UAE luxury yacht manufacturer, Gulf Craft, has delivered its seventh Majesty 100 superyacht.

Jonacor Marine, Drettmann International’s Russian and Ukrainian Dealer for Gulf Craft, sold the superyacht to a Russian owner with a love of yachting. The owner has named her M/Y Piterland II.

The new superyacht is currently being shipped to Gibraltar, where the owner will offload it and travel onboard through Europe before berthing in East Europe.

Since its launch at the 2017 Dubai International Boat Show, six models of the Majesty 100 have been sold worldwide. The latest order is hull number seven of Gulf Craft’s first sky-lounge superyacht. The homegrown company has delivered several of the models to Europe and Australia.

Gaining worldwide attention since it was launched, the Majesty 100, which is 31.7m in size, is characterized by her powerful but efficient propulsion system. The owners, who are experienced boaters, have chosen the model for its reliability, comfort and unparalleled space and sea keeping capabilities.

The yacht’s standard features include folding balconies on both sides, floor-to-ceiling glazing in the main deck saloon and a sky-lounge on the upper deck, which will allow the owners to use the yacht in almost any climate and enjoy unparalleled open views of the sea. The interior includes five staterooms, with the owner’s situated in the main deck and four rooms in the lower deck.

The model has been completed using timeless exterior styling and exquisite workmanship. The lavish superyacht has been personalised according to the owner’s preference. The interior of the main veneer features quilted semi-gloss stain while the accent and furniture veneer is ebony semi-gloss. Crema Marfil, Dark Emperador and Cappuccino Oryx marble has been used across the interior.

Power will come from 1,900hp twin MAN engines propelling her to a top speed of 20 knots. When trimmed back to an economical speed of 12 knots, the superyacht will cover a cruising range of 1,500 nautical miles.

Gulf Craft currently has three Majesty 100s under construction, with delivery dates that extend up to 2021.

Business Email Compromise Attack – The Art of Impersonation

By: Mrugesh Chandarana, Senior Product Manager, Identity and Access Management Solutions at HID Global

Business Email Compromise (BEC) is a type of phishing attack in which an attacker impersonates a high-level executive and attempts to trick an employee or customer into transferring money or sensitive data. According to the Federal Bureau of Investigation (FBI), as of


this scheme has already caused $12.5 Billion in losses to companies. The FBI warned that there was a 60% increase in 2018 in fake email schemes that aim at stealing money or tax data. These figures support the fact that BEC attacks are technically simple but extremely effective in nature.

How to Prevent BEC Attacks

The simplicity of spoofing an email address, the advanced technology cybercriminals can easily access, along with the social engineering techniques to stage attacks—can leave an organization wondering if they are helpless to prevent this threat. However, digital certificates can easily and cost-effectively be used to protect email communications from compromises. Depending upon the type of certificate used to secure your email, organizations can realize a variety of benefits including:

  • Ensuring the integrity of communications at rest and in transit
  • Confirming to a recipient that the email is from a known sender or email address
  • Locking the contents of a message to prevent tampering during transit

Selecting the Right Digital Certificate to Secure Your Email

Selecting a digital certificate to secure email communication depends on the usage and level of security necessary. There are three main considerations when choosing a digital certificate to secure your email.

  1. Digital Signing – Emails can be digitally signed so that the recipient can confirm the identity of the sender. Email signing requires a certificate that contains a signing attribute. There are two types of certificates:
    • IDENTITY BASEDCERTIFICATES: Identity-based certificates validate the person who is named in the certificate. The identity of the individual sending the email will be confirmed to the individual receiving the email.
    • S/MIME CERTIFICATES: S/MIME certificates validate the email address that is named in the certificate. The recipient of the email will know that the email came from a validated email account.
  2. Non-Repudiation – Email signing, when non-repudiation is needed, requires an identity-based certificate that contains a non-repudiation attribute. Non-repudiation means that when something is signed using an identity-based credential, that signature is legally-binding and cannot be repudiated or refuted.
  3. Encryption – Email encryption requires a certificate that contains an encryption attribute. If you have the public key for a recipient, you can also encrypt the contents of the email sent to that individual. Likewise, if you would like others to send you encrypted emails, you will need to share your public key with them before they can send you an encrypted email.

How to Digitally Sign and Encrypt Email

There are two primary components of a digital certificate:

  • A public key, used by others, to send encrypted email communications to you
  • A private key, used by you, to sign emails and unlock encrypted email communications sent to you

A public key is published and/or exchanged to facilitate email encryption and can be:

  • Exchanged via a signed email communication
  • Attached to your contact card in your associate’s address book
  • Published to a Global Address List (GAL)

Digital signatures are compatible with most enterprise email clients, and most clients can be configured to sign all outgoing mail automatically. It’s relatively easy to standardize company-wide.

When recipients open a digitally signed email, a red ribbon indicates that it’s been signed with the name of the signer. Since the signature was applied using the sender’s certificate and only issued after an identity verification process, the recipient can be confident that the email came from the sender and is not part of a phishing attack.



HID Global Announces Agreement to Acquire De La Rue’s Citizen Identity Business

HID Global®, a worldwide leader in trusted identity solutions, today announced that it has signed an agreement to acquire the international identity solutions business of De La Rue (LSE:DLAR). The acquisition will broaden HID Global’s leadership position in the government-to-citizen identification market and extend its capabilities.

Through its identity solutions business, De La Rue delivers identity documents and software solutions for governments around the world. It issues secure identity documents for more than 25 countries, with significant market presence in Africa, Asia, Europe, Latin America and the Middle East.

“With complementary products, solutions and services that are highly synergistic with HID Global’s current offerings, De La Rue’s identity solutions business is an excellent strategic fit with our mission to power the trusted identities of the world’s people, places and things,” said Stefan Widing, President and CEO of HID Global. “Customers of both organizations will benefit from the expanded range of e-government solutions that will be offered as a result of the acquisition.”

De La Rue’s identity solutions business excels as a prime solution provider to government departments, working directly with ministries of the interior, immigration departments, police departments, and numerous other government entities and agencies.

The acquisition is subject to regulatory approval and customary closing conditions. The transaction is expected to close by Q3 2019. Financial terms of the agreement are not being publicly disclosed. Following the close, De La Rue’s identity solutions business will become a part of HID’s Citizen Identity Solutions business area, which is led by Jessica Westerouen van Meeteren, Vice President and Managing Director.

To Capitalize on Massive Opportunities on the Edge, Companies Must Take Immediate Action: Aruba Research

The next five years will mark a dramatic enterprise shift toward the edge of networks, where emerging technologies can be harnessed to radically improve user experiences, transform business models, and generate vast revenue opportunities. That’s according to a new book launched today byAruba, a Hewlett Packard Enterprise company.

Opportunity at the Edge: Change, Challenge, and Transformationon the Path to 2025, developed byFast Futurein collaboration with Aruba, reports that edge technologies – those which process and analyze user data where people connect to a network – will revolutionize customer and employee experiences, create more dynamic, responsive, and personalized business models, and even catalyze the growth of entirely new industries. The book also argues that enterprises must embrace fundamental change to realize these opportunities, engaging in widespread strategic, structural, and leadership transformation.

Morten Illum, VP EMEA at Aruba, comments: “The findings in this book highlight the vast commercial potential for enterprises utilizing edge technologies, if companies are willing and able to enact the considerable organizational changes needed. The edge represents a dramatic overhaul in how companies understand, service, and meet the needs of their customers and employees. It will be a world defined by dynamic, immediate, and personalized services.”

Key themes and findings

Commissioned to explore the scale of possibilities presented by edge technologies in the next 3-5 years, the book features insights from 19 leading global CIOs, technology leaders, and industry experts and a perspectives survey of 200 future thinkers from across the globe. It explores the edge technologies that are driving change, the use cases and businesses opportunities these are creating, and the ways in which organizations can adapt to take advantage. Key trends that emerged include:

  • The edge of the network holds the key to industry transformation:The edge is designed to enable and capitalize on modern digital experiences at the convergence of people, apps, and things – allowing customer and ecosystem partners to take these actionable insights to then create “experiences” for employees and customers. This is making it possible for businesses and organizations in various industries to leverage data and insights to deliver new and immersive experiences to consumers and end customers. It is driving sectors from education and retail to healthcare and hospitality to rethink how they act today. New types of experiences such as location-aware mobile engagement, digitally assisted patient care, and user-aware meeting rooms can give organizations a competitive advantage.
  • One-third of businesses will create edge-enabled mainstream personalization by 2025: The study shows that a clear majority (67%) of respondents believe at least 30% of businesses will be using the edge to create “mainstream personalization” in the next five years. From the classroom to the office, retail stores, and major event venues, edge technologies will enable personalized service delivery that meets growing user expectations of an immediate, customized experience.
  • New benefits from the edge will be realized: Other benefits arising include localized products, services, and pricing (52% of respondents), enhanced real-time market insight (50%), improved customer and user satisfaction (48%), and faster product and service innovation (47%).

 Opportunities on the Edge

The edge will create transformative business opportunities for industries in all facets of the economy, using data to understand customers and tailor services to their needs, such as:

  • A retailer that can provide custom-made clothing, fitted to your 3D hologram, as the industry evolves to provide an anywhere and everywhere experience;
  • A classroom environment that automatically adapts to each student’s comprehension and comfort level, as schools and colleges harness edge technologies to enhance student performance, confidence, and mental wellbeing;
  • A hospital that uses IoT monitoring sensors to provide continuous patient reporting at the point of care and real-time diagnosis, enhancing the ability of healthcare professionals to deliver efficient and effective care;
  • A workplace with always-on tools, enabling collaboration from any device around the world, as offices evolve to facilitate the same level of access and functionality for employees anywhere in the world.

These shifts will be underpinned by emerging business and revenue models, such as payment by facial recognition or biometrics (highlighted by 70% of survey respondents), commercial application of customer data accumulated via the IoT (67%), hyper-personalized instant offers (63%), demand-driven and location-specific pricing (55%), and subscription models for everyday purchases such as food and clothing (52%).

How enterprises must adapt to take advantage

While the opportunities of the edge are considerable, relatively few companies have moved quickly to embrace them. Simply implementing the technologies will not be enough; companies must rethink their entire business strategy to take advantage of edge opportunities. The book outlines several key changes for enterprises to consider, including:

  • Embrace a more progressive, experimental approach: A majority of survey respondents said that a change in business mindset was needed to embrace the concept of edge strategies (64%). This could include accepting autonomous decision-making by edge devices (60%), greater top-level support and leadership for the pursuit of driving smarter experiences (53%), and a willingness to experiment with solution design and business models for edge applications (53%).
  • Focus on investment, training, and customer need:There were also calls to more clearly define the customer benefits of edge applications (50%), allocate appropriate investment funds (42%), and provide training in how to spot and specify potential edge applications (45%).
  • Address emerging security concerns:Enterprises must address the security challenges of a network hosting many more connected devices. These include the creation of potentially thousands of points of risk exposure across the network (82%), uncertainty over whether a device has been compromised (67%), hacking of voice or biometric security (62%), and concerns that IoT devices and sensors are not being built with security in mind (62%).

Rohit Talwar, CEO at Fast Future, comments: “To access the opportunities of the edge, companies need a mindset shift to drive both structural and strategic change. Leaders must take responsibility for navigating the journey to the edge, working hand in hand with IT to pursue open technology options, and maintaining a consistent dialogue with employees, customers, and other key stakeholders. Focused experiments, with clearly defined goals, proactive project owners, and dedicated resources, are likely to be the best way forward.”

Morten Illum, VP EMEA at Aruba, concludes: “Enterprises should be excited about the edge opportunity, but they should not underestimate the degree of change needed to unlock it – including the implementation of a network infrastructure that is strong and flexible enough to withstand the greater demands edge technologies impose, and the security threats they create. Given the pace and uncertainty of the change ahead, it is also essential to base any edge strategy on an open technology ecosystem that leaves flexibility to adapt and evolve over time.”

To read the full book, visit

Research methodology

The research was commissioned by Aruba, a Hewlett Packard Enterprise company, and conducted in 2019 by Fast Future. The study used a blended approach drawing on Fast Future’s foresight expertise, targeted secondary research, and in-depth qualitative interviews with 19 global CIOs, technology leaders, industry experts, and futurist thought leaders. The project also undertook a broad survey to test emerging ideas and incorporate additional perspectives from 200 business and technology future thinkers across Fast Future’s global networks.



M/Y Metis, a custom 63-meter yacht with steel hull and aluminium superstructure, was delivered to her German owner and long-lasting customer of Yacht Moments, introduced to the shipyard by Kurt Lehmann. Carbon, polished steel and bleached oak embellished with leather inserts are the main materials chosen for this yacht.

The interiors, designed by UK studio Bannenberg & Rowell, who worked in partnership with the Birgit Otte Interior Atelier, are designed in a modern style. The exteriors are the work of Giorgio M. Cassetta.

The custom gym on the Fly Deck, the touch and gohelipad and the over 160 sq. m owner’s apartment with two double beds and an outdoor terrace all contribute to make Metis a unique Benetti model.

Metishas been delivered to its owner in Livorno. She is a 63-meter long custom yacht with a very elaborated interior design. In his role as consultant to the owner, Kurt Lehmann of Yacht Moments has been in charge of the project management and praised Benetti for the great work that had characterized the entire Metis design and construction period: Benetti confirmed once again its name as icon of timeless Italian style and excellence in megayacht construction. The highly skilled Benetti’s technicians and engineers and the artisans who worked for the shipyard have created an amazing yacht. The dedication of everyone in communicating and exchanging views with the captain and owner was remarkable.” Yacht Moments have also been responsibly involved in the conception and development of this stylish custom superyacht project – always taking care of the completion of the owner’s ideas, demands and inspirations. Notably the additional upper gym-deck has been developed by Yacht Moments and perfectly realized by Benetti and Giorgio M. Cassetta.

The exteriors are the result of the collaboration between Benetti and Giorgio M. Cassetta who, through a painstaking design, sought to maximise the dynamic proportions of a yacht that has an impressing long bow with vertical straight edge. Metis is a modern and timeless yacht, which displays large volumes behind flowing lines and innovative features, such as the private deck. The design is simple, yet characteristic of Benetti, said the Italian designer.

The interiors are the result of the collaboration between German studio Birgit Otte Interior, based in Wolfersdorf, and Bannenberg & Rowell, an English studio directed by Dickie Bannenberg and Simon Rowell. The London-based duo, famous for devising creative solutions based on bold shapes and geometric motifs, with an eye-catching design and a fine finish, were given a great deal of leeway in the design. Dickie Bannenberg, who is thrilled with this project, commented: “Metis‘ unique layout has freed us from what I call ‘the tyranny of alignment’, allowing us to unlock new corners and views of asymmetric designs.This approach in particular is reflected in the beach club, where the rooms are rotated by about 30° compared to traditional layouts and offer a new view over the sea through the transom and the side doors.

The novelty of this particular rotation also characterizes the main salon and the upper deck salon, challenging conventional expectations and perceptions.

The originality of Metisis also evident in the full-beam owner’s suite, which features a lounge and offers a breathtaking 180-degree view thanks to the full-height glazed surfaces on the private bow deck. The design of this room is based on a contemporary range of wood finishes using smoked oak, carbon and polished steel combined with calacatta and coffee brown marbles. The bold, geometric shapes can be found in the stainless steel bed frames, furniture and finishes. A private lounge is also available in the babysitting cabin, which has a terrace overlooking the sea.

HID Global Introduces HID goID™ Citizen Age Verification Solution

HID Global®, a worldwide leader in trusted identity solutions, today announced it has extended the capabilities of its HID goID™ mobile identity solution that enables government agencies to move from physical documents to mobile IDs on citizens’ smartphones. The latest addition to HID’s mobile identity offering, the HID goID Simple Verifier, is a small device that can be used by anyone seeking to quickly verify the age of citizens carrying an HID goID mobile ID on their smartphones—all with just one click.

HID’s new goID Simple Verifier is a small device that can be used by anyone seeking to quickly verify the age of citizens carrying an HID goID mobile ID on their smartphones—all with just one click.

“The Simple Verifier is ideal for institutions and private sector establishments such as bars, clubs and any entity that must verify customers’ ages before permitting entry or the purchase and consumption of alcohol,” said Steve Warne, Senior Director, Product Marketing, Citizen ID business with HID Global. “In addition to enabling the private sector to combat fake ID attempts, the latest addition to HID goID is a powerful digital verification tool that supports governments’ broader age-restricted products and services initiatives geared towards protecting the health, safety and well-being of minors.”

After connecting via Bluetooth to the HID goID Simple Verifier, the device confirms age by securely sending a random code to the citizen’s mobile ID on their smartphone. The citizen’s age is confirmed with no scanning, tapping or any other action required. Because the solution only verifies the age of the mobile ID holder, the process is quick and efficient. It also protects citizen privacy since no additional information beyond the legal age of the citizen is shared.

Easily carried in a pocket or on a keyring, the new device joins a family of HID goID verification options that include solutions for PCs and servers, and purpose-built mobile verifiers for large-scale applications.

Manufacturing Industry Gears Up to Outpace Average Adoption of Hybrid Cloud by 2020

Manufacturers will more than double multicloud use in the next two years

Nutanix, Inc.(NASDAQ: NTNX), a leader in enterprise cloud computing, today announced the findings of its Enterprise Cloud Index results for the manufacturing sector, measuring manufacturing companies’ plans for adopting private, public and hybrid clouds. The report revealed that the manufacturing industry’s hybrid cloud usage and plans outpace the global average across industries. The deployment of hybrid clouds in manufacturing and production companies has currently reached 19% penetration, slightly ahead of the global average. Moreover, manufacturers plan to more than double their hybrid cloud deployments to 45% penetration in two years; outpacing the global average by 4 percent.

The manufacturing industry is at an “innovation impasse,”[1]  meaning manufacturers have a desire to innovate and drive transformation, but legacy IT systems have the potential to constrain their ability to do so. The opportunity for manufacturers to embrace digitization efforts including “Industry 4.0” initiatives can break the impasse, but executives must focus on new opportunities to create value and not only prioritize traditional business operations. Manufacturing organizations face the constant challenge of trade-offs: they are under pressure to meet current productivity and operational goals in an increasingly global and highly competitive marketplace, but they also need to invest in future growth.

This challenge has created a demand for new technology solutions that can help balance the trade-off between current and future goals. IT leaders in manufacturing must avoid the beaten path of finding short-term fixes for increasing revenue; instead, they should look to long-term solutions that enable automation, enhanced use of data and improvements in customer experience. The Enterprise Cloud Index findings indicate that manufacturing leaders are aggressively adopting new technology to embrace modernization instead of getting left behind with legacy systems. The distributed cloud model offers a solution that delivers speed, flexibility, and localization, allowing manufacturers to improve efficiency without compromising quality.

While 91% of survey respondents reported hybrid cloud as the ideal IT model, today’s global average hybrid cloud penetration level is at 18.5% — the disparity due in part to challenges of transitioning to the hybrid cloud model. Manufacturing industries reported barriers to adopting hybrid cloud that mirrored global roadblocks, including limitations in application mobility, data security/compliance, performance, management and a shortage of IT talent. Compared to other industries, manufacturers reported greater IT talent deficits in AI/ML, hybrid cloud, blockchain, and edge computing/IoT.

Other key findings of the report include:

  • 43% of manufacturers surveyed are currently using a traditional data center as their primary IT infrastructure, slightly outpacing the global average of 41%
  • However, manufacturers currently use a single public cloud service more often than any other industry.20% of manufacturing companies reported using a single cloud service, compared to the global average of 12% — a testament to the fact that manufacturers are starting to turn to the cloud as a solution, given that they deal with legacy IT systems and cannot handle workloads on-prem.
  • Manufacturers are also advancing the movement to private cloud: 56% of manufacturers surveyed said that theyrun enterprise applications in a private cloud, outpacing the global average by 7%.
  • Manufacturers are struggling to control cloud spend.One motivation for deploying hybrid clouds is enterprises’ need to gain control over their IT spend. Organizations that use public cloud spend 26% of their annual IT budget on public cloud, with this percentage predicted to increase to 35% in two years’ time. Most notable, however, is that more than a third (36%) of organizations using public clouds said their spending has exceeded their budgets.
  • Manufacturers chose security and compliance slightly more often than companies in other industries as the top factor in deciding where to run workloads: while 31% of respondents across all industries and geographies named security and compliance as the number one decision criterion, 34% of manufacturing organizations chose security and compliance as the top factor.

The bullish outlook for hybrid cloud adoption globally and across industries is reflective of an IT landscape growing increasingly automated and flexible enough that enterprises have the choice to buy, build, or rent their IT infrastructure resources based on fast transforming application requirements.

“Manufacturers are investing in modernizing their IT stack, and adopting industry 4.0 solutions to keep up with ever-changing business demands in areas like production and supply chain management,” said Chris Kozup, SVP of Global Marketing at Nutanix. “A hybrid cloud infrastructure gives manufacturers a fresh approach to modernizing legacy applications and services, enabling manufacturing IT leaders to focus on their long-term investments in big data, IoT, and next-generation enterprise applications. While the manufacturing industry is still facing obstacles in transitioning to multi-cloud use, this study shows us that manufacturing organizations are ready to accelerate growth and take the lead in IT innovation in the future.”

To create this report, Nutanix commissioned Vanson Bourne to survey more than 2,300 IT decision makers, including 337 worldwide manufacturing and production organizations, about where they are running their business applications today, where they plan to run them in the future, what their cloud challenges are and how their cloud initiatives stack up against other IT projects and priorities. The survey included respondents from multiple industries, business sizes and geographies in the Americas; Europe, the Middle East, Africa (EMEA); and Asia-Pacific and Japan (APJ) regions.


GDPR – Reflecting on the Past and Looking to the Future

By: Danny Allan, Vice President, Product Strategy, Veeam


It’s been a little over a year since the European Commission(EC) made its hotly anticipated General Data Protection Regulation (GDPR) enforceable on May 25, 2018. 


There has been a tremendous amount of fear, uncertainty and doubt surrounding GDPR since its introduction. But it is time for the conversation to evolve beyond the noise and into the next level of discussion.


Over the course of the past year, the regulation, which replaced its predecessor the Data Protection Directive from 1995, has displayed two key characteristics: it’s both specific and has teeth. 


The impact of these characteristics is that data privacy is now recognized globally, similar to the way basic human rights are considered. Not only should any business that processes data want to respect GDPR, but they are now required by the EU to do so. This can be viewed as forward momentum, and a success for the technology industry. Technology is unable to reach its full potential until consumers have the trust required in the security and privacy associated with their data.


Data privacy gets specific

One of GDPR’s most virtuous traits is that it is specific. It’s clear about who it serves, who it applies to, what it enforces and what the penalties for failure to do so are. As a result of this, people are increasingly viewing data privacy as a basic human right, akin to freedom of speech. 


The reason for this step-change is that GDPR has given us both individual and organizational awareness. The same as the tragic events of 9/11 gave us locked cockpit doors, GDPR has led to specific, fundamental changes in the way data privacy is managed, regulated and reported.


According to official EC figures, there have been over 95,000 GDPR complaints made by citizens, which demonstrates that individuals now have higher awareness levels of whether their data rights are being disrespected. An additional figure revealsa heightened sense of understanding from businesses, with 41,000 self-reported breach notifications.


Other tangible impacts that can be traced back to GDPR are a decline in the use of thirdparty website tracking cookies, andan increasing mistrust within the marketing supply chain. TheReuters Institute for the Study of Journalism reported a 22% drop in the use of cookies three months after the introduction of GDPR, while publishers, ad-tech firms and agencies are rewriting contracts to avoid being implicated by data breaches.


So, just like locked cockpit doors increase the safety of air travel without negatively affecting the overall experience of flying, the impacts of GDPR have been invisible, but significant. Cisco research has found that 75% of customers are realising broader benefits from their privacy investments, citing better agility and innovation resulting from better data management.


GDPR bares its teeth

One of the most notable reasons that GDPR caused the stir that it did outside of the data privacy and corporate legal fields, is the hefty penalty for failure to comply. The EC has the authority to fine organizations €20 million, or 4% of theirglobal revenue  whichever is higher  if they are proven to have breached a single line of the regulation.


What’s more, data privacy regulators have enforced these measures with EC figures accounting for 91 reported fines within eight months of GDPR being enforced. 


The most infamous of these financial penalties was issued by the French National Data Protection Commission, fining Google a massive €50 million in January 2019. German authorities have also handed out over 40 smaller fines for GDPR violations.


As well as financial sanctions, which can be crippling for smaller organizations with shallower pockets than the world’s largest data processors, there is a subtler deterrent at work: reputational damage. As data privacy becomes increasingly seen as a basic civil liberty, organizations of all sizes really cannot afford the stigma associated with abusing that right.


What’s next for GDPR?

There won’t be a radical shift from a regulatory perspective in the next year. Simply put, GDPR is working. The result is that we can expect more of the same from data privacy regulators: more fines, harsher penalties and further efforts to expose incompliance. 


One interesting area to watch is whether the types of conversations GDPR is forcing CIOs to have will lead to repercussions at a global level; particularly when it comes to data privacy practices in countries such as China and the USA. 


We will continue to see the EC flex its data privacy muscles, but we’ll also see a shift in the way organizations use personal data. Data is the lifeblood of businesses in the digital era, despite examples of some firms taking a radical stance on GDPR and deleting entire user databases.


Data collected today can be mined for insight tomorrow, and used to create better user experiences, develop products which address genuine market needs and reward customers for loyalty. As user awareness increases, tolerance towards organizations who are seen to be collecting, but not respecting data, will get lower. 


Therefore, organizations that fail to get to grips with data privacy, making privacy part of its corporate culture, will face a backlash from customers, as well as draconian punishments from regulators. At Veeam, we believe that data privacy and protection should not be viewed as a box-ticking exercise, or something you just do because you must.


Becoming GDPR-compliant is an ongoing journey, and success should not be viewed as not being fined, or worse yet, getting away with something. Organizations must take pride in understanding, managing and protecting their data. Compliance is just one step on the way to becoming a data-driven business, which is constantly looking for new ways to leverage information to create better products, services and experiences for customers.

Ultimate Power with Anker’s PowerCore+ 26800 PD

Premium Colossal-Capacity PD Portable Charger Supports Power Delivery for High-Speed Charging

To stay charged all day and beyond, Anker’sPowerCore+ 26800 PD provides faster and safer charging with unmatched advanced technology, conforming to the latest standards of USB charging with USB-C Power Delivery (PD).

Anker’s charging technology ensures the fastest possible charge for non-Quick Charge devices, including Apple phones, tablets, drones, laptops and other USB-C devices.The premium colossal-capacity portable charger has a Type-C port with high-speed input and 30W output (capable of charging large devices like MacBooks). The USB-C standard’s compact, reversible connector is universally compatible and supports Power Delivery charging for high-voltage devices.Anker’s MultiProtect technology combines surge protection, short circuit prevention and other advanced safety features to keep you and your devices safe.

CXO Research: Organizations Can Lose $20 Million Each Year Due to Poor Data Management

The 2019 Veeam Cloud Data Management Report indicates that 73% of organizations are failing to meet users’ demands for uninterrupted access to applications and data; many companies are now looking to embrace Cloud Data Management to better meet protection needs and leverage the power of their data

Over the past decade, the amount of data generated has exploded; data growth and sprawl is so rampant that by 2025 we will generate more than 175 Zettabytes of data each year, up almost two thirds from 2018[1]. Organizations need to manage and protect this data no matter where it resides, but according to the latest industry survey results released today from Veeam® Software, the leader in Backup solutions that enable Cloud Data Management™, 73% of organizations globally admit to not being able to meet users’ demands for uninterrupted access to data and services, costing the typical company $20 million a year. This highlights the devastating impact downtime can have on lost revenue, productivity, and customer confidence. However, this year’s study shows that organizations are acting to combat this, with nearly three-quarters (72%) looking to embrace Cloud Data Management, often by exploiting hybrid cloud capabilities, to ensure success and drive more value from their data.

The 2019 Veeam Cloud Data Management Reportsurveyed more than 1,500 senior business and IT leaders from 13 countries and found that respondents are aware of the importance of data management to their business’ success, pointing to greater productivity today, and the potential to drive business transformation in the future.

Middle East Survey Findings

  • Addressing Data Management Challenges
    • 93% of organizations will have Cloud Data Management initiatives in place by the end of 2019 to drive success
    • The average enterprise is investing $41 million in transformational technologies
  • Companies are on a journey to become a more intelligent business have four defining attributes
    • Cloud Data Management – 76% have SaaS deployments, citing security and fl­exibility as key
    • Capabilities – 89% see increasing employee skills as critical to the success of Intelligent Data Management initiatives
    • Culture – 66% believe company culture must be more open to digital
    • Confidence – 97% have confidence in Intelligent Data Management initiatives
  • The big benefi­ts of digital transformation to Middle Eastern businesses
    • 44% view the deployment of digital technology as critical to success in next 2 years
    • $124 million can be added in additional revenue annually through the use of digital initiatives
    • 80% see productivity bene­fits of Intelligent Data Management
  • Maturity of Digital Initiatives
    • Only 24% of enterprises in the Middle East describe their digital initiatives as mature.

“We are living in a data-driven age, and organizations need to wake up and take action to protect their data. Businesses must manage their data in a way that always delivers availability and leverage its value to drive performance. This is no longer a luxury, but a business necessity. There is a significant opportunity and competitive advantage for those who effectively manage their data. Ask yourself, are you confident that your business data will always be available? If you are unsure, it’s time to act, and our study shows that many are not acting fast enough,” said Ratmir Timashev, co-founder and Executive Vice President (EVP) of Sales & Marketing at Veeam.

Organizations are looking to embrace the power of technologies such as the cloud, or hybrid cloud, Big Data, Artificial Intelligence (AI), and the Internet of Things (IoT) to drive business success and will each invest on average $41 million in 2019 on such transformational technologies.  Almost half of respondents admit that data protection is imperative to leverage these investments. Alarmingly, only 37% of businesses are very confident in their current backup solutions, with the majority (73%) admitting that they cannot meet user demands. This inhibits the adoption of tools and processes that can drive business advantage, but leaders recognize work needs to be done; more than half of those surveyed are looking to deploy Intelligent Data Management and multi-cloud solutions across the business to address this failing.

There are big benefits to be had from the deployment of digital initiatives as organizations on average attribute $124 million additional revenue [per company] to these annually. However, these findings shine a light on the global disparity in digital adoption. Some of the world’s largest economies are at risk of having to play catch-up when it comes to their investment in digital innovation. Forty-one percent of Japanese businesses and 48% of Brazilian businesses described their data management as mature, compared to just over a quarter in France and Germany, and just 11% in the UK. Crucially, change does not appear to be on the horizon, with Japanese and Brazilian organizations intending to invest on average $105 million and $73 million respectively in Intelligent Data Management in the next 12 months, markedly larger than the average organizational investment expected in the UK ($14 million), China ($17 million) and US ($38 million).

Timashev added: “We’re seeing a global digital arms race develop today, with some of the world’s most advanced economies at risk of being left behind when it comes to their digital adoption. It’s essential that organizations get the right digital foundation in place to intelligently manage their data and safeguard their future. To achieve this, businesses must be united internally, with IT and the business working collaboratively and addressing cultural and skills challenges.”

Journey to a more intelligent business

The 2019 Veeam Cloud Data Management Report found that organizations are on a journey to become a more intelligent business, meaning they are leveraging technologies such as Cloud Data Management and AI to create a real-time view of the collective business and the ability to act intelligently on that insight. Amongst the businesses on this journey, the study highlights four common components globally:

  1. Cloud: Cloud Data Management is a key component of delivering Intelligent Data Management. Three-quarters of companies report using Software-as-a-Service (SaaS) platforms. Many are utilizing the cloud for their backup and recovery services, with 51% using Backup-as-a-Service (BaaS) and 44% using disaster recovery-as-a-service (DRaaS). It is evident that leaders are recognizing the advantages of a multi-cloud and hybrid-based approach, citing cost, reliability, flexibility and data security of the cloud as their main reasons for choosing it.
  2. Capabilities: Organizations must enhance their capabilities, to ensure employees can draw on data insights and use new technologies as they are deployed, with 9 out of 10 businesses viewing upskilling employees’ digital skills as vital to their digital success.
  3. Culture: Creating a culture that is adaptable and receptive to new technologies so that people can evolve with the organization is essential, with more than two-thirds of respondents believing that company culture needs to become more open and accepting to digital technologies.
  4. Confidence: Organizations must create a sense of confidence in the business’ digital capabilities, built on a strong data foundation. Presently, only a quarter of respondents report total confidence in their capability to meet their digital challenges.

 What is clear from the 2019 Veeam Cloud Data Management Report is that the time for action is now. This starts with a strong digital foundation, which ensures that data is backed up and always available. With this in place, organizations can confidently deploy new digital initiatives, leveraging the business value and competitive advantage for today and into the future, and harness the potential of Cloud Data Management.

“Cloud has stopped being something CIOs and IT managers talk about but don’t necessarily implement and has become a must-have for any digital business. At the same time, data management is taking on an increasingly crucial role. Organizations are beginning to understand their data better and being able to access the right data at the right time, and recover it when it’s lost or damaged, can determine the success of a business. Organizations are using data management to increase productivity, maintain corporate stability and improve their ability to forecast, making better informed decisions as a result,” says Claude Schuck, regional manager, Middle East at Veeam.

“Within this context, technology has never been so important to a business’ success. Organizations around the world rely on a whole host of digital platforms for everything from keeping the lights on to creating ground-breaking, new offerings for customers. This, combined with implementing a data-driven culture which maximizes the value of the data available to the business, will enable the next-generation of industry disruptors and innovators to scale effectively and securely,” Claude concludes.

[1]IDC Report (2018): The Digitization of the World From Edge to Core