OFFICIAL GOVERNMENT CYBER SECURITY PARTNER
OFFICIALLY SUPPORTED BY
THE WORLD'S MOST FAMOUS HACKER AND EX-#1 ON THE FBI'S MOST WANTED LIST TO HACK LIVE IN DUBAI See the jaw-dropping live hack by KEVIN MITNICK for as little as AED 1,999. #GISEC www.gisec.ae I gisec@dwtc.com I +971 4 308 6805
OFFICIAL DISTRIBUTION PARTNER
IOT PARTNER
STRATEGIC PARTNER
PLATINUM SPONSORS
GOLD SPONSORS
CO-LOCATED EVENT
POWERED BY
ORGANISED BY
Innovation Is Driving Enterprise Security Firstly, we are pleased to share that we registered a strong presence at the Intersec 2019, the biggest exhibition on safety and security in the region. Enterprise security continues to remain the number one concern for organizations, especially in the Middle East and North Africa. As a result organizations in the region are expected to increase their investments in enterprise security. The thrust is not limited just to investments as security providers are continuously innovating to come up with better, smarter security tools to enable organizations to keep pace with the changing security threatscape. Continuing with our focus on security, our cover story this month provides a snapshot of the security solutions, as well as technologies and innovations that created a buzz at the Intersec. An evident theme from the Intersec was how advanced technologies, especially artificial intelligence, machine learning, and deep learning are helping sharpen security tools so businesses can ensure an all-round security encompassing cyber security as well as commercial security. Workloads migrating to clouds, increasing use of smartphones for network access, rapid adoption of smart devices, and several other developments require robust security measures at every level. Innovations are underway. And security companies have already begun offering smarter solutions. Same goes for the surveillance space. I would urge VARs and SIs to read about all these innovations in our cover story as it will help them align their services accordingly. Apart from providing our readers with updated information, we will keep hosting events to help the channel expand and consolidate their businesses. Stay tuned in.
Cover Feature - 8
Enterprise Security – Solutions for a Secure Environment
News Bytes
Netweb Middle East Showcases at Intersec 2019 – 5
WD’s Edge-To-Core Surveillance Solutions - 6
Interview
NetApp – Data, the core of today’s businesses – 12, 13
Pulse Secure - Pioneering the Zero Trust Architecture - 15
News in Detail
Dahua Heart of City (HOC) Debuts at Intersec 2019 - 22
SNB participates in Intersec 2019 – 23
EyeTech
R&M Prime ODF Systems - 30 Alaris S2040 Scanner - 30
TechKnow
Warm regards,
Safer & Better Online Experience – 26
Vivek Sharma Managing Editor
Managing Editor: Vivek Sharma
ontents
Dear Readers
Published by: JNS Media International MFZE
Content Lead & Business Development-
P.O Box 121075, Dubai UAE, Tel: +971-4-3705022 Fax: +971-4-3706639, website: www.VARonline.com Sales Inquiries: sales@var-mea.com All other Inquiries: info@var-mea.com | Editorial: editor@var-mea.com
Christopher David
Disclaimer: While the publishers have made every attempt possible to get accurate information on published content in this handbook they cannot be held liable for any errors herein.
Art Director: Faiz Ahmed Commercial Director - Mallika Rego
News Bytes
Avaya Opens Customer Experience Center in Saudi Arabia
2019: The Year UAE will Adopt Artificial Intelligence Innovation On a trip to the UAE, VMware’s Jean-Pierre Brulard, Senior Vice President and General Manager EMEA, talked about how 2019 will be the year for the UAE to adopt Artificial Intelligence (AI) innovation in order to fuel nationwide
Avaya Holdings is celebrating the
digital transformation. “Artificial Intelligence and machine learning will see
launch of its new office space at
major breakthroughs in 2019, and the UAE’s government
the Information Technology and
and industry verticals are ideally-positioned to encourage
Communications Complex (ITCC), in
and adopt these to drive digital transformation,” said
Riyadh. In what comes as a significant
Brulard.
investment in the regional technology
“From Expo 2020 Dubai to Dubai’s Smart City initiatives, AI is becoming the
ecosystem, the office at ITCC features
foundation for organizations to react to peoples’ needs in real-time, predict how
the first Avaya customer experience
government services will transform citizen experiences, and ensure that costs, security
center to be opened in Saudi Arabia.
and innovation are optimized,” says Brulard. “The UAE’s leadership is one of the most
The center will serve as a design and test bed for world-class solutions to local business challenges. Open to Avaya customers, channel partners, academics and others, the space features facilities in which local
visionary in the world, encouraging connectivity and recognizing the potential for technology to serve as a force for economic growth and societal good.” Regarding technology infrastructure, he predicts that 2019 will be the era of the ‘self-driving data center’ – in which AI and machine learning will be deeply infused into private and public clouds, reducing complexity and driving the next generation of digital infrastructure, all achieveable by laying a strong digital foundation.
innovators can create technological answers to some of the country’s most pressing challenges. It will enable Avaya’s partners and customers to design solutions embedding advanced technologies such as AI and blockchain into their contact center and unified communications platforms. In line with the Saudi Vision 2030, Avaya expects this center to contribute greatly to the country’s digital transformation drive. The new facility also represents Avaya’s commitment to the Middle East in general and Saudi Arabia in particular. The company hires fresh graduates from Saudi universities, and invests heavily into its local channel partner ecosystem, which serves as contact center industry, responsible for the creation of thousands of jobs.
Zeder Group Rolls Out OSM Services Leading Human Resources and Management Consultancy firm, Zeder Group, has introduced its unique and tailored Open Source Management (OSM) service to its Levant and GCC markets. OSM is a business tool that is designed to assist entrepreneurs to grow their businesses through structured and effective management strategy. Zeder Group will provide a full range of high-quality, results-oriented HR services to companies of every scale and in any development stage. Mr. Sadek El-Assaad, Chief Executive Officer of Zeder Group said, “Our OSM service helps business owners, entrepreneurs and senior company managers to grow their businesses and develop as individuals. Our entrepreneurial approach is tailored from the active partnership with Open Source Management International Group. We work in close collaboration with business owners and senior managers to help them achieve their objectives.” According to Sadek, sustainable business growth can best be achieved through the adoption and use of OSM strategy. These structured and effective OSM management tools, he says, can be instrumental in helping business owners to accurately assess, recruit, develop and grow the optimal talent and teams.
4 | February 2019
Netweb Middle East Showcases at Intersec 2019 Netweb Technologies, a leading provider of server, storage, high-performance computing (HPC), Cloud and Big Data based solutions, showcased its range of storage solutions at Intersec 2019. With presence in 4 countries and manufacturing facilities in India and Singapore, Netweb is continuously expanding its network of international offices and partners. Along with presence in Asia and USA, it has also made a sizeable footprint in the Middle East and Africa region, with a full-fledged sales and technical support setup in Dubai, headed by Arun Sachdev, General Manager. On display at Intersec 2019, was the full life-cycle of surveillance use case with Tyrone servers & storage solutions and wide range of Ozaas Products (Surveillance, Passive Network and Smart home Solutions). Netweb has engineered to provide end to end solution for any large projects deployment requiring cameras, networking to VMS and small to large storage. Netweb already has the industry’s most unified (SAN, NAS & VTL in one) and flexible box which can connect to almost any network and can scale form few Terra Bytes to Peta Bytes. Recently it launched a new series called Collectivo which can scale from 1 Peta Byte to 100’s of Petabyte. “The quality and customization abilities of Tyrone servers and solutions, has made sure that our customers in Oil & Gas, Enterprise, Education and various other sectors are 100% content and satisfied. More than 60% of our customers are referred by existing customers and this probably is our best testimonial and speaks volumes about our achievements so far” says Arun. In Ozaas, Netweb will be represented in the MEA region through its distribution network and has also recently announced its intent to introduce AI based Sports IOT and Biometrics very soon.
Infoblox Hosts ‘Security and Data Centre’ Road Tour across EMEA and Asia Pacific Infoblox hosts a 21-city tour throughout Europe, Middle East & Africa (EMEA) and Asia Pacific. The Middle East and Africa leg of the road tour, focuses on security and next generation data centres, with the theme ‘Take Network Security to the Next Level’, kicked off on February 11th, 2019 in Cairo Egypt and will conclude in Muscat, Oman on the 27th of February. Ashraf Sheet, Regional Director MEA at Infoblox says, “We live in a hyperconnected world. IP traffic is exploding with over 3 zettabytes of annual IP traffic expected by 2021, and an estimated 125 billion IoT devices expected by 2030. Over 90% of enterprises have adopted public cloud. This rapid growth and complexity leads to a variety of security challenges, and over the past 10 years there have been over 780 million malware attacks. From ransomware to data breaches, cyberattacks continue to dominate the headlines but without integrated tools to help correlate data and automate responses, most organizations are simply unable to respond quickly enough.” At the 2019 round tour, Infoblox and its strategic partners will help regional organizations understand how next-level security, reliability and automation, managed on-premise and in the cloud, can help reduce incident responses, protect against data exfiltration and improve SOC team efficiency.
Array Networks Appoints VP of International Sales Array Networks, Inc. announced the elevation of Shibu Paul as vice president of international sales. In his new role, he will be responsible for driving direct and channel sales efforts in key global regions. These include India, Southeast Asia, Persian Gulf (GCC), and Australia and New Zealand regions for Array's entire product portfolio, such as its AVX network functions platforms, application delivery controllers (ADCs), and SSL VPNs. He will also be responsible for opening new markets for Array in Africa. In addition, he is responsible for setting up end-to-end operations including a strong channel, robust technical team and solid support infrastructure for Array customers worldwide. "Shibu has been instrumental in our growth and success in the region, building a solid team for our sales, marketing and support operations and delivering phenomenal growth for our business," said Michael Zhao, President and CEO of Array Networks. "We are very excited to see his efforts to develop strategy and execute on the sales plan for the region, and to expand our business into new markets in Africa."
February 2019 | 5
News Bytes
Western Digital ‘EDGE-TO-CORE’ Surveillance Solutions
As part of its 'Beyond Surveillance' campaign, Western Digital Corp., showcased its latest surveillance solutions at Intersec 2019, Dubai. Built around the themes of capture, store and analyze, the Beyond Surveillance campaign focuses on advanced surveillance technologies demonstrating how Western Digital solutions support deep learning and analytics such as facial or object recognition and traffic heat maps. Available for demonstration at the booth were three key products for the Middle East market: the WD Purple 256 GB microSD card (Capture), the WD Purple 12TB HDD (Store), and the enterprise class Ultrastar 14TB HDD (Analyze). The WD Purple microSD card comes with 24/7 continuous video recording capability. It is built for endurance and can withstand tough weather conditions and extreme temperatures of -25 degrees Celsius to 85 degrees Celsius. The WD Purple 12TB HDD is a surveillance-class drive with purpose-built artificial intelligence (AI) capabilities. It supports real-time detection of AI-triggered events at the point of capture with continuous background learning in emerging DVR and NVR systems with AI capabilities. It can support up to 64 cameras and deep learning technology. The Ultrastar HDD is an enterprise solution that has up to 10 times the workload capacity of regular desktop drives and also includes deep learning technology. Speaking at the event, Mr. Khwaja Saifuddin, Senior Sales Director, Middle East at Western Digital said: “Our Beyond Surveillance campaign focuses on complementing modern surveillance technology with powerful storage solutions.
6 | February 2019
Veeam Expands Leadership in Cloud Data Management Veeam Software has announced general availability of new cloud data management capabilities as part of Veeam Availability Suite 9.5 Update 4, as well as the upcoming Veeam Availability for AWS and Veeam Availability Console v3. The new capabilities deliver cost-effective data retention, easy cloud migration and data mobility, cloudnative backup and protection for Amazon Web Services (AWS), portable cloud-ready licensing, increased security and data governance, and solutions to make it easier for service providers to deliver Veeam-powered services to market. Veeam’s new capabilities address the concerns and challenges for enterprise IT leaders including migration of data, uptime, and cloud workload backup and recovery. “Veeam has dominated the backup and data management market in the modern highly virtualized on-premises environments. In the last few years, we have continued our tradition of innovation and evolved to become the leader in Cloud Data Management,” said Ratmir Timashev, co-founder and Executive Vice President of Sales & Marketing at Veeam. “Our latest version of Veeam Availability Platform is one of our most important and anticipated releases to date, providing simple, flexible and reliable solution to help customers migrate to and keep data available in the hybrid cloud regardless of its location. The latest announcements reinforce our position as a market leader in Cloud Data Management by expanding our strong relationships with AWS, Microsoft Azure, IBM Cloud, and over 20,000 service providers.
Bulwark, 20 Successful Years in MEA The UAE-based VAD, Bulwark, has entered 20 years of providing Information Security solutions and services to the region with value addition at the core of the company's operations since its inception in 1999. Recently, Bulwark expanded its operations in the Indian sub-continent region, following company’s growing business, robust partner network and strong demand for IT security solutions in India. Bulwark showcases and provides an integrated range of innovative and specialized security solutions and services for the IT security industry including PIM/PAM, antimalware threat protection, SOC automation, SCADA security, DDOS, WAF, cloud email security, HSM, endpoint security, firewall and an array of cyber security solutions to customers across the region. Bulwark delivers value-added services to its partners, that include solutions presales consulting, training, partner enablement programs, post-sales implementation and technical support, and adding value at every stage of sales life cycle. Throughout the last fiscal year, Bulwark has demonstrated commitment in its partner development by contributing and investing in certified professionals, demonstration equipment and valueadded services infrastructure.
Mimecast Acquires Data Migration Startup Simply Migrate Mimecast has acquired Simply Migrate, an innovative provider of archive data migration technology. With this acquisition, Mimecast expands its migration services with a rich portfolio of connectors, combined with a deeper experience in helping organizations get out of the business of managing expensive, unreliable legacy archives so they can move to a next-generation data protection strategy in the Mimecast cloud. This helps enable them to reduce costs, safeguard their intellectual property, preserve institutional memory, accelerate e-discovery and achieve compliance. The cost and complexity of legacy data migration is one of the leading obstacles preventing enterprises from moving to modern cloud-based archiving solutions. The acquisition of Simply Migrate will offer customers and prospects a faster, less expensive and more reliable path to the Mimecast cloud. “Legacy archiving systems are outdated and unable to handle growth and everchanging demands of a modern enterprise. Many organizations struggle with the ballooning email storage volumes alongside other unstructured data types, coupled with the cost and management burdens of storing it on-premises,” said Peter Bauer, chief executive officer at Mimecast. “With the acquisition of Simply Migrate, customers can reap the benefits of the Mimecast Cloud Archive, which was recently named a Leader in the Gartner Magic Quadrant for Enterprise Information Archiving for the fourth year in a row. The technology Simply Migrate offers is engineered to provide end-to-end migration into the Mimecast Cloud Archive, helping to cut costs and operational complexity while achieving a superior result with more flexible access to data, case management, supervision and more".
New Report Shows Retailers Bullish on Hybrid Cloud Nutanix has announced its Enterprise Cloud Index Report, measuring retailers’ plans for adopting private, hybrid and public clouds. The report suggests that enterprise workloads are quickly moving off traditional data centre infrastructure, dropping from 41% today to just 18% in two years, as cloud usage accelerates. The retail industry has the second largest penetration of hybrid cloud deployments at 21%; with 93% identifying hybrid cloud as the ideal IT model, outpacing the global average for other industries. Today’s consumer expects a seamless omnichannel shopping experience in store, online and through new avenues such as mobile, in-app or even smart TV purchases. At the same time, retailers need to gather, analyse and keep data secure. This pressure to keep ahead of customer expectations is driving retailers to deploy innovative IT practices faster than ever. Retailers are embracing public clouds more quickly than their counterparts in other industries, yet their control of public cloud spend is better than peers in other industries. Today, there is 15% public cloud usage in the retail industry compared to a 12% global average; and usage is set to grow to 22% in the next two years, outpacing the global cross-industry average by 7%.
Ring showcase at Intersec 2019 Ring used the Intersec platform to great effect by promoting its innovative home security products and services, giving partners and neighbors the opportunity to experience Ring products first hand and to learn about its features and benefits via demos. “Following Ring’s successful launch into the Middle East last year, we were excited to be part of Intersec to introduce our security products and solutions to a more focused audience. Ring’s mission to reduce crime in neighborhoods drives every decision we make, and we hope to provide convenience and peace of mind to homeowners across the region by keeping an eye on their most important possession, their home, even when they can't physically be there. Globally, Ring’s products have been hailed as dependable second set of eyes and ears to deter would-be thieves from entering homes. The goal is to bring the same convenience and security to Middle Eastern neighborhoods,” Mohammad Meraj Hoda, Vice President of Business Development – Middle East & Africa at Ring. Ring showcased as part of its latest suite of smart home security products, the newly launched Ring Stick Up Cam Wired, which is Ring’s first cameras meant for both indoor and outdoor use giving neighbors maximum flexibility to position the cameras anywhere, regardless of power availability, to secure every corner of their property. In addition to this, Ring also showcased products such as Ring Video Doorbell 2 which allows you to communicate with visitors from anywhere, Ring Video Doorbell Pro, , Video Doorbell Elite, Ring Floodlight Cam, and the new Ring Spotlight Cam Battery.
February 2019 | 7
Cover Story | Enterprise Security
ENTERPRISE SECURITY
SOLUTIONS FOR A SECURE ENVIRONMENT Innovations in artificial intelligence, machine learning, and deep learning will enable businesses to secure their commercial and digital assets in a cost-effective manner
8 | February 2019
O
ver the last decade or so, technological advancements have transformed the security landscape with a proliferation in the number of innovative security mechanisms that ensure businesses are completely protected. Today when we talk of business security, it automatically referes to a 360-degree security cover which includes cyber security as well as commercial security. Security—both cyber and commercial— has become a top concern for businesses around the globe. As a result, security has become a boardroom agenda and more and more businesses are committing greater investments for an all-round business security. According to Gartner, organizations in the Middle
Cloud Security As more and more applications and workloads get migrated to the cloud, security concerns around the cloud are also increasing. There is a lot of innovation and research underway to build solutions that can adequately protect data in the cloud. Some of the security solutions for the cloud demonstrated at the Intersec included the HID Origo Cloud platform, which combines access control and smart building solutions in one environment. The HID mobile access allows smartphones for access control and secure identification, as they can replace RFID credentials and provide high level of security, flexibility, and convenience. In addition, the mobile credentials can be managed over the air. However, cloud data is still considered
Organizations in the Middle East and North Africa will likely spend about US$1.9 billion in 2019, says Gartner East and North Africa (MENA) will likely spend about US$1.9 billion in 2019—an increase of about 10% over 2018—on enterprise information security technology and services. Even on the technology front, security providers are continuously innovating and leveraging latest technologies to enable organizations to meet their evolving security needs—both current and future. The Intersec 2019, held recently in Dubai, was witness to these technological advances and innovations. The Intersec buzzed with activity in the security space including cyber security—spanning the cloud, IoT, and mobile—to high-end surveillance security systems. We present a brief look into the activities that created headlines at the event.
susceptible to data breaches. To ensure such unfortunate incidents do not happen, experts believe that in addition to using applications and solutions, businesses should secure the data they possess. As a first line of defense, experts recommend taking adequate backups. Cloud can be a secured environment, if users are vigilant and practice security measures on their PCs, the networks they use to access the cloud, and the cloud applications they use. According to Khwaja Saifuddin, Sr. Sales Director - Middle East, Western Digital, “It's like driving a car on the road without taking an insurance policy and just hoping that nobody comes and hits you. With every technology, there are dos and don'ts, and it all resides in our hand,
how will we use that technology." Despite availability of numerous solutions for cloud security, data breaches do happen. Therefore, they are only as secured and smart as we are.
IoT Security Internet of Things, probably creating the maximum buzz in the information technology sector, is also the biggest vector for cyber attacks. According to Gartner, the number of IoT devices is likely to reach 21 billion by 2021. That means the cyberthreat emanating from these devices will increase manifold. To add to the challenge, currently, the security status of the IoT devices is rudimentary at best. There's a lack of standard manufacturing practices as well as communication protocols. To make matters worse, neither there is security implemented on the physical devices, nor do most users change the default passwords. This makes it incredibly easy for the bad actors to gain access to these devices. It has been observed that cyber criminals leverage loopholes in the connected devices to orchestrate complex cyber attacks that heighten the security risks for smart devices and smart homes. With an increase in the number of IoT devices, automation and software-defined networking will be critical. This is where an SDN approach with a fabric back into the data center will play a key role, says Darren Giacomini - Director of Advanced Systems Architecture, BCDVideo. Currently, majority of surveillance applications are actually on standalone, where nothing goes in or comes out. This means, security threats would arise from within. “We are seeing a lot of instances where people are using social engineering to get access. Sometimes they connect themselves to the network and scan IP addresses and try to gain any information to get into those devices. We can use the edge of the network to secure these types of devices.” he adds. Another train of thought is to consider a Zero Trust architecture when it comes to security. It ensures every device is secure February 2019 | 9
Cover Story | Enterprise Security
and compliant before it is allowed access to a network. “Pulse Secure is using zero trust on all the layers, whether it is the remote users or internal users connecting in,” informs Abdul Rehman Tariq, Regional Sales Manager – MEA at Pulse Secure. A key metrics around IoT security is visibility and reporting. For example, the Pulse Profiler can provide a detailed report on all the industrial devices on the network with their OS details, the kind of access the devices have, and run time/alarms etc. It enables businesses to achieve truely secure access architecture by knowing the difference between standard network access for users and IoT
Intersec was encryption of data. Experts suggest that businesses must ensure they have a platform that encrypts data—irrespective of whether the data is on-premise, off-premise, on cloud, or in transit. For instance, retail businesses can consider a cloud offering for all the video feeds or data. Government agencies, perhaps, can opt for onpremise. To ensure adequate encryption of data, businesses will need to plan the infrastructure design accordingly. In terms of surveillance system, encryption begins right at the beginning—the camera. The connection from the camera to the server, the
in technology. Apart from protecting infrastructure and resources, surveillance systems also play an increasingly important role in gathering information including retail information, time and attendance systems, as well as access control in terms of security. The intelligence and analytics embedded into the modern surveillance systems, make them far more progressive and provide superior security on the one hand, and help grow the business on the other hand. Since a single solution cannot address all the challenges, there are numerous surveillance solutions available that can be customized according
Businesses must ensure they have a platform that encrypts data - irrespective of where the data resides. access. Access control plays a crucial role in securing the network as well as physical premises. The iCLASS SE express reader from HID is a new generation of access control readers, that has a new hardware design. “With bluetooth directly on the board, it can be used for mobile access implementation in the field,” informs Jaroslav Barton, Director – Product Marketing, PACS, Global Regions, HID.
connection from server, and the server itself are all encrypted. Furthermore, the connection from the server to the client is also encrypted. Therefore, there is a full circle of encryption at every step in the chain, which provides full security to the systems. “This is a major advantage, especially in today's insecure digital scenario,” says Matthew Brecher, General Manager, Cathexis.
Encryption
Today's IP video surveillance systems have evolved with the advancements
A key theme that emerged from the
10 | February 2019
Surveillance Systems
to individual profiles, interests, and requirements. The surveillance space is buzzing with technological innovations. Leading the way are advanced technologies inlcluding artificial intelligence, machine learning, and deep learning. Surveillance involves working with a lot of images and videos. Expecially in the case of the Middle East security market, these images and videos are retained, stored, and referred back to for a longer duration. Future holds promise of solutions that will help locate specific piece of data
or identity rather quickly. For instance, searching for a particular blue car from petabytes of stored data, will become simple with all the blue cars coming up in the results. The search can be further narrowed down with specific criteria to locate the required blue car. “This kind of technology will actually simplify life for the security industry,” says John van den Elzen, GM Europe, Tiandy Technologies. Another key developement is the starlight technology. Most camera manufacturers use the starlight technology for use in dark environments. However, with Tiandy's super-starlight technology even a very dark and environment can be made completely bright.
Technologies at Play To harness data and gain insights, businesses need tools that can intelligently detect exceptions and trigger an action. “Tape boxes, videos, images, and pilot data are of no use unless they can provide businesses with actionable insights,” says Fracois Levy, Business Development Director EMEA, Digifort. Technologies, especially, artificial intelligence, machine learning, and deep learning are all set to transform the security landscape. These technologies help glean insights from structured, unstructured, and siloed data collected from disparate sources, making smart devices smarter. For instance, if currently a lot of security guards are required to secure a particular location, in future, machine learning algorithms will help guards with the information on an incident or breach that requires their attention. This will reduce the number of guards required at a location going forward, saving costs in the process. Companes such as Cathexis have begun working with neural networks and machine learning in their analytics, which allows them to detect or classify an object and add events to the software. For instance, if an alarm is triggered on the basis of sighting an unidentfeied person or car, and it turns out to be just a
dog, the alarm can simply be dismissed. Numerous security and surveillance solutions on the edge of the camera or with artificial intelligence, machine learning, and deep learning are enabling businesses to ensure security of their assets. Advanced security and surveillance solutions are easily available on the market.
Conclusion With so many other areas vying for attention, the last thing businesses want to worry about is security. Thankfully, technology is on their side helping them secure their physical and digital assets in a cost-effective manner. While technology has provided businesses with advanced security solutions, it has also provided cyber criminals with sophisticated tools to launch strategic cyber attacks. The advent of new technologies—Internet of Things, cloud, social media, online shopping options—have all resulted in a much wider attack surface for cyber criminals, making businesses and customers more vulnerable to security threats. Gazing into the security crystal ball to predict the future of security is a tough ask, given that we are in an era where technology is evolving rapidly. What we may consider a game changer today may be rendered obsolete tomorrow. That said the future is full of possibilities in terms of enterprise security and organizations will integrate all security elements into their security fabrics to find and respond to the threats that are becoming more sophisticated and complex at speed and scale. Organizations will proactively build resilience to the evolving security threats with efficient data protection, access control, and secured premises in order to safeguard their businesses holistically. And, with a rising awareness about stepping up their first line of defense, organizations will continue to make a greater effort to spread awareness about security practices through mock drills and sensitization on the basic hygiene of cybersecurity policies.
FACTS AND FIGURES • Damage related to cybercrime is projected to hit $6 trillion annually by 2021—Cybersecurity Ventures
• By 2020, the estimated number of passwords used by humans and machines worldwide will grow to 300 billion—Cybersecurity Ventures and Thycotic
• 58% of malware attack victims are categorized as small businesses—Verizon 2018 Data Breach Investigations Report
• 92.4% of malware is delivered via email—Verizon 2018 Data Breach Investigations Report
• 56% IT security decision makers report targeted phishing attacks were the top security threat they faced—CyberArk Global Advanced Threat Landscape Report 2018
• The average cost of a data breach in 2020 will exceed $150 million— Juniper Research
• The average distributed denialof-service (DDoS) attack grew to more than 26Gbps, increasing in size by 500% —Q2 2018 ThreatGuard Report, Nexusguard
• The United States and the Middle East spend the most on postdata breach response. Costs in the U.S. were $1.56 million and $1.43 million in the Middle East— Ponemon Institute’s 2017 Cost of Data Breach Study
• 41% companies have over 1,000 sensitive files including credit card numbers and health records left unprotected—Varonis Global Data Risk Report
• 21% of all files are not protected in any way—Varonis Global Data Risk Report
February 2019 | 11
Fadi Kanafani, Managing Director, MEA & Pakistan, NetApp
Interview | NetApp
DATA - THE CORE OF TODAY’S BUSINESSES
N
etApp HCI delivers a next-generation solution, including a hybrid multicloud experience that enables you to start anywhere, run anywhere, and manage everywhere, explains Fadi Kanafani, Managing Director, MEA & Pakistan.
12 | February 2019
IP-based surveillance systems require storage. What solutions should businesses adopt to manage this requirement? Today, when we talk about IP video surveillance, it is no longer limited to security. It's now expanding into the retail business as well. The video surveillance, that we were accustomed to in the past, has evolved. With analytics and intelligence now embedded into systems, and with our offerings , NetApp is able to provide much more progressive solutions that help government agencies as well as the private sector to ensure security, while also growing their businesses simultaneously. We cater to individual requirements based on customer profiles, their interests requirements. The technology itself has evolved and the offerings have evolved with it. Actually there is no one size solution that fits all. That's why we have lots of ecosystem partners we are working with for our customers.
Today's business is data-driven, because there's data everywhere. What measures can businesses adopt to make that data fabric accessible and secure? In terms of security, companies should make sure that they have a platform that encrypts data. This is something NetApp provides in terms of data and assets, irrespective of where that data resides - on-premise, off-premise, on the cloud, or traversing on the wires. We encrypt data to provide the security layer that is needed. The capacity requirements depend on the application that customers are using. You must ask yourself, how much capacity do I need? What is more suitable for me as a customer? Is it on-premise? Is it off-premise or in between? It's all driven by the workload that you will be using it for. For instance, if you are in retail, a cloud offering might be useful for all the video feeds or data. If you are a government agency or public sector entity, perhaps on-premise is the right solution for you. You must also consider and plan your infrastructure design. We cater to all such needs and the best advantage about it is our Data Fabric vision. We make all those platforms available to our customers at once if they are driving workloads that have video feeds, data, and voice on-premise. Certain workloads in the cloud require that the Data Fabric sticks it together and allows them to manage the data, irrespective of where it resides. That's why NetApp intends to change the world with data, because data is at the core of any business today. What challenges do you foresee businesses facing due to hyper convergence and what solutions would you suggest? We are observing more consolidation coming to the forefront of any discussion and lot of business models moving towards Opex models. As a vendor, NetApp always looks at the customer appetite , particularly in terms of leveraging the cloud. NetApp HCI delivers a next-generation solution, including a hybrid multicloud experience that enables customers to start anywhere, run anywhere, and manage everywhere. In terms of challenges, there's still lots of room for education about cloud and the advantages it offers. I say this because many customers come to us with concerns about security, such as
where does the data reside, is it inside or outside the country. We address these risks and advise them regarding what is best for them. Depending on the line of business, we help customers with NetApp HCI. But first, a cloud strategy needs to be put in place. And to the best of my knowledge, 75 per cent of CIOs do not have a sustainable cloud strategy yet. What are some of your latest offerings in terms of innovation, and your plan ahead for 2019? At Intersec this year, we had six pods where we demonstrated different solutions along with our ecosystem partners. Because at the end, these are complex offerings and it's not just all about NetApp, it's also about our partners who make it happen together with us. We partner with them to provide integrated end-to-end offerings, for example Ipsotek, the number one global analytics organization that caters to facial recognition and analytics requirements. Then you have Milestone Systems, which is the number one global VMSrecognized brand. With Milestone, we have validated designs and integrated offerings that we can go to market with. There are only two companies that are recognized in the US by the Ministry of Defense and they are one of them. On one of the pods, we have Saudi Telecom promoting their VSaaS offering, a video-surveillanceas-a-service, based on VideoNEXT application and NetApp as a platform. Then, we have Axis cameras, the number one IP cameras for video surveillance. We have Ingram Micro with us, who is a distributor not just for NetApp products and offerings, but also for Axis and others. As you can see we have built a very tight network of ecosystem partners to help us put together the right offerings that can address the unique business needs of our customers. Regarding our innovations - we spoke about them during GITEX as well. ONTAP AI is an AI-based app, which can help our customers move to the artificial intelligence landscape rather quickly. NetApp ONTAP AI powered by NVIDIA DGX supercomputers and NetApp all-flash storage is simplifying and accelerating the edge-to-core-to-cloud data pipeline for deep learning.
NetApp ONTAP AI powered by NVIDIA DGX supercomputers and NetApp allflash storage is simplifying and accelerating the edge-to-coreto-cloud data pipeline for deep learning.
February 2019  |  13
Interview | Western Digital
2019 to be a Big Year Before Going Into 2020 “Data, today is growing exponentially and the amount of storage space needed is tremendous and growing every day,” says Khwaja Saifuddin, Senior Sales Director, Middle East at Western Digital
In a data-driven economic landscape, how have storage solutions evolved? Data is the new oil - And we made the best barrels to save that oil. If we look at it from that perspective, I think the key differentiator or the value proposition from us through our products has been that we don't have one size fits all solution, we don't sell only vanilla flavor. It all started when we started identifying that every vertical has a different need, in terms of creating, accessing, and storing that data. That's when we started our color campaign on trying to educate the consumer about the difference between a purple drive to a blue drive versus, a red and a black. From a corporate perspective, that's the way we drive our products in a differentiated manner. The other thing about the data of today is it's growing exponentially and the amount of storage space needed is tremendous and growing every day. If you look at our offerings, we also offer one of the highest capacities. Not only capacity, but reliable capacity, in which the consumer can be assured of using our product to save precious data—it's going to be there when they need it. Given the rapid adoption of cloud, how secure are workloads on the cloud environment? Cloud is an absolute secured environment, provided the end users take care of the security of their PCs, the network which they use to access the cloud, and the cloud application they use. It's like driving a car on the road without taking an insurance policy and just hoping that nobody comes and hits you. With every technology, there are dos and don'ts, and it all resides in our hand, how we use that technology. An explosion in the amount of data generated, makes it
14 | February 2019
vulnerable to cyber-attacks. How can businesses secure the data they possess? First of all, take adequate backups. There are many applications and solutions that ensure data breach doesn't happen. But still every day we hear of instances and accidents that it does happen. So again, they are only as secured as smart we are. Please elaborate on your offerings and innovations for Intersec 2019. We have broken down our offerings at Intersec into capture, store, and analyze. This is the journey that anyone covers in security and surveillance environment. You're capturing data not only from a CCTV but you're also using drones, body-worn cameras, and dash cameras. We have solutions for all these different verticals. Our micro-SD based solution goes into the IP cameras and the dash cameras. Then the journey moves to storing it, where we have a product range of up to 12 terabytes. And then comes the analysis part, where even at the Intersec, you can see more than half the vendors selling software solutions which are running and making meaning out of it. That's where we have our enterprise ultra star solutions. Our J box and platform solutions, where all this analysis and data-intensive calculations, permutations, and combinations can happen. Being the only storage vendor who can offer this 360 degrees of a solution makes us very proud. What are your plans for 2019? For 2019, we have a lot of things planned, from our engagement perspective to our educational campaigns to the products. I think people should stay tuned and look forward to it. At the CES, we launched a lot of new products which were not only the first in the class, but also new technologies which are coming in. So it's going to be a big year for us before we go into 2020.
Interview | Pulse Secure
Pioneering the Zero Trust Architecture In the wake of evolving cyber threats due to increased smart devices, what security measures are a must-have? I think all organizations now need to consider a Zero Trust architecture when it comes to security. There are numerous devices, whether Industrial/IoT or just standard user devices. A Zero Trust architecture ensures every device is secure and compliant before it is allowed access to a network. Pulse is pioneering the Zero Trust architecture with zero trust on all the layers, whether remote users connecting in or internal users. We see this as the next phase of ensuring security on all the layers. What concerns should security and risk management leaders map before finalizing a security vendor? It's very important to understand the problems the vendor is trying to solve. Some legacy vendors are not innovating and just banking on the brand and marketing. Security and risk management vendors need to understand the long term objectives before investing into their vision. Pulse Secure has been providing secure remote access for more than 15 years. We have now naturally evolved into Secure Access with in-house engineering to solve real world problems, instead of just acquisitions. This is the key for businesses to understand as they search for vendors.
Abdul Rehman Tariq Regional Sales Manager, MEA Pulse Secure
Devices, applications, industrial and enterprise smart "things" are all looking to access the network. Secure access not only provides robust compliance, but also a friendly user experience to both customers and admins, informs Abdul Rehman Tariq, Regional Sales Manager – MEA at Pulse Secure
What can businesses do to achieve comprehensive, integrated, and flexible hybrid IT secure access? The first thing businesses need to understand that Secure Access is not just about users anymore. Devices, applications, industrial and enterprise smart "things" are all looking to access the network. Secure Access not only provides robust compliance, but also a friendly user experience to both customers and admins. At Pulse, we pride ourselves to be the only pure play Secure Access vendor, with a simple mission of providing secure access on any device, to any application, from anywhere. How can businesses achieve a secure access security framework for the Industrial Internet of Things? With IoT, the key metrics is around visibility and reporting. For example, our Pulse Profiler provides a detailed report on all industrial devices on the network with the OS details, the kind of access the devices have, and run time/alarms etc. Businesses can achieve true secure access architecture by knowing the difference between standard network access for users and IoT access and ensuring the right vendor is providing the guidance.
February 2019  |  15
Interview | HID
HID Mobile Access for Secure and Convenient Smartphones Use HID Origo provides higher reliability for mobile solutions and offers subscription-based HID Mobile access informs Jaroslav Barton, Director – Product Marketing, PACS, Global Regions, HID Could you please discuss HID's cloud based access control solution? Being leaders in providing secure identities, we understand that more and more applications now go to the cloud. Because the customers are in sync, they see the benefits of the cloud. They see that it's not only more flexible, but it's also more secure than having on-site solutions, in most of the cases. On our path to the cloud solution, we are launching the HID Origo Cloud platform. It's a new HID platform that enables combining access control and smart building solutions in one environment. HID Origo platform will host both HID applications and also our partner's applications. The first HID application which is launched on the Origo platform is the HID Mobile Access. We understand and know from our customers that more and more mobile phones are being used for purposes like access control and secure identification, and can efficiently replace RFID credentials. Please talk about your Mobile Access solutions. We can provide a high level of security, flexibility, and convenience in using smartphones. Using smartphones, one can open the door from a distance, and can easily manage the mobile credentials remotely. HID Origo brings a higher reliability for mobile solutions. It brings the possibility of new business models like subscriptions. HID Mobile Access on Origo is subscription based, which means you do not pay for individual credentials on the phone. Even if the phone is lost or replaced, with the subscription service you will pay only for users. As a result, you only pay for your use. For instance, if an employee in an organization is using HID Mobile Access credentials, when the phone is replaced he can have new
16 | February 2019
mobile credentials for no extra costs when the device is replaced. This is covered in the license, which is a huge benefit. Additionally, subscription-based solutions like HID Mobile Access provides better forecasting and budgeting to the organizations. It also results in lower total cost of ownership because subscriptionas-a-service is usually clubbed with the operating expenses. How is HID addressing access controls for IoT environments? Internet of Things (IoT) is definitely an important topic for the future. IoT refers to the different devices connecting into the internet. Mostly, these devices are not used for access control. So, it could be anything else besides access control. Whats important is how we secure the communication to IoT. This is because connecting anything to the internet is quite easy today. However, to ensure that the communication is secure and cannot be interrupted or intercepted, is much more difficult. I believe, here stands the main issue for the future and HID is active in providing secure solutions for IoT. Could you please talk about your participation at Intersec 2019? At intersec we are launched HID Origo which lays the foundation for a broad ecosystem of cloud-based access control technologies, products, services and business models that will accelerate workplace innovation; it dramatically increases our partners’ capabilities to create more connected and seamless building experiences for end users, We are planning to add other solutions to the HID Origo platform, like location services. We have solutions for our partners that develop they own application so we provide them API SDK so the partners
Jaroslav Barton Director–Product Marketing, PACS, Global Regions, HID
can develop their own application, which can be done based on HID Origo platform and provided to all HID customers so our partners can get access to all HID customers and can scale their products and offers very efficiently. We also showcased the Mobile Access solution which is powered by Seos® breakthrough credential technology, HID Mobile Access enables employees to now use their smartphone, tablet or wearable to access doors, gates, networks and more. This solution for access control greatly improves user convenience in today’s mobile-first world, as well as makes your organization look modern and professional. We have many partners using HID mobile access on our Origo platform and considering the subscriptions, we see a huge demand. We are happy that our customers like the application.
Interview | Cathexis
Growing Need for Surveillance Systems taking their APIs, just in case, and building their information into our software. This includes access control to weighbridges, fire panels, alarm systems, automatic number plate tracking, analytics, facial recognition, all of that. And this allows us to be the central hub for Internet of Things. That really is multi-way communication: fire alarm panels talking to access control systems with us in the center or of things, using those external triggers to perform general video management such as recording video and sending alarms.
Matthew Brecher General Manager Cathexis
What role do you foresee surveillance systems playing in the overall security scheme of the organizations, going forward in the future? I think, internationally, there's a growing need for general security systems, especially surveillance systems. In most large enterprises and even mid-level and small companies - in South Africa as well as in the Middle East - some form of security is required, usually built around CCTV surveillance. One of the interesting things about surveillance and security among enterprises these days is the growing inter-connectivity between technologies. This means surveillance systems play an increasingly important role in not only protecting infrastructure and resources, but also in gathering security information for things like retail information, time, and attendance systems, as well as access control.. So that's where I see surveillance growing. Are there any solutions that allow
businesses to upgrade their existing surveillance setup? Yes, of course. We started in the analog era 15 to 20 years ago and had to upgrade our own infrastructure to digital. In doing so, we have carved out a path for upgrading ourselves and other people from older systems to more modern ones. To do this we allow for the use of our own and third-party hardware encoders and components.. The fact that we are an open system means we can run on any Windows, or Ubuntu Linux, system. This means that systems can easily be upgraded to CathexisVision. In an era of smart everything powered by IoT, how will surveillance systems become smarter? One of the ways we approach it is with our rather powerful API, which allows other products to pull information from our software to use in their software. On the other hand, we integrate third-party products into our software, which involves
What features must businesses consider when selecting a surveillance system for their organization? In building any surveillance system for the company, you need to first identify your needs. You constantly choose features or functions based upon what you think will work. In general, you can start with the basics and then move on from there to add things such as analytics or advanced features based on identified needs. Could you tell us about your innovations and what you're showcasing at Intersec this year? There are a number of innovations we are showcasing at Intersec this year. One of the most interesting ones is that we've started working with neural networks and machine learning in our analytics. To this end, we've added a system that can detect or classify an object, so it can distinguish between a dog or a person. And then, you'll further be able to add events to the software using that. For instance, if you see a car or a person and then send an alarm, and if it turns out to be a dog, dismiss the alarm. On top of that we have completed the circle of encryption in our software. And we have what I like to call beginning-to-end encryption now. At every step in the chain, the systems need to be secured, which is a major advantage, given today's insecure digital scenario. February 2019  |  17
Interview | Tiandy Technologies
Machine Learning to Drive Security in Future Expansion plans, innovative technologies, and future of surveillance, John van den Elzen, GM Europe, Tiandy Technologies talks in detail about each of these aspects physically to do the same job effectively. It is also cost saving in the end.
John van den Elzen GM Europe Tiandy Technologies
How do surveillance solutions help today's businesses ensure security of their assets? We now have more and more security and surveillance solutions available in the market. You can see solutions on the edge of the camera or with artificial intelligence and also with deeper learning technology also called machine learning. Surveillance is a repetitive and mundane task and this may cause performance dips for human beings. Companies today are developing new solutions based on artificial intelligence and deep learning to let the technology do the surveillance for us. This will make the job of a security guard much easier. In the future, the algorithms in the camera will notify the guards as and when there is a breach or if there is an incident which requires attention. With time, you will start needing less security guards
18 | February 2019
What innovations do you think we can expect in the future in surveillance systems? The most spectacular innovations, of course, are related to video analytics and artificial intelligence, along with deeper learning or machine learning. Video analytics helps in recognizing a particular use case within an ongoing video feed. Artificial Intelligence and deep learning helps in building new use cases automatically and enables surveillance and security systems to proactively recognize patterns in advance. This opens up an era for new applications in many industries and surveillance is one of the most obvious. Surveillance cameras are creating a lot of video footage and artificial intelligence and deep learning technology will help to quickly analyze video data. This is especially important in the Middle East, because you have a long retention time for video surveillance data. You will see solutions with intuitive video search engines where you can quickly find, for example, a blue car or a man with a dog from petabytes of video. Algorithms are utilized to search for specific videos using keywords via an intelligent video search engine. This kind of technology will actually simplify life for the security industry. What are some of your latest offerings? I first want to talk a little bit about Tiandy because we still need to grow in this region. We are a well-known and famous brand in China and we are now also expanding outside China. We are opening the markets in the Middle East for Tiandy as well since we spot a lot of interest for
the products and solutions we develop. That’s why we are at the Intersec show. It is all part of our vision for the world strategy which we are currently rolling out. I am not sure if people in the Middle East are aware, but Tiandy is the number 9 in the world according to the A&S Security top 50 rankings. We have all the potential to grow. We have recently opened a brand new manufacturing site close to the Tiandy Campus in Tianjin. This site is currently the most advanced manufacturing site for IP cameras, NVR’s and other IP related products in the world. The site is designed and build based on the latest production technologies. This enables us to run large production volumes and delivering high quality products against cost effective pricing. At the same time it also offers flexibility and freedom to create attractive product designs. The new site has the capacity to manufacture over 10 million cameras per year. One of our latest offerings we are showcasing during this Intersec is our face recognition solution. More manufacturers have night vision cameras but Tiandy Starlight Technology is unique in the industry. We are showing a complete range of cameras with our latest Starlight Technology during the Intersec as well. What technologies does Tiandy offer? Talking about the technologies, let me first explain that one of the key offerings is the cost effective pricing in combination with high quality and high reliability. Our products have attractive designs and we have products in the lite, pro, and ultra series. The lite series is for entry level solutions for the SMB, the pro series is for professional projects, and the ultra series for enterprise projects. So, we can cover the complete range.
Interview | Digifort
Game Changer in the Video Management System Could you tell us more about IP video management systems and how they can benefit businesses? The IP solutions and video management are more interactive, more network-based, have more capability & flexibilities now than ever before. That's why organizations should go for such technology. It offers a much wider interconnection between different connectable devices and very intelligent, all over the global network. There is a lot of innovation happening in the surveillance space. What impact will they have on future surveillance systems? Associated tape boxes, record videos, and pilot data in boxes make no sense if you cannot bring over some intelligence to make sense of this data. You're not proactive, you're behind the time. So to bring intelligence—which can be like an analytic and investigation tools based on filters and forensics is done through collaboration with 3rd party technologies. Through these deep integrations, all these tools can bring over very important trigger alerts to the operator in an event, instead of just blindly looking at the live view or recorded footage for hours and hours. This is not being proactive. Also, from these huge amounts of recorded videos, you should be able to retrieve an event upon certain criteria. For instance, when you have witnesses telling you it is a woman wearing red and going from this end to that end, you can use all of these eye witness accounts to narrow down to the person you're looking for, amongst thousands of people, quickly. Given the cities becoming smart, what smart security features are a must? Smart is how we can integrate and make the system global and interactive from a single platform. Digifort is very dedicated to delivering this very interactive functionality with different systems. These different systems can be access control, radars, traffic management, X-ray machine, an entrance of a facility, analytic, LPR, traffic violation plus more, altogether managed by the same platform and merge with the video evidence. Could you please tell us more about your product solutions and any innovative offerings in the pipeline? Digifort is not just a video management system, it's more than
Francois Levy Business Development Director EMEA Digifort
that. It's a truly open platform where we bring over different bricks of intelligence through integration, making it a global, single platform solution. In 2019 new technologies utilizing data will help improve business operations by making them more efficient while reducing the costs. Continually adding value to Digifort VMS is our top priority and our new version 7.3 promises to do just that. The anticipated time of release is either Q3 or Q4 of this year. 7.3 is one of the major new releases for 2019, which has so many new and powerful enterprising features, such as Follow me and object link, along with edge playback, web access as well as new and improved Apps plus so much more, there is too much to list them all here. Performance has also been improved to deliver even faster and stable performance with much less hardware requirement than ever before, saving you big $$$. The facial recognition, the growing sophistication of facial recognition generated considerable interest in 2018. However, it still raises a question about how accurate it is in crowded public places. In 2019 we will showcase more accurate with more features that are non-GPU dependant, so keep your eyes and ears peeled for our announcement. Another hot topic is cybersecurity. In 2018, we had already made numerous changes to respond to such threats as well as adding new security measures to our software and the way we connect to our servers as well as how we handle data. We are committed to doing more in 2019. February 2019  |  19
Interview | BCDVideo
Automation Reduces Margin of Error Darren Giacomini - Director of Advanced Systems Architecture and MAX Burgees - Director of Sales – International, at BCDVideo provide insights into the evolving surveillance systems, and their plans for the coming year
In view of big data and IoT devices generating enormous amount of data, how will the servers and data centers evolve to cope with the changing requirements? Darren Giacomini: As you increase the number of IoT devices, video surveillance, in general, is probably one of the first IoT devices you have. There's a large number of video surveillance devices out there. As you increase the number of IoT devices, automation and software-defined networking (SDN) is going to be critical. You will not have the ability to keep up with rapid changes. So, an SDN approach with a fabric back into the data center is going to be critical. And then from the video surveillance side, we will have people integrating these solutions, who may not be network or IT savvy. What's absolutely necessary is that we make sure when these things interconnect, we provide solutions that automate or simplify the best practices in IT. Automation will ensure that when the physical security integrators are bringing systems into the data center, we are on task and on scope of what we're trying to conclude. We can make sure that we're using best practices to deliver the best performance into the data center and don't reverse the effect. More data, more cloud adoption means more attacks, more threat to security. How can businesses ensure a 360 degree security approach? Darren Giacomini: It’s about creating discipline in your processes in addition to working with vendors who have proven, transparent, cybersecurity procedures. Technology is ever evolving so understanding, and preparing for what’s next is essential. More immediately, one of the biggest challenges in physical security today and often overlooked is the implementation of security on the physical device level. Majority of users, for example, are not changing the default passwords. So you're making it incredibly easy for somebody to get in. We’re also seeing a lot of instances where people are using social engineering to gain access. Even in a closed environment they can connect themselves from inside the network and scan IP addresses to obtain information to get into those devices. You're going to see a dynamic shift in the way things are handled. Software-defined networks (SDN) will allow for automation in provisioning and authentication of devices. So the SDN side of it completely removes the capability to access the
20 | February 2019
Darren Giacomini Director, Advanced Systems Architecture BCDVideo
network, because ports are placed in isolation until authenticated. The hacker can’t see anything. Could you please discuss how has Intersec been and your participation, and the plan for 2019? MAX Burgees: It's been a phenomenal show. Rohit started as a regional sales director for the Middle East Africa and India at the beginning of July. He's just really created a buzz for BCDVideo. The show is a great venue to network, which Rohit has been involved with for many years, he literally knows everyone. While walking around, it's hard to get to places because we are always getting stopped by someone who knows us. We're going to continue to invest heavily in the Middle East. We're incredibly excited for 2019. And we know it's going to be even better by 2020. Darren Giacomini: One of the things I would add is for system integrators to think about in 2019 is how they scale their resources and skill sets. My focus this year is on the automation aspect for the integrator, making sure they can scale out resources. You will have a certain level of architects and network engineers available to you. But that doesn't always scale globally
across all your projects. For example, we offer switching platforms with built-in automation. At BCDVideo integrators can answer simple questions about what their project requires. For instance, they can say there are ten switches here; this is what I need, and these are the requirements. The automation gets built into it and automatically provisions that fabric and switches. When you remove the human element from both the programming and the configuration aspect, from an integrator standpoint, you reduce the margin of error. And not only do you scale your local resources beyond what you have today, but also reduce your truck rolls to site trying to fix problems that you cannot solve. The bottom line is you're going to keep more of that profit margin in your pocket. What role will IT-based surveillance solutions play in the overall security scheme for going forward? Darren Giacomini: From my perspective, you see almost what I refer to as crowdsourcing surveillance, and it's not a technical term. Today, you have all of these citywide surveillance applications that want to appear in private sale, and they want to bring them into the equation. You have more and more citywide surveillance applications that help realize that you don't have to deploy 6000 cameras throughout the metropolitan zone because some of these things are already covered. I think on the IP side you're going to see more people focusing on the ways to leverage what's already out there and bring that into the overall smart city deployment. And, it's going to happen, maybe in a couple of years. You're going to see these things and resources are already out there. What's one advantage for system integrators partnering with BCDVideo? Please talk about your partnership benefits. MAX Burgees: Well, we support them. I think you are aware that we don't work with the end users. Integrators are our agents. We are there to help them throughout the course of the projects. We provide world class service and guarantee our calculations, based on the parameters supplied of the project. As long as they give us all the information, any shortfall to storage or bandwidth, BCDVideo is liable. So, it takes away the liability for them, for the end user, and the consultant involved in the project. We always say that there is an ease of doing business and the peace of mind, knowing that BCDVideo has their back. And that, I think, is crucial. Another thing that we do great is that we provide fast delivery. If you need something in a timely manner, we can get that for you. We optimize our platforms, and we can pre-install, plus we can activate VMS licenses for you for no additional cost. Who else is going to do that for you? When you receive your solution, all you need to do is plug it in, turn it on, and everything
MAX Burgees Sales Director – International, BCDVideo
is there. This saves hours of unbillable labor for the integrator when they're on site. Darren Giacomini: Next thing would be guaranteed, validated solutions. When I say that, I take it from more of a systematic approach. There's no another company that builds systems from the servers to the storage to the networking in a holistic solution, whether it involves access control, whether it is physical security or surveillance, or other aspects. We validate solution sets that have been tested in our lab. We know the performance metrics. We work with the clients who determine what they require from the perspective of availability—the five nines of availability. We design the network or the servers, storage, and hyper-converged infrastructure, and we guarantee our calculations. In the end, the only thing we don't cover are the cameras. So the liability from the integrator now shifts over to BCDVideo, and I think there's no other company in the world that is offering this. MAX Burgees: I also want to bring your attention to our global warranty. Our workstations, and our servers come with a five-year, next business day response including keep your hard drive. Especially relevant to the privacy factor, you can keep your bad hard drive or get it swapped out. I think it's crucial and that's why we have made this our standard on every workstation and server that we ship out around the world. February 2019 | 21
News In Detail
Dahua Heart of City (HOC) Debuts at Intersec 2019
D
ahua Technology introduced its “Heart of City (HOC)” strategy to the overseas markets during the Intersec 2019 in Dubai. Xin Chen, General Manager of Dahua Technology Middle East FZE, shared the new strategy with the guests. “Bringing HOC to the overseas markets not only showcases the worldleading position of Dahua Technology in driving smart city transformation, but also our long-term dedication to serve the Middle East market based on our mission of enabling a safer society and smarter living,” said Chen. Nash Zhang, Public Security Expert from Overseas Business Center of Dahua Technology, went on to present the new strategy in detail, “The smart city has experienced rapid development in the last 10 years and has entered the stage of new development with smart city 2.0 framework. However, many problems and challenges remain unresolved. Passive
22 | February 2019
sensing and partial intelligence, the data island, and severe network security threats are the main challenges. How to effectively utilize the new city resource—data—to help the decision-making of urban construction and planning, has become a major subject.” said Zhang, “To solve these problems, we proposed HOC, which is in-line with the top-level design experience from hundreds of city projects. We believe that the maturity of five great technologies: artificial intelligence (AI), big data, cloud computing, IoT and 5G will enable the evolution of smart city 3.0 and bring great changes to our lives.” First released at Security China 2018, Dahua Heart of City is a smart city development engine supported by full sensing, full intelligence, full computing, and full ecosystem capabilities. It realizes the construction of a “1 platform, 2 centers, N applications” (1+2+N) new smart city framework for application at the city, industry, and commercial levels.
SNB IT Distribution Participates in Intersec 2019
S
NB IT Distribution participated
In addition, SNB announced
integrated security solutions, including the
in Intersec 2019 and showcased
partnerships with two new vendors
latest addition – 3XLOGIC infinias access
live demos of surveillance,
2CRSI and Antaira. With these
control,”noted Erick Boudier Country
networking, data processing, data
partnerships SNB will see 2CRSI
Manager Europe and MEA, Stanley Black &
storage—back up, access control, and IT
supporting with their servers, storage
Decker.
Security.
and HPC solutions through SNB across
SNB and its sponsors Pelco by Schneider electric, 2 CRSI, Zyxel, Pacom, and Western Digital introduced their
“We at 2 CRSI were very excited
the channel while Antaira with their
to showcase our latest products and
dynamic industrial networking solutions.
introducing ourselves to the dynamic
“The Intersec exhibition in Dubai is
surveillance market. Our debut in
latest technologies across various
the perfect place to showcase Pacom’ s
intersec was a successful one. Thank
verticals and met some of the best
innovation and cutting-edge technologies
you SNB,” said Ravi Sudarshan, Regional
decision makers who might be
to the global security market. It was a
Manager – GCC, 2 CRSI.
supportive in developing the businesses
very exciting opportunity to join forces
“Thanks for the hospitality. We
and future growth of the economy by
with our long-term partner SNB and to
look forward to our growing business
heading towards Expo 2020.
present our ever-expanding portfolio of
relationship,” said Santosh
February 2019 | 23
Insight | HID Global
HID Global's New Cloud Platform for the Connected Workplace
H
Hilding Arrehed Vice President, Cloud Services, Physical Access Control HID Global
HID Origo lays the foundation for a broad ecosystem of cloud-based access control technologies, products, services and business models that will accelerate workplace innovation; it dramatically increases our partners’ capabilities to create more connected and seamless building experiences for end users.
24 | February 2019
ID Global has announced the availability of its HID Origo cloud platform that will provide partners with opportunities to create more seamless and intuitive workplace experiences that are built on HID’s access control infrastructure. The platform combines HID’s technologies for mobile IDs (and location services in the future) with its expansive access control architecture to bring together physical security and a wide range of building applications, services and IoT use cases via a unified cloud experience. “HID Origo lays the foundation for a broad ecosystem of cloud-based access control technologies, products, services and business models that will accelerate workplace innovation; it dramatically increases our partners’ capabilities to create more connected and seamless building experiences for end users,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control, with HID Global. “The platform will remove integration barriers between access control systems and smart building applications, and we will continue to expand its value with capabilities that further improve how people securely move through a facility and interact with its services.” The platform provides an app-based innovation model for integration, enablement, developer tools and services geared towards simplifying how partners, new developers, and resellers bring access control solutions to market. HID Origo will make it possible to develop new applications and integrated solutions for HID’s complete installed base of millions of access control devices and system—all at once. The HID Origo platform embeds cloud connections and IoT functionality as app extensions into mobile devices, HID readers and controllers, and gives developers direct access to this hardware via HID Origo application programming interfaces (APIs) and software developer kits (SDK). The platform also enables data analytics to be used for new capabilities, including remote reader configuration, predictive access control system maintenance and intent detection.
Insight | Rasilient Systems
Rasilient Systems and Seagate Technology Power Video Surveillance New Zero 6 Mall
Sean Chang CEO Rasilient Systems
R
asilient Systems has partnered with Seagate Technology to integrate Seagate’s SkyHawk surveillance hard drives across its solutions and help customers maintain data integrity, storage reliability and scalability to address future growth. Zero 6 Mall is one of Rasilient Systems’ latest customers in the Middle East region to implement the video surveillance and storage solution, powered by Seagate SkyHawk technology. Using Seagate SkyHawk technology, Rasilient delivers high performance video surveillance storage solutions that can process and store video from four times as many cameras per server as other solutions, delivering higher resolution footage, improved analytics, and enabling customers to increase their sensor counts and make decisions faster. Rasilient’s system for Zero 6 Mall is designed to be futureproof. Its purpose-built technologies lower CAPEX and OPEX by extending product life expectancy and enabling scheduled maintenance instead of reactive maintenance as systems age. “Security is always the top concern in designing and developing a popular tourist and resident destination like Zero 6 Mall. Rasilient is honoured to have been chosen to help secure this impressive and unique facility,” said Sean Chang, CEO of
Rasilient Systems. Issa Ataya, managing director of Alef Group, the parent company of Zero 6 Mall, was impressed with the results: "We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall.” Zero 6 Mall is just one of many projects Rasilient has completed in the UAE and surrounding areas over the last few years, according to Chang: “With the successful implementation of quality and reliable video surveillance solutions for projects like Zero 6 Mall, Rasilient continues its growth in the very important Middle East market.
Business need • Implement video surveillance server and storage solutions with minimal dropped frames Solution • ApplianceStor AS85R Server and PS5000 Rackmount IP Storage (with Seagate SkyHawk) and video management software (VMS)
Benefits • • • • • • • • • •
High performance video surveillance storage Reduction in video recording loss Storage reliability and scalability Supports higher resolutions Real-time analytics Increased camera and sensor counts No frame drop Four times as many cameras per server Zero recording gaps Solution Featured IP video surveillance systems
February 2019 | 25
TechKnow | ESET
Work Together With Children for Better Online Experience
B
eginning in 2004, Safer Internet Day has now become one of the landmark events in the online safety calendar. And, this year’s theme, ‘Together for a Better Internet’,
encapsulates tremendous discussion seen around online safety and cybersecurity. We put a lot of onus on finding the right solutions to protect our kids online, but when kids grow up they will live without online parental control. Therefore, ‘together for a better internet’ should mean working with our children to educate, inform and protect them, so they can eventually make the right decisions for themselves. Of course, as parents, you must choose the right parental control software on the family computer, and do it with your kids. Talk them through the programmes you’re installing and select your privacy settings together, discussing why you are doing it and the kind of threats you’re protecting the family against. This gives your kids an element of control and responsibility over their online activities that can produce better results when it comes to their internet education. Set an example; whatever you expect your kids to do, make sure you are also doing. If you’re asking your kids to cover their webcam when they’re not using it, make sure you also do it. ESET’s software, such as ESET Parental Control helps navigate online, manage apps and websites used, and together decide what’s good. The age-based filters help manage the apps that children can and cannot access, allowing parents to consider the right restrictions without imposing a blanket ban. Other features include setting time limits on when children can play on their devices and creating exceptions that kids can request. Parents can even send their children messages which they must acknowledge before they can continue to use their devices.
26 | February 2019
TechKnow | Tech Mahindra
Tech Mahindra launches “netOps.ai” to accelerate 5G adoption for CSPs
Manish Vyas President CME & CEO, Network Services Tech Mahindra
T
ech Mahindra Ltd, recently announced netOps.ai, its Network Automation and Managed Services Framework based on CI/CD (Continuous Integration / Continuous Deployment) principles. Tech Mahindra will conduct the first-ever live demonstration of its netOps.ai framework at Mobile World Congress 2019. Communication Service Providers (CSPs) across the globe are getting ready for the 5G revolution and preparing to roll out 5G networks. Tech Mahindra’s netOps.ai, Network Automation and Managed Services Framework, is geared to accelerate 5G Network adoption by automating all the key network life cycle stages. The main features of netOps.ai include: Telco Cloud Automation: Automating the Telco Cloud Deployment of different personas and enabling one-click deployment of Telco Cloud.
VNF Lifecycle Automation: Automating VNF Onboarding and End-toEnd network integration with integration accelerators in its VNF-Xchange NetDevOps: Implementation of complete DevOps Continuous Integration, Continuous Delivery (CI/CD) pipeline for 5G networks in a multi-vendor environment Service Orchestration: Automation of Network Services with Orchestration, including closed-loop-control implementation for self-healing and autoscaling Tech Mahindra will demonstrate netOps.ai framework in a fully virtualized, multi-vendor 5G network and showcase the benefits of deploying netOps.ai including: automated validation of the entire NFV stack (from Hypervisors to VNFs), automated software updates, significant acceleration of end-to-end validation cycles, and rapid deployment to production networks. Manish Vyas, President CME and CEO of Network Services, Tech Mahindra, said, “Tech Mahindra’s netOps.ai Framework will significantly boost the speed of 5G network rollouts. Communication service providers across the globe will be able to accelerate their 5G Time-to-Market and simultaneously reduce their cost of ownership by automating every aspect of their network lifecycle. We are preparing to witness the real-world impact of 5G and are collaborating with multiple partners from different industry verticals to develop compelling, practical use cases. Service Agility, which we aim to provide with our netOps.ai Framework, is essential to rapidly deploy and scale these use cases”. With 5G, CSPs will be able to dynamically slice and differentially price
CP Gurmani MDCEO Tech Mahindra
their network. netOps.ai is geared to deliver Service Agility at scale, not only by automating all network lifecycle stages, but also by keeping networks continually updated. The framework will also demonstrate service automation for Private 5G Networks-as-a-Service by automating Network Slicing. Tech Mahindra is excited to drive collaborative disruption with its 5G partners and will jointly showcase the netOps.ai framework with Affirmed Networks, Altiostar, F5, Hewlett Packard Enterprise, Intel, Juniper Networks, Qwilt, Red Hat, RIFT & Teoco. As part of the TechMNxt charter, Tech Mahindra is focused on developing platforms based on next-gen technologies like 5G, artificial intelligence, machine learning, robotics, automation and the internet of things.
February 2019 | 27
TechKnow | Equinix
70% Businesses Moving to Cloud Despite Fear of Security Risks
Jeroen Schlosser Managing Director Equinix MENA
A
n independent study conducted by Equinix of over 1,200 senior IT professionals across EMEA shows that 71% organisations are likely to move more of their business
cybersecurity risks and breaches (53%). In UAE, 59% of respondents (lower than 71% across EMEA) believe their organisation will move more to the cloud. 76%
functions to the cloud in the coming years. The study also finds
also believe that cloud service providers are an important factor
that only 17% of organisations across EMEA are currently using
when choosing a data center in the UAE. And, 26.2% of IT
multi-cloud architecture. This compares to 56% that currently use
professionals surveyed think that CSPs will be the business that
private cloud and 42% that use public cloud.
their organisation will most likely connect with in the future.
60% of EMEA IT leaders cite proximity to cloud service
Jeroen Schlosser, Managing Director, Equinix MENA said:
providers (CSPs) as an integral factor when choosing a data
“The trend of digital transformation is revolutionizing the MENA
center in their local market. Despite more business moving to
market, urging businesses to take innovative approaches such as
the cloud, 70% of these same respondents still perceive there to
cloud adoption. One of the ways businesses can use the cloud
be cybersecurity risks around cloud adoption. Large public data
more securely is through direct, dedicated interconnections
breaches have caused uncertainty among companies, leading to
between network and cloud service providers and users and
45% of respondents focusing on improving their organisation’s
data, bypassing the hacking and performance risks of the public
cybersecurity as their biggest IT priority.
internet. At Equinix, we see multi-cloud convergence hitting
For nearly half (48%) of those surveyed, the adoption of
a tipping point and the cloud as a major catalyst for changing
cloud-based services represented one of the top two factors
how enterprises will do business in the emerging global digital
that will impact their business in the future — second only to
economy.”
28 | February 2019
EyeTech
R&M - PRIME ODF Systems
Alaris S2040 Scanner
Overview: A high-density cabling platform for Optical Distribution Frames (ODF). At maximum capacity, 5,376 optical fibres can be connected in an ODF with R&M's PRIME modules, setting new density standards for the Fibre-to-theHome (FTTH) market. Above-ground street cabinets and basements, main distributor frames, central offices and POP sites are some of the most important locations for the PRIME ODF racks. Here they can form the nodes of local broadband networks such as city rings and feeder networks. The platform is also suitable for fibre optic distribution in data centres, and the backhaul networks of mobile communication providers. Key Features: • • • • •
Modular PRIME distributors can be assembled, adapted and extended as separate blocks. Up to 14 PRIME modules can fit in a 19’’ or ETSI rack and no tools are required for assembly in R&M ETSI racks. The PRIME modules can be assembled from the front or back in 19” racks. The PRIME range contains fibre units for fibre optic termination, splice and breakout cabling as well as patch cord and overlength storage. Drawer technology ensure the fibres remain in a guide and protects the fibres during assembly, maintenance and cleaning, while a channel system protects the fibres on the way to the splice area. The connectors can be detected and operated when the drawer is pushed in and can be pulled into a service position for cleaning and inspection
Overview: The Alaris S2040 scanner is an award winning scanner that lets users capture information anywhere, with superior image quality and data accuracy. Its the perfect solution when you need to get information into your business processes quickly. Alaris S2040 Scanner received Keypoint Intelligence – Buyers Lab (BLI) Winter 2019 Pick award for Outstanding Departmental Scanner. According to Lee Davis, Keypoint Intelligence’s Editor of Scanner/Software Evaluation, “The device wraps exceptional media handling capabilities and a robust software package into an easy user experience to help busy departments optimize their business processes where digital solutions and paper intersect.” Davis also noted that the Alaris S2040 delivers an array of intelligent, automated features that can simplify and accelerate business processes that involve scanning. “The device offers exceptional media handling capabilities that prevent data loss while keeping information flowing seamlessly,” he commented. Key Features: • Designed to help businesses capture information with superior image quality and accuracy, the Alaris S2040 Scanner’s Embedded Image Processing is fast and effective, capable of processing 40 pages-per- minute/80 images-per-minute without depending on a PC. • This model features an 80-sheet automatic document feeder (ADF) and supports the Alaris Passport Accessory and the Integrated A4/Legal Size Flatbed Accessory, offering users more flexibility to scan a variety of document types. • The S2040 Scanner is bundled with Alaris Smart Touch functionality which streamlines the scanning processes and provides users with one-touch simplicity. • Perfect Page technology provides state-of-the-art capabilities for image enhancement, ensuring clean, crisp, images even for very challenging documents and mixed document batches.
30 | February 2019
UPTO
10TB CAPACITY
SUPPORTS UPTO
64
CAMERAS
247
OPERATION
READY FOR
NVR, DVR HYBRID DVR & RAID STORAGE
180 TB/YEAR WORKLOAD
UPTO
256MB BUFFER SIZE
ROTATION VIBRATION
RV SENSOR