey continued with roles at the German Football Association (DFB), and the International Centre for Sport Security (ICSS), based in Qatar, allowing me to contribute to global events like the Olympics, FIFA World Cups, and the Boston Marathon, for example.
In my current function as Director, Safety, Security and Access at FIFA I am now responsible for all FIFA tournaments and events across the globe, including the previous 2018 FIFA World Cup in Russia, FIFA World Cup Qatar 2022 and the upcoming FIFA Club World Cup 2025 in USA and the FIFA World Cup 2026 in Canada, USA and Mexico.
What drives me is the opportunity to create safe, inclusive environments for fans while navigating the ever-evolving challenges in this field. The complexity of securing large-scale events with diverse audiences fascinates me.
What are the key challenges in planning and executing security for mega events in the Middle East?
Planning security for mega events in the Middle East involves unique challenges. Cultural diversity and awareness are key considerations, ensuring that security measures respect local traditions while adhering to international standards. The rapid pace of infrastructure development in the region requires close coordination with local authorities and event organisers to integrate security protocols seamlessly.
Additionally, the region’s climate, particularly extreme heat, necessitates specific measures to ensure the safety of both attendees and staff. Geopolitical sensitivities also play a role, requiring detailed threat assessments and strong partnerships with international security agencies to address potential risks proactively. Living in this region for over six years also makes it easier to assess the upcoming tasks in the Middle East.
How do you balance the need for strong security measures with creating a welcoming and enjoyable environment for attendees?
Striking this balance requires a fan-centric and service-oriented approach to security. The goal is to integrate robust measures in a way that minimises disruptions to the attendee experience. For instance, at events like a FIFA World Cup, we design processes such as entry checks, surveillance systems and comprehensive protocols for rapid response to be efficient and discreet. Training staff to combine vigilance with hospitality is also crucial. When attendees feel respected, informed and safe, they can fully enjoy the event. A seamless blend of security and guest experience ensures that safety enhances, rather than detracts from, the overall atmosphere.
What role does technology, such as AI and surveillance systems, play in enhancing security at mega events?
Technology plays an indispensable role in modern event security. AI-powered tools enable real-time monitoring of crowds, identifying unusual behaviour or potential risks quickly and accurately. Surveillance systems equipped with facial recognition and biometric authentication enhance both security and the speed of
access for spectators. Drones provide comprehensive views of venues, aiding in crowd management and emergency response. Technology like this not only enhances situational awareness but also allows security teams to respond proactively and effectively.
What measures are most effective in managing crowd control during mega events?
Effective crowd control starts with thorough planning. Designing venues with clear pathways, signage and designated entry and exit points helps to manage the flow of people. Technology, such as systems that monitor crowd density in real-time, enables security teams to address potential congestion before it becomes a problem. Communication, coordination and collaboration are equally important. Keeping attendees informed through announcements or apps can reduce confusion. On-site personnel, trained in both crowd psychology and emergency response, play a critical role in maintaining calm and order. A combination of preparation, technology and skilled staff ensures efficient crowd management at events of any scale.
securitymiddleeast
ARABIA
Riyadh, KSA
intersec-ksa.ae. messefrankfurt.com
The innovative face as a credential solution
A new door access experience, requiring only face as a credential.
Orion face recognition enables convenient access for any user of a Salto access point, requiring only face as a credential.
Enrol users from anywhere, on any device, thanks to Salto Orion Mobile Self-Enrolment technology.
Simple to install, configure, and deploy to support for all entry types.
Security and privacy built-in, Salto Orion ensures industry-leading protection with precise recognition and minimal errors.
Powered by Salto smart access control. Requiring only the user’s face as an access credential, Orion bridges access control and face recognition technology.