SENNHEISER SETS FOCUS ON ENABLING MIDDLE EAST HOTELS TO DELIVER DIFFERENTIATED GUEST EXPERIENCES

With Expo 2020 set to attract over 20 million visitors to the UAE and the broader Middle East region, this promises to be a bumper year for the hospitality sector. As high-quality audio plays a pivotal role in elevating guest experiences across private rooms, restaurants, meeting and conference halls and common areas, Sennheiser sees tremendous potential for its solutions to deliver the all-essential differentiating edge that hotels require to capitalize on the influx of travellers. 

Highlighting that luxury hotels and 4-star properties account for 59% of Dubai’s total inventory, Mig Cardamone, Director of Sales and Marketing at Sennheiser Middle East said, “It’s clear that the Emirate is geared towards attracting and serving travellers who expect premium experiences. Being spoilt for choice, breath-taking aesthetics, personalized service and even technological innovations such as high-speed, seamless Wi-Fi connectivity have become ‘expected luxuries’ for these guests. This is where we at Sennheiser have a role to play as our solutions can greatly enhance the auditory experience, which can sometimes be lacking in this sector.”

Providing an example, Cardamone elaborated on how business-travellers can benefit from Sennheiser’s audio conferencing solutions. “Most business people can relate to the frustration of attending a conference, event or meeting that has been marred by low volume, audio drop-outs, feedback and echo. On the other hand, crystal-clear audio – as is made possible by our SpeechLine Digital Wireless solution – ensures presenters and attendees can engage seamlessly, keeping the focus on content rather than technical inconveniences.”  Sennheiser SpeechLine Digital Wireless features automatic frequency and interference management and can be conveniently controlled and managed by the company’s easy-to-use Sennheiser Control Cockpit software solution. 

In meeting rooms, the company’s TeamConnect Wireless and TeamConnect Ceiling 2 audio conferencing solutions empower guests to reliably connect with colleagues across the world with an assurance that remote participants can enjoy the highest speech intelligibility and sound quality. 

Sennheiser also believes there’s plenty of innovation that can be brought to guests’ in-room experiences as well. With its ability to deliver a fully immersive 3D audio experience – without the hassles of complicated wiring and a host of aesthetically unappealing speakers – the company’s AMBEO Soundbar is perfectly suited to installation in hotel rooms and suites. Sennheiser even has an ultra-premium offering for hotels looking to cater to the most discerning of guests. “With its striking design, perfect engineering and unparalleled audio quality, our HE 1 is well deserving of its status as the best headphones in the world. There is no doubt that offering these in premium suites will translate to unforgettable experiences for VIP guests,” said Cardamone.

Sennheiser is set to demonstrate these and other audio solutions to key stakeholders within the Middle East hospitality industry at the upcoming 2020 Stakeholders Conference, being held in Dubai from the 28th to the 30th of January 2020.

Network Security Must Keep Up with Video Surveillance Systems’ Rise in Criticality to Public Safety and Security in the Middle East

The Video Surveillance market in the Middle East region continues to grow in double digit figures, driven by the rise of security concerns accompanied by strict government regulations. To keep up with the challenges imposed by these concerns and regulations, a reliable, always-on and secure network capable of delivering quality high resolution videos is imperative to keep organizations safe.

The Middle East is one of the fastest growing markets for video surveillance systems. Research firm MarketsandMarkets reports that a big driver for the increasing use of video surveillance systems globally is in large part due to the increasing concerns for public safety and security, prompting deployment at airports, malls, schools, office buildings, public places and so on. Nevertheless, the market dynamics are rapidly changing with security cameras being more and more integrated with the IoT architecture to solve for business use cases alongside security use cases, while Artificial Intelligence continues to enable security capabilities related to behaviors and object recognition that have never been possible before. These dynamics are raising the criticality of the video surveillance systems and consequently the criticality of the network infrastructure that interconnects the ecosystem together. 

Rabih Itani, the Middle East region security business head at Aruba, a Hewlett Packard Enterprise company says, “Gone are the days, where the video surveillance networks get the least attention during the design phase, but ironically the first to blame when the video streaming disconnects or suffers jitter or hackers get through. Organizations are beginning to realize the importance of connecting their video surveillance systems to secure and future-proof networks that they can simply trust.”

Aruba, a long term leader in providing secure network infrastructures, understands how to build mission critical networks, and as such it is aggressively positioning its life time warranted[1]Aruba 2930 family of network switchesto regional organizations who do take security seriously. Aruba 2930 family solves for current connectivity requirements and prepares for future ones with its smart rate ports, 40Gbps uplink options, and 60W Power-over-Ethernet as mandated by specific devices such as the PTZ cameras. In terms of security, this family of switches furnishes built-in secure-boot hardware and built-in network security capabilities[2]and when additional network edge security and control is needed, these switches integrate bi-directionally with Aruba Clearpass Network Admission Control to authenticate the connecting cameras while authorizing the right access permissions for each. Moreover, Aruba Clearpass Device Insight can be plugged in to leverage Machine Learning in order to accurately profile the connecting devices, while continuously monitoring any profile changes. It is important to note that Aruba can enable trust to be adaptive, as trust can be revoked at any time based on how devices behave while on the network.

“Video surveillance cameras, which are essentially IoT devices, are a major target themselves for cybercriminals or are used by them as an easy door to access weakly secured networks. This pushes networks to move from being merely a connectivity provider for the cameras, to be first line defenders. This is where Aruba shines,” concludes Itani. 


[1]Life Time Warranty extends for as long as the original end user owns the product and includes coverage of any built-in fans and power supplies for the entire warranty period.

[2]Security capabilities include both switch autonomous features plus features integrated with external systems such Network Admission Control, Security Analytics, and more.

Help AG Launches Incident Response Service to Help Middle East Businesses Rapidly Identify and Mitigate Security Threats

In a move to further help Middle East enterprises enhance their resilience against advanced cyber threats, Help AG, the region’s leading cybersecurity solutions, services and consultancy provider, has launched a new Incident Response & Forensics Service. The service will empower security teams to drastically shorten the time taken for identification, response and remediation in case of incidents involving cyber-attacks, data leakage and service disruption. Additionally, the Help AG team will work to identify and provide measures to address the root cause of the incident, thereby helping prevent reoccurrence of the threat.

In 2019, the UAE and Saudi Arabia together reported the world’s second-highest cost impact from data breaches, with losses averaging a staggering US$6 million per incident according to research by the Ponemon Institute[1]. The study also found that companies that effectively contain a cyber-attack within 30 days save on average over $1 million on the total cost of a data breach.

“Cyber-attacks are an inevitability and time is the most critical element in the subsequent incident response chain. However, Middle East businesses are facing an acute shortage of cybersecurity resources which greatly encumbers their ability to detect, contain and mitigate threats,” said Stephan Berner, CEO at Help AG. “Our new service offers enterprises a truly unique cybersecurity edge. With their ability to ‘think like hackers’ our team of qualified experts can rapidly identify and isolate threats, thereby enabling our clients to effectively contain the impact of an incident and maintain business continuity.”

An addition to the company’s Managed Security Services (MSS) portfolio, the new Incident Response & Forensics Service will be delivered by experts with over 10 years of experience in cybersecurity. The market-leading expertise of Help AG’s MSS division has been validated by Frost & Sullivan which presented the company with its prestigious ‘UAE Managed Security Services Provider Company of the Year’ award. When the need arises, Help AG will assign and dispatch an incident response expert, in the shortest possible time, to work with the customer to conduct analysis and evaluation of the security incident or suspected compromise, up to the identification of root cause. 

The new service was unveiled at Help AG’s flagship Security Spotlight Forum event in the UAE and several large enterprises from the regional banking, telecoms and government sectors have expressed interest in the new offering. “As the region’s trusted cybersecurity advisor, we have already successfully supported several incident response requests. With this now formalized into a comprehensive offering, our customers will have the ability to not only respond more rapidly to security incidents, but also strengthen their policies, procedures, and awareness in a bid to prevent the occurrence of these threats,” concluded Berner.


[1]https://www.ibm.com/security/data-breach

Fortinet Hits the Accelerator as Official Partner of Formula E’s BMW i Motorsport

Fortinet Teams Up with ABB Formula E Championship Team BMW i Andretti Motorsport, Reinforcing Commitment to Acceleration, High Performance and Energy Efficiency

News Summary 

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions,has joinedBMW i Andretti Motorsportas the official partnerfor their Formula E team as part of Fortinet’s commitment to accelerate innovation, high performance and energy efficiency. 

John Maddison, EVP of products and CMO at Fortinet

“Fortinet’s involvement in Formula E is a natural fit as it strongly aligns with our focus on engineering and high performance. To accelerate the processing of security and networking functions, we design our own unique security processors. These purpose-built Fortinet SPUs radically increase the speed, scale and performance of our solutions, setting industry Security Compute Rating records. We’re excited to be part of Formula E and to join forces with BMW i Andretti Motorsport team.”

The ABB FIA Formula E Championship is the world’s first racing series for fully-electric single-seater cars. These electric cars deliver immense acceleration and performance while pushing the development of e-mobility forward. Like Formula E, Fortinet drives digital innovation through our breadth of offerings that make up the Fortinet Security Fabric.Fortinet’s products powered by Fortinet SPUsare engineered with the same emphasis on acceleration, high performance and energy efficiency. Given these synergies, Fortinet has partnered with the BMW i Andretti Motorsport team, marking the most significant engagement with a motorsports team in the company’s history.

Accelerating CPU Performance with Fortinet SPUs 

Similar to the Formula E series, Fortinet continues to digitally innovate and set industry records for performance and speed. Fortinet SPUs outpace what is available in the market with the highest Security Compute Ratingsfor the following benchmarks:

  • Stateful Firewall throughput
  • IPsec VPN performance
  • Concurrent sessions
  • Sessions per second 

The Fortinet Family of SPUs are specially designed security processors that provide unmatched performance at a fraction of the cost of traditional CPUs, providing accelerated network security, accelerated graphics rendering and accelerated AI in the cloud. Fortinet’s FortiGate Next-Generation Firewall appliances are powered by the following security processors:

  • Content Processor 9 (CP9): The CP9 protects applications while optimizing user experience with the least performance degradation. The CP9 works as a CPU co-processor, taking on resource-intensive security functions such as SSL/TLS decryption – including TLS1.3 – IPS and antivirus.
  • System-on-a-Chip 4 (SoC4): Fortinet’s SoC4 is a purpose-built security processor that has achieved the highest Security Compute Ratings in the industry to support customers’ WAN Edge transformation. SoC4 consolidates network and content processing functions on a single chip to deliver fast application identification, steering and overlay performance. 
  • Network Processor 6 (NP6): Fortinet’s NP6 works with FortiOS functions delivering superior firewall performance for IPV4, IPV6 and multicast traffic with ultra-low latency down to three microseconds.

5th IoT Middle East 2020 conference deep-dives into the next wave of innovations

Armani Dubai to be the venue for talks on how to generate business out of IoT, AI, ML and Intelligent automation as the adoption of IoT is expected to accelerate over the coming years

An impressive line-up of speakers will be addressing how to manoeuvre the IoT landscape for higher profits at the 5th Internet of Things 2020, held at Armani Hotel Dubai on the 24th of February, 2020.

The cross-industry C-level conference aimed at decision-makers in both the private and public sector focuses on the business aspects of digital transformation. The event brings together forward-thinking experts sharing insights on business, technology and organizational transformation to leverage new business and new eco-systems.

Attendees have the rare opportunity of networking with experts, discussing the optimization of company revenue, reducing costs, changing business models, opening up new services and markets for key stakeholders and disruptive new entrants.

According to Johan Ehrstrom, CEO of 5th IoT Middle East 2020, “Collaboration is the new competition and eco-systems will replace traditional industry boundaries. New tech like AI and ML needs the data of IoT to deliver accurate analyses and output. IoT adoption is hence expected to grow by two-digit numbers and reach $18 billion in MEA related IoT investments by 2023, as both governmental and private sector companies ramp up their digital transformation capabilities.”

“The 5th Internet of Things 2020 is a game-changing platform, attracting over 400 attendees yearly, addressing the business relevance of technology across multiple verticals. IoT Middle East 2020 is for all who are less interested in the tech-aspects, but eager to future proof strategies, grow the bottom-line impacts and set the direction for the new decade.” 

Over 30+ international and regional speakers, including executives from PwC, Evoteq, du, McKinsey, Karlsruhe Institute of Technology, London Business School, Cigna, Iqvia, Haltian and PTC will take the stage and highlight novel utilization of technologies designed to shape the foundation of the future success stories. 

Participants can register on www.iot-dxb.com. Registration is now open for USD 745 for individual tickets, ask for group and management team tickets discounts.

Data Protection Day 2020: De-Risking in the Era of Transparency

By: Daniel Fried, General Manager (GM) and Senior Vice President (SVP), EMEA and Worldwide Channels, Veeam

The issue of data protection and privacy was, until recently, a conversation confined to a specific group of people within an organisation. Unless you were an IT consultant or a corporate lawyer, privacy compliance was something somebody else took care of. So, how have we reached the point where many organizations are bound by law to employ a Data Protection Officer (DPO)? Why are CEOs now so interested in their company’s data protection and privacy policies?

You could be easily fooled into thinking data privacy as a field has only existed since 2018, but nothing could be further from the truth. From an anthropological perspective, human beings have longed for privacy for over 3,000 years. The use of internal walls within buildings which started to become commonplace in 1500 AD proves this. The concept of the ‘right to privacy’ as we know it is indeed younger – eventually being formalised as an international human right in 1948. Sweden became the first country to enact a national data protection law in 1973. Even this, the first tangible effort to regulate data privacy, happened in response to public concern over the increasing use of computers to process and store personal information. 

While our understanding of the current data privacy conversation must operate within this context, there is no denying that 2018 was a watershed moment. The General Data Protection Regulation (GDPR) may be less than two years’ old, but its impact has been significant. As well as its very specific nature which makes the regulation enforceable, GDPR regulators have not been frightened to flex their muscles. To date, it has collected almost €429 million in fines – serving as a constant reminder to any business processing the data of European citizens that there are penalties for not adhering to data privacy requirements.

The privacy skills gap

As well as providing a clearer framework for appropriate data handling practices, GDPR has made data protection and privacy more about people. Rather than talking in terms of technical standards and software requirements, it is based on fundamental citizens’ rights and how people within an organization can uphold them. One of the most specific lines of the GDPR is Article 37, which states that certain companies must appoint a Data Protection Officer to be compliant. More specifically, any public authority, a company whose core activities require large-scale monitoring of individuals or consist of large-scale processing of criminal data. 

Wherever appointing a DPO is not required under GDPR, it is advised as best practice for companies who need to ensure they have the right data processes in place. Given that the latest Veeam Cloud Data Management reportshows that organizations across multiple industries will spend an average of $41 milliondeploying technologies to boost business intelligence, experienced DPOs have become hot property. In 2018, when GDPR was passed, as many as 75,000 vacancies for DPOs needed to be filled – with Europe and the USA accounting for around 28,000 of these roles. 

Especially during this period of transition, organizations across the board must foster a culture of transparency in terms of how data is used. Not every person in the business can be a data protection expert, but all employees must appreciate and understand the basic principles. Furthermore, while the ownership of GDPR compliance lies with the DPO, the buck ultimately stops with the CEO. Data protection is a business conversation as well as a technology one. With that said, businesses must have an IT strategy in place which enables solid data protection practices. 

Minds over matter

Veeam research shows that three-quarters of IT decision makers globally are looking to Cloud Data Management as a means of creating a more intelligent business. Cloud Data Management brings together disciplines such as backup, replication and disaster recovery across an organizations’ entire cloud and data management provision. It ensures that data is always available, recoverable and protected at all times. But like data privacy, IT is a people industry too. In a world where businesses need to protect their data more than ever before, CEOs, CIOs and DPOs alike are looking for trusted partners to help de-risk their data management. This support may take the form of configuring data management systems, providing technical training for administrators, or basic data privacy training for end-users. 

Data Protection Dayis an appropriate time for us to reflect on how we use and view data. 

Moreover, as we begin a new decade, it’s an apt moment to acknowledge that we are still in the midst of transformation. The impact of GDPR will continue to be profound as businesses adapt to its demands and its enforcers become less patient with those who fail to comply. More fines and reputational damage will only add to the demand for DPOs – people with the expertise and appetite to take on the data privacy challenges of an organization. While investing in technologies like Cloud Data Management will be fundamental to the DPO’s strategy, privacy is now a people business. Therefore, the shrewdest investments will be in trusted partners who can guide people at every level of the organization through the rigours of remaining compliant and help create an authentic culture of data transparency.

Using AI to Level the Cyber Playing Field

By Derek Manky, Chief Security Insights & Global Threat Alliances, Fortinet 

Imagine what you would have done differently in your network if you could have just seen a few years into the future. Would you have been quicker to embrace the cloud? What about the time and money spent on technologies that you now don’t really use? Every wiring closet has a number of expensive boat anchors sitting on a shelf somewhere gathering dust. Of course, if your organization has ever been the victim of a serious breach, it’s easy to guess how you may have prepared differently for that.

Predicting the Future

The truth is, that last one isn’t really just wishful thinking. Cybersecurity professionals, myself included, have been warning organizations about the threats just around the corner for years. Some require years of experience to understand threat actor trends and malware trajectories. But others just stare you in the face. For example, much of the recent success of the cybercriminal community has been due to their ability to successfully exploit the expanding attack surface and the resulting security gaps resulting from digital transformation that are not being properly closed. This shouldn’t be news to anyone.

While predicting what cybercriminals are going to do next can be tricky, the reverse isn’t true. When it comes to the cyber arms race, the criminal community has always had a distinct advantage in knowing what’s coming next. Organizations are constantly looking for new ways to squeeze more value out of their networks, or gain that sliver of competitive edge through the use of new technologies. And cybercriminals can predict with a high degree of certainty where many of those organizations will also neglect to apply proper security to those efforts.

According to one report, cybercriminals cost the global economy a total of $1.5 trillion last year. And the rate of growth for cybercrime looks likely to continue for some time unless organizations make a significant paradigm shift as to how they think about and deploy security.

Gaining the Upper Hand

To get out ahead of the traditional cycle of buying new cybersecurity solutions in response to the latest threat trends, organizations need to begin using the same sorts of technologies and strategies to defend their networks that criminals are using to compromise them. That means adopting an intelligently integrated approach that leverages the power and resources of today’s enterprise.

Much of this is detailed in a Fortinet’s Security Predictions report for 2020. In addition to my usual predictions around the tactics and technologies that cybercriminals are likely to develop and adopt over the next few years, this year’s report focuses extensively on ways organizations can successfully gain the upper hand when it comes to their cyber adversaries. And that strategy relies heavily on two things: the development and deployment of solutions built around machine learning and artificial intelligence, and shifting to a security-driven networking strategy that takes the principle of “look before you leap” to a new level.

The Evolution and Future of AI

One of the objectives for a security-focused AI strategy is to develop an adaptive immune system for the network similar to the one in the human body. In the body, white blood cells come to the rescue when a problem is detected, acting autonomously to fight infection. In the network, Artificial Intelligence can potentially perform much the same task by identifying threats and initiating and coordinating a response. A quick review of its history can help us predict its trajectory.

The first generation of AI is already in place in some sectors. Leveraging artificial neural networks and massive databases, systems using machine learning can rapidly sift through mountains of data to provide analysis and determine a proper course of action, all at network speeds.

The next generation of AI, currently running in labs and some production environments, is able better able to detect patterns by distributing learning nodes across an environment. This enhances its impact on things like access control. Some AI systems are now able to identify individuals using complex bio-footprints such as typing patterns or heartbeat rhythms, and detect even the most subtle deviations in normal network traffic to identify malicious actors and malware. Implementing this in today’s networks will require deploying regional AI-enhanced learning nodes that can collect and process local data for quick responses to events, and also share that data back to a central AI brain to deeper correlation to not only better detect suspicious patterns of behavior, but also immediately respond in a decisive manner before an attack can even be fully formed.

The third generation of AI, however, is where things begin to get really interesting. AI will still require a central brain, but rather than a hub and spoke model, it will instead exist as an interconnected web of even more intelligent regional learner nodes, much like an organic neural network. Direct information sharing between nodes will not only play a pivotal role in identifying threats in true real time, but also ensure that central protections and controls match local requirements and variations.

Getting from Here to There

Of course, none of this will matter if security isn’t deployed where cybercriminals strike. Today, different segments of the networks can’t see or talk to each other and collected threat intelligence often exists in isolation. The result is a fragmented security implementation that cybercriminals are all too eager to exploit. And this challenge is being compounded as more and more organizations rush headlong into adopting new technologies – today it’s the cloud and tomorrow it will be 5G and edge computing – without first properly considering all of the security ramifications. And that has to include prioritizing how the security to be deployed in new areas of the network will interoperate with existing systems.

Getting from where most organizations are today, to the sort of integrated and distributed security that the future will require, underscores the need to take a new approach. To start, organizations need to focus on interconnectivity and deep integration between their security devices. For machine learning systems to be successful, they not only need access to critical security information, but that data will need to be seamlessly and instantly shared across the network so can be adapted to each networked environment’s unique configuration. This will also require taking a security-first approach to new network expansions to ensure that all network and security systems and devices are visible and consistently controllable from anywhere in the network.

The ability for machine learning and AI systems to take over many of the menial and detail-oriented tasks previously assigned to human resources will take a significant bite out of the growing cybersecurity skills gap. By shifting responsibilities to autonomous self-learning processes that function similarly to human autoimmune systems – hunting for, detecting, and responding to security events autonomously and in true real time – valuable cybersecurity professionals will be able to focus their unique skillsets on higher-order planning and strategy. This transition will be critical as organizations move to adopt the advanced security-driven network strategies that will help their businesses succeed in the digital marketplace of tomorrow.

Digital Health Middle East Conference sets the stage for the new decade and future health care delivery

Digital Health Middle East 2020, held at the Armani Hotel, Burj Khalifa on the 24th of February will be engaging key stakeholders across the healthcare ecosystem. Held for the past five years in Scandinavia, this is the first time the conference gathers in Dubai to present intelligent design, pioneering technologies, advance clinical services and personalised care to improve outcomes, reduce costs and prioritise on prevention.

 

“This conference will address studies, hands-on cases and latest technology utilisation for future healthcare delivery, defining digital strategies, service improvement, ethical flows of data and secure, personalised care. Digital Health in itself will provide more accurate health outcomes and better patient experiences” – Johan Ehrstrom, CEO of Digital Health Middle East 2020.

 

Meet 250+ peers from across the ecosystem, and 20+ global speakers for a dialogue, vital insights and networking as this C-level hub facilitates knowledge exchange and game-changing strategies. Digital Health Middle East brings C-level attendees including executives and CXO’s, governmental department heads, hospital leaders, nurse leaders, regulators, technologists, futurists and entrepreneurs.

 

In the new decade, Digital Health will reform the industry with preventive information and new care solutions. Exponential technologies will increase access and improve how care will be delivered with the highest levels of safety, quality and patient experience, at the lowest cost.

 

Attendees will discover the powers of AI, machine learning and robotics among pioneering technologies affecting healthcare delivery, get hands-on case studies, objective insights, real-world scenarios and accurate foresight on the future of digital health.

 

Private sector participants can register on www.digital-health.me for USD 795 including materials, case examples, food & beverage and valet. Public sector attendees can register for USD 495.

 

Infoblox to Host Cybersecurity Roadshow 2020 across Middle East and Africa

Infoblox Inc., the leader in Secure Cloud-Managed Network Services, announced thatitis hostinga5-citycybersecurity tourthroughoutMiddleEast &Africa (MEA) under the theme ‘Take Network Security to the Next Level’. The roadshow will kick off on February 24th, 2020 inAmman, Jordan and will conclude in Kuwait City on the 11thof March.  

Ashraf Sheet, Regional Director MEA at Infoblox says, “Today’s enterprise is truly borderless. The network perimeter is dissolving with digital transformations like SD-WAN, IoT, and hybrid cloud, complicating traditional security approaches. Remote branches are directly connecting to the internet, losing the protection of the full security stack deployed in the data centre.”

“Securing these evolving IT architectures adds to the burden on short-staffed security teams who are already dealing with an overwhelming number of alerts and rigid siloed security tools. What’s needed is a foundational approach that is simple yet pervasive, cost-effective yet powerful and boosts the efficiency of security operations through automation.”

At the 2020 road tour, Infoblox and its strategic partners will help regional organizations understandhow to unleash the full power of their security stack, improve incident response times through extensive integrations and extend protection to support their digital transformations.

Infoblox experts will discuss how organizations are addressing core networking challenges in security and next-gen data centres and eliminating weaknesses within the core infrastructure. Event attendees will get an opportunity to participate in interactive sessions, see live demos and be inspired by industry leaders and real-world stories from organizations who will share how they are driving growth, innovation and digital transformation with Infoblox solutions. The interactive sessions will cover how to:

  • Use foundational network services to easily and cost-effectively secure evolving IT architectures
  • Provide visibility into and secure multi cloud platforms
  • Understand security risk when internal DNS is bypassed due to the use of DoH (DNS over Https)
  • Lower incident response times using automatic data sharing and ecosystem integrations
  • Optimize your security costs

The full schedule of the road show, with dates andcitiesforthetouracross Middle East & Africa areasfollows:

24 February 2020       Amman, Jordan                       Register

26 February 2020       Doha, Qatar                             Register           

02 March 2020            Riyadh, Saudi Arabia               Register

04 March 2020            Johannesburg, South Africa   Register

10 March 2020            Kuwait City, Kuwait                 Register

Aruba Advances Digital Retail Experiences with SD-Branch Innovations

SD-Branch Pioneer Extends Zero Trust Security and New Cloud-native Management Capabilities to Enable Non-stop Retail Operations at Scale

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), today announced the next milestone for its SD-Branch solution that enables more secure, streamlined and simplified deployment and management of large distributed retail networks.

A critical component of the company’s Edge-to-Cloud strategy, Aruba’s SD-Branch solutionintegrates Aruba Branch Gateways with the Aruba Centralcloud management platform to provide a single point of control and management for SD-WAN, wired and wireless networking to enable secure, simplified branch connectivity at scale. The innovations include: 

  • An expansion of Aruba’s unified branch defense capabilities to provide unique, identity-based attack detection and intrusion prevention to deliver zero trust in-store network security; 
  • New enhancements to the SD-WAN Orchestrator in Aruba Central to deliver unified edge-to-cloud management and secure connectivity to cloud workloads; 
  • New branch gateways that provide non-stop connectivity via built-in cellular, including LTE. 

Retail IT teams are under tremendous pressure to drive digital transformation within brick-and-mortar locations and “place the store at the center of their customer experience”[1]in order to compete with online merchants and marketplaces. To achieve this, they are leveraging next generation technologies to enable personalized, immersive experiences within the stores, but are consistently challenged by the lack of on-site technical staff at branch locations. As such, IT staff responsible for connecting, securing and managing retail locations must rethink the way they architect their branch networks. A unified edge-to-cloud architecture that automates and secures LAN, WAN and cloud connectivity is paramount to driving operational efficiency and addressing the lack of IT staff.  

“As we continue to grow our retail stores internationally, we are laser-focused on using technology to deliver our customers a truly unique shopping experience,” said Stewart Ebrat, CIO at Vera Wang. “With Aruba’s SD-Branch solution as the solid foundation for a secure, easy-to-deploy and centrally managed infrastructure, we will also be able to better engage with our customers by identifying them via their mobile phones so that store associates can help personalize and transform their in-store shopping experience.” 

Delivering Zero Trust Security to the Retail Branch

While retailers are embracing digital technologies – such as mobility and IoT – to enhance the shopper experience, they are also facing new security threats and an increased attack surface. Traditional security techniques were simply not designed to handle these new and evolving threats; as a result, many IT teams are adopting a Zero Trust Security framework, an architecture that dictates that no one within or outside the network is trusted. Key elements of a Zero Trust Security framework include a policy engine/trust broker, the ability to dynamically segment traffic on the basis of identity and role, and continuous monitoring for changes in security status with the corresponding real time adjustment of access policies. In addition, IT teams gain enhanced security by employing a Secure Access Service Edge (SASE) approach, which combinesnetwork security functions with WAN capabilities to support the dynamic secure access needs of organizations.[2]

Aruba has long supported the principles of a Zero Trust Security framework with its market-leading role-based access technology and Dynamic Segmentationwhich provides unified, software-defined micro-segmentation across the network, in branch and campus environments, to isolate users, devices and applications from one another based on role, not the type or location of the network connection. Aruba is advancing its unified branch defense capabilities with new IDS/IPS functionality that integrates with Aruba’s ClearPass Policy Managerand Policy Enforcement Firewall. By leveraging role-based access, Aruba adds a new identity-based detection dimension to traditional intrusion detection and prevention, enabling security teams to focus on alerts that matter. 

Aruba’s unified branch defense also includes:

  • One-click integration with cloud-based security solutions;
  • Threat visibility and trend analysis;
  • Correlation of security events with sites, clients, applications and network infrastructure;
  • Out-of-box policies for enforcement and incident response;
  • Security event streaming to third-party Security Information and Event Management (SIEM) solutions;
  • ClearPass Policy Manager for global access policy development and propagation.

Aruba’s unified branch defense capabilities deliver a complete solution for security and connectivity at retail locations, defending against a myriad of threats, including phishing, denial of service (DoS) and increasingly widespread ransomware attacks. 

Seamless Zero Trust from Edge-to-Cloud 

As adoption of software-as-a-service (SaaS) applications and virtual private clouds (VPCs) continue to rise, so has the complexity of maintaining security and control over the data, traffic and users accessing the cloud. Aruba is extending its Zero Trust Security model to the cloud with the enhanced SD-WAN Orchestrator in Aruba Central,making it easier for branch network operators to deploy flexible and secure overlay topologies in a large-scale edge infrastructure, securely connecting thousands of remote locations to applications in data centers and the cloud. 

Aruba Virtual Gateways, available for AWS and Azure, combined with orchestration, cost-effectively extend network and security policies to workloads running in the public cloud while the new SaaS Express prioritization feature continuously probes hosting locations for SaaS applications to ensure application performance.

Ensuring Non-Stop Operations at Every Retail Location

To help ensure a seamless shopping experience, retailers need a highly reliable network infrastructure as the foundation for digital transformation. Built-in cellular access in the Aruba 9004 Series Gateways gives customers the option to use the connection as a primary or secondary uplink or in a load shared active-active mode with other broadband links.Further, for cost control purposes, retailers can selectively use the cellular uplink for certain applications in any of these modes. 

Embedded cellular provides retailers with reliable, high performance backup connectivity with seamless failover that can be centrally managed. IT staff are able tune and optimize connectivity by defining SLA policies across a combination of MPLS, Internet and cellular links enforced with dynamic path steering in real-time with the ability to select the preferred cellular link. The cellular link can also be used for remote locations or to accelerate the deployment of a new store until the dedicated MPLS or Internet links are installed.

“Aruba pioneered the SD-Branch solution, creating a new category beyond pure-play SD-WAN offerings that gives retail IT the ability to face the higher-level challenges of remote branch connectivity, such as reducing device footprint, unified management across WAN and LAN, and security,” said Kishore Seshadri, vice president and general manager of SD-WAN Solutions at Aruba, a Hewlett Packard Enterprise company. “Today’s advancements extend Aruba’s SD-Branch solution to further support retail network operators with new, integrated in-store security capabilities, public cloud workload orchestration, and resiliency that retailers need for non-stop operations.”


[1]Forrester Research, US Retailers: Adapt Your Stores to Compete with Marketplaces, December 2019

[2]Gartner, Say Hello to SASE (Secure Access Service Edge),December 29, 2019