Parivar Restaurant opens doors at Al Raha Mall

Parivar Restaurant is now open at Al Raha Mallserving wholesome and heartwarming North Indian, Pakistani and Nepalese cuisine featuring chaat, tandoori, veg and non-veg dishes, soups and desserts made with fresh handpicked ingredients and authentic spices.

Mr. SadiqAfridi, Mall Manager at Al Raha Mall said, “We are excited to add Parivar Restaurant as an additional F&B feature for Al Raha Mall as it is unique in offering Indian, Pakistani and Nepalese in one setting and offers an additional advantage for the nearby community by providing delivery services for their convenience. Al Raha Mall is committed to bringing a variety of dining options to enhance the retail experience for shoppers.”

Waqas Sheikh, Managing Partner, Parivar Restaurant adds, “Our chefs bring guests an enjoyable dining experience by offering authentic dishes that are always made fresh for dine in as well as bespoke catering services for both private and corporate events. We are also opening Baan Thai Restaurant in Al Raha Mall where the famous Chef Supaniya from Bangkok will be preparing mouthwatering authentic Thai cuisine. We look forward to providing the best service to Al Raha Mall patrons and the neighboring community.”

With ample parking and a host of retail and service outlets, Al Raha Mall is an ideal mall for busy professionals and families looking for a one stop venue to eat, shop and play.

Other Al Raha Mall outlets include, Lulu Express Supermarket, Brands4U, Dubai Library, Borders bookshop, Al Raha Cinema, Sparky’s, Damas Jewellery, Aster Optical, Tag World, Orlando Sports, ELC, Nayomi, H collection. Services include Etisalat, Du, Al Ansari Exchange, Jumassan Salon, Young Musician, Photo studio, ATM’s and Green Land Flowers. Food lovers can enjoy Caesar’s Restaurant & Confectionery, Tche Tche Boulevard Restaurant, Subway, Papa Murphy’s, Charley’s, Burger Hut, Soulful Restaurant, Samurai Japanese Restaurant, Sapori Veri Restaurant. Coffee connoisseurs can head to Fresh Bakes Café, Bonjour Bonsoir Café, Gloria Jeans and Orange Wheels.

NetApp 2020 Predictions

By: Atish Gude – Senior Vice President and Chief Strategy Officer (CSO) NetApp

2019 was a year of rapid innovation—and disruption—for both the IT industry and the broader business community. With the widespread adoption of hybrid multicloud as the de facto architecture for enterprise customers, organizations everywhere are under tremendous pressure to modernize their infrastructure and to deliver tangible business value around data-intensive applications and workloads.

As a result, organizations are shifting from on-premises environments to using public cloud services, building private clouds, and moving from disk to flash in data centers—sometimes concurrently. These transformations open the door to enormous potential, but they also introduce the unintended consequence of increased IT complexity. 

We predict that a demand for simplicity and customizability will be the number one factor that drives IT purchasing decisions in 2020. Vendors will need to offer modern, flexible technologies with the choice of how to use and to consume those technologies so that customers can keep pace with their evolving business models. As IT departments strive to deemphasize maintenance and hardware, to reduce overhead, and to adopt pay-as-you-go models, simplicity and choice will be crucial. 

Achieving this simplicity will serve as the foundation for companies as they navigate the exciting technological trends that we identify in the following sections.

 

1. As the advent of 5G makes AI-driven Internet of Things (IoT) a reality, edge computing environments are primed to become even more disruptive than cloud was.

In preparation for the widespread emergence of 5G, lower-cost sensors and maturing AI applications will be used to build compute-intensive edge environments. This effort will lay the groundwork for high-bandwidth, low-latency AI-driven IoT environments with the potential for huge innovation—and disruption.

The advent of 5G is what AI-driven IoT has been waiting for. It will take a few more years for 5G data technology to spread across the Middle East. However, 2020 will see many players in the technology industry and business community invest in building edge computing environments to support the reality of AI-driven IoT. These environments will make possible new use cases that rely on intelligent, instantaneous, and autonomous decision-making, with low-latency, high-bandwidth capabilities. This evolution will bring us to a world where the internet will work on our behalf—without even having to ask. 

This AI-driven IoT innovation, however, will depend on a massive prioritization of edge computing, further disrupting IT infrastructures and data management priorities. As edge devices move beyond home devices (such as connected thermostats and speakers) and become more far-reaching (such as connected solar farms), more data centers will be placed at the edge. Also, platforms such as artificial intelligence for IT operations (AIOps) will be necessary to help monitor complex environments across the edge, the core, and the cloud. 

 

2. The impact of blockchain will be undeniable as indelible ledgers rapidly enable game-changing use cases outside of cryptocurrency. 

The world is quickly moving beyond Bitcoin to adopt enterprise-distributed indelible ledgers, setting the stage for a transformation that’s exponentially bigger than the impact that cryptocurrency has had on blockchain in finance. 

While the crypto frenzy continues to steal the limelight when it comes to blockchain, most players in the industry understand the bigger picture of the technology and its potential. Going into 2020, we will see a tipping point for larger implementations as enterprises go a step further to adopt indelible ledgers based on Hyperledger, which represents the maturation of blockchain for wider use cases. Indeed, we will start to see blockchain go “mainstream” as it enables industries such as healthcare to create universal patient records, to improve chain-of-custody pharmaceutical processes, and more. 

With such use cases validating blockchain and indelible ledgers, additional widespread adoption of the technology will drive transformation across society on a larger scale. This widespread adoption will build on the disruption that cryptocurrency has brought to finance to touch nearly every industry. As a result, new data management and compute capabilities will encourage companies to invest in indelible ledgers to build differentiated applications and to collaborate on critical, sensitive datasets.

 

3. Hardware-based composable architecture will have less short-term potential against commodity hardware and software-based infrastructure virtualization.

Continued improvements in commodity hardware performance, software-based virtualization, and microservice software architectures will eliminate much of the performance advantage of proprietary hardware-based composable architectures, relegating them to niche data center roles soon. 

Hardware-based composable architecture is being hyped as the next evolution of hyperconverged infrastructure (HCI). This architecture enables CPUs, networking cards, workload accelerators, and storage resources to be distributed across a rack-scale architecture and to be connected with low-latency PCIe-based switching. And although composable architecture does have potential, standardization has been slow, and adoption has been even slower. Meanwhile, software-based virtualization of storage, combined with software-based (but hardware-accelerated) compute and networking virtualization solutions, offers much of the flexibility of hardware-based composable architectures today with lower cost and consistently increasing performance.

Next year, attempts to build a true hardware-based rack-scale computing model will no doubt continue, and the space will continue to evolve quickly. However, most organizations that must transform within 2020 will be best served by a combination of modern HCI architectures (including disaggregated HCI) and software-based virtualization and containerization. 

Winter Holiday Travel Tips: Staying Protected from Cybercrime

By: Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox

As 2019 draws to a close and expatriates pack their bags and book their tickets to return to their home countries for the winter holiday season, nothing could possibly go wrong—except for a potential cybersecurity attack! Here are eight tips on how to stay protected while you are away on holiday:

Avoid travel booking scams

Quite a few people get scammed while booking travel plans online. Unfortunately, there are many fraudulent websites that lure customers in by using fake domain names similar to those of well-known travel-booking agencies. To keep yourself protected, do your research on different travel booking websites and make sure you are using real and trustworthy websites. A quick check to see if there is a “lock” icon in front of the URL and the website domain doesn’t have any unusual letters is a great place to start.

Protect your log-in credentials

Whether checking into a flight, confirming reservations for hotels, or making new reservations with websites you have accounts with, your information can be vulnerable. Sophisticated “forgeries” of popular booking sites are far too common and fool people into surrendering their usernames and passwords, which attackers will exploit. A simple technique to avoid falling victim is to use a username and password you know is wrong. If the site accepts it, pretending to log you in, you will know that it is a fake site, and your credentials are still protected.

Be cautious of using public Wi-Fi networks

Many airports and local cafes offer free and public Wi-Fi networks for users. These are often tempting to use, especially as a traveller who wants to stay connected online and get some work done. However, these networks are not secure—even if they are paid. Paying to use restricted networks does not necessarily make them safe. Infiltrators have complete and easy access to these open networks, and they are ready to attack at any given moment. For example, be aware of evil twins: attackers can establish rogue Wi-Fi networks with names such as “Free Wi-Fi.” Be sure to confirm the name of the hotspot before connecting. To stay protected, use a VPN or a private mobile hotspot when browsing the web on vacation to keep your data secure.

Avoid using public computers

When opting to use a public computer, it is best to refrain from accessing sensitive information, including logging into bank accounts and making online transactions. Assume that all activity on public computers can be seen and recreated by others. Attackers can install keyloggers on public computers, allowing them to recreate any data including log-in credentials and more. Rather than purchasing items online, it is highly recommended to pay for items upfront at the vacation destination. However, if you absolutely need to use the internet during travel, use your mobile device, which is much safer than a shared computer system. You can also get VPN apps for most mobile devices, so if you need public WiFi as well, your connection will be protected.

Disable Bluetooth access

Bluetooth connections are generally secure, as they typically require confirmation from the person who is pairing the devices together. However, there is a real risk of Bluetooth settings not being configured properly, resulting in cybersecurity dangers. Occasionally, personal devices are set to automatic pairing, giving cybercriminals easy access to devices. This allows them to easily steal data and to infiltrate systems with malware. Before leaving on vacation, check to make sure all Bluetooth connectivity settings are secure. However, the safest option would be turning off Bluetooth networking altogether.

Update and backup devices

Keeping technology software and applications up-to-date is crucial. Outdated software leaves users vulnerable to security breaches because hackers are often able to find security holes. The easiest way to do this is to turn on automatic updates on all your devices. To prepare for the worst, it is suggested to back up all of your information before the trip in the event that files and data go missing.

Pack a portable charger

Bring a portable charger or a personal charging cube along. Avoid using public charging stations as much as possible to keep from falling victim to “juicejacking.” This crime occurs when hackers trick travellers into charging their devices, while the charger cord actually connects to a hidden computer. The computer then downloads all the information off of the personal device, including important data such as usernames and account numbers. Therefore, it is much safer to bring a personal power source.

Install a privacy screen

Privacy screens “black out” the sides of devices, ensuring that the only person who can read the screen is the person who is actually using the device. They are inexpensive and provide a very easy solution for prying eyes. They are also much more effective than simply dimming the brightness of the screen. Anyone could be lurking nearby at the airport or at the hotel lobby, so play it safe and get a privacy screen today.

Conclusion

There are many simple and cheap precautions that travellers can take to keep safe while traveling. Don’t let attackers ruin vacation or cause worry about cybersecurity issues.

New Fortinet Survey Provides Insight into the role of Cybersecurity in OT

The Importance of Cybersecurity to Enable Safety and Reliability is Recognized but Obstacles Remain

Fortinet,a global leader in broad, integrated and automated cybersecurity solutions, today announced that a commissioned study conducted by Forrester Consulting found that industrial firms, due to increased digitalization, are more exposed to cyber threats than ever before. In addition, the lack of collaboration between Information Technology (IT) and Operational Technology (OT) teams represents another cybersecurity barrier for organizations that want to take full advantage of IT/OT convergence to increase their business benefits.

Industrial firms are committed to further digitalizing their factory floor to find new efficiencies and improve their ability to gather data that can provide business insight into production processes. 66% of respondents said their factories run through IP-connected networks and use real-time data to inform business decisions. However, these IP-connected networks bring up new cybersecurity risks with 73% of respondents in agreement that the attack surface has expanded. Meanwhile, only half of respondents agreed that their factory machinery is well prepared to fight off cybersecurity threats, leaving the other half unprepared and 55% of respondents either have no plans to implement or plan to implement cybersecurity technologies in the next 12 months. 

Another key finding showing Industrial Control Systems (ICS) are at risk due to lack of collaboration between the IT and OT environments with 51% of respondents claiming they operate in silos, meaning the OT team manages critical industrial equipment and any OT cybersecurity whereas the IT team is responsible for management of IT cybersecurity. A quarter to over a third of respondents did not know who had primary responsibility for cybersecurity solutions such as process, control and automation systems, and even business planning and logistics. However, 91% stated that security of factory machinery should be a shared IT and OT responsibility, as well as having clear and regular communication on the IT/OT convergence vision (58%) in order to ensure a successful IT/OT convergence. 

Organizations have much to gain from convergence and close collaboration between OT and IT teams, with the biggest being access to real-time data insights from manufacturing operations (66%) then being able to monetize and create new business opportunities via increased insight into production data (59%). Numerous efficiency gains are to be obtained as well, with 43% of respondents citing reduced duplication of processes and workflows between plants, as well as enhanced visibility to mitigate cybersecurity threats.

Joe Sarno, VP International Emerging & Operational Technology & Critical Infrastructure EMEA at Fortinet: “Industrial firms need to change at the operational level in order to bridge the divide between IT and OT environments and build trust between these teams, to ensure a successful convergence. As the attack surface expands, IT and OT teams must collaborate to improve visibility and defend against cyber threats. That’s why at Fortinet we are investing a lot of time and resources into R&D for ICS cybersecurity solutions.”

Fortinet commissioned Forrester Consulting to conduct an online survey in India, Turkey, the UK, Spain, Poland, Germany, Slovakia, Italy, France, the Czech Republic, and the Netherlands to evaluate the techniques industrial firms use to manage security, security roles and responsibilities between IT and OT, and the challenges and opportunities of IT/OT convergence.The survey included 459 IT and OT decision makers responsible for ICS at industrial enterprises with 1,000 employees or more (automotive, transportation, manufacturing, maritime, and aviation engineering) in Europe and India.

Kodak Alaris Claims Prestigious 2020 Scanner Line of the Year Award from the Analysts at Keypoint Intelligence – Buyers Lab

Buyers Laboratory (BLI), the world’s leading independent evaluator of document imaging hardware, software, and services, today announced that Kodak Alaris has won BLI’s coveted 2020 Scanner Line of the Year award for the fourth time in five years. Given once a year, this award recognizes the vendor whose product line is deemed best overall based on its rigorous laboratory evaluations.

Scanners from Kodak Alaris enable businesses of all shapes and sizes to extend business process automation to the point of capture. Across the entire line, customers can expect highly integrated onramps for entering all paper-based information to the systems that drive their business. Each device is characterized by its exceptional media handling, top-notch image enhancement and OCR capabilities, flawless reliability, and a simple user experience.” said Lee Davis, Keypoint Intelligence’s Senior Editor, Scanner Analysis and Software Evaluation. “Whether it’s a small desktop unit or a production scanner—and everything in between—scanners from Kodak Alaris are class leaders that can add tremendous value to any business, earning the company its fourth Line of the Year award in five years, and its fifth overall.”

To determine the Scanner Line of the Year award recipient, BLI analysts consider current scanners in the OEM’s line that have been submitted to BLI’s lab for testing. To judge the overall quality of the line, the analysts look at the overall rating a scanner received after testing, as well as the ratings in key categories such as Reliability, Productivity, Media Handling, Image Quality, Ease of Setup, Drivers/Utilities, OCR Performance, and Value.

“Kodak Alaris is by far the most-awarded scanner manufacturer in BLI’s 62-year history, with 30 Pick and Outstanding Achievement awards along with the five Line of the Year honors,” said Don Lofstrom, President and General Manager, Alaris, a Kodak Alaris business. “As we kick off a new decade with this prestigious award, we look forward to innovating, delighting customers and growing with our partners for many years to come.”

OmniClouds Signs Strategic Partnership with Infonas Telecom Bahrain

Enterprises to benefit from SD-WAN security and speed to drive business-first model

OmniClouds, a native cloud service provider and cloud migration enabler in the EMEA region has signed a strategic partnership with Infonas Telecom, the Bahrain-based global telecom carrier and ICT provider. Through this partnership, Infonas willprovide SD-WAN services to enterprises in Bahrain using virtualizedservice platform provided by OmniClouds.

“As more and more enterprises adopt a cloud or multi-cloud approach, SD-WAN becomes the natural choice for providers to leverage cloud and IOT driven applications securely and fast ,” said Amr A Eid, Chief Executive Officer and Board Member, OmniClouds, “We are the trusted platform for enterprise customers in the Middle East and Africa region to enable their cloud migration and adoption journey. The OmniClouds hybrid platform with our native partners and the MSP model plays a critical role in seamlessly enterprises with their move to the cloud by simplifying the operations and providing security and assurance they need for such a critical part of their business. We firmly believe expansion through partners as a key success to cloud adoption in this shared economy era, creating value for all the ecosystem. Our partnership with Infonas will empower enterprises to reap the benefits of their cloud investments and drive a business-first model.”

The improved connectivity will allow enterprises to seamlessly transform their global network into an automated, programmable SD-WAN using the Nuage technology. Software-defined WAN (SD-WAN) technology is the next-generation network technology that offers carriers flexibility, end-to-end control and uninterrupted connectivity to services. It is emerging as a networking approach that delivers multiple performance and cost benefits, including end-to-end network visibility and feedback to improve transmission efficiencies on the fly.

“Infonas and OmniCouds together are committed to helping enterprises in their digital transformation journey,” said Hamad Al- Amer, Board Member and Managing Director at Infonas WLL. “Our partnership with OmniClouds will enable enterprises in Bahrain to connect efficiently to multiple cloud providers such as Amazon, Microsoft, IBM Softlayer, Google Cloud Platform, as well as benefit from Zero-touch Provisioning, Managed Security, and guaranteed SLA. This is the right time for end users to think beyond the legacy methods of doing things.”

From Big Data Management to Cyber Hunting Security, What to Expect in 2020

Article By: Mena Migally, Senior Director, MENA at Riverbed

While 2020 marks the start of a new decade, many of the technology trends that have dominated conversations through 2019 —big data, cyber hunting, IoT, 5G, and user experience — will continue to shape IT roadmaps as companies begin to take action and look for the impact of their strategic investments. 

At Riverbed Technology, we believe the dawn of the new year presents the ideal opportunity to take stock of the advancements made in the year gone by and explore how these will continue to evolve in 2020. 

Digital Transformation Will Radically Shape Business Strategies and Outcomes

While talk of digital transformation has been ongoing for several years now, organizations’ transformation efforts have seen mixed results. Even enterprises that started down the road in 2018 and 2019 have realized that an organization and its infrastructure cannot be completely transformed overnight and that it will instead be an ongoing exercise. The reality is that many organizations were not equipped for a true digital transformation or to embrace SD-WAN. This is set to change as we head into 2020. The digital transformation march will continue to move forward, along with the adoption of SD-WAN.

There’s an inherent risk for those businesses that buck the trend. The Amazonification of consumer expectations has reshaped enterprise go-to-market strategies in a huge way by going beyond just situating a solution in the cloud. The winners here will be those who can deliver the desired experiences and outcomes at the speed customers demand. Today, enterprise customers expect the incredible speed and convenience that’s traditionally been demanded by consumers. They have been shaped, as we all have, by getting what we’ve asked for at a blink-and-you’ll-miss-it level of service. Not everyone will be able to keep up so expect to see some players merge with others – or simply fall by the wayside.

IoT and 5G Will Push Applications to the Edge

There no doubt that 2019 was the year of cloud in the Middle East. The market’s momentum is only set to increase and we can expect distributed cloud to become the new data center that truly empowers the edge. As more organizations start incorporating IoT technologies, their applications will need to run at the edge to ensure high performance and faster response. With IoT heading to the forefront – and soon to be enabled by the proliferation of 5G networks – organizations in 2020 are starting to think about how to address the new visibility challenges that will stem from the need of edge applications to communicate back to a centralized point. 

Also, the security of that network traffic is going to be paramount. There is no getting away from security being at the top of the agenda for organizations’ investments in 2020. It’s going to be imperative for organizations to be able to track which devices are communicating with other devices and determine whether they’re part of a distributed cloud or still being sent back to a consolidated location. 

Threat Hunting Will Become a Mandatory Security Exercise

Sticking with the theme of cybersecurity, we will see an increase in the number of “advanced persistent threats,” sophisticated, systematic cyber-attack programs that continue for an extended period of time, often orchestrated by a group of skilled hackers. These are the hacks that do the most damage to organizations and if a company doesn’t have proactive threat detection measures in place, it could be unaware of the attack until after the damage is done.  

As networks for organizations have grown, they have become like the Roman empire – big, sprawling and hard to defend. Throwing up a “wall,” or firewall, to defend against attacks is less likely to be effective when the advanced persistent threats have multiple ways to attack the cracks in those walls. 

The best way to combat advanced persistent threats is to engage in “cyber hunting,” the process of proactively and iteratively searching networks to detect and isolate advanced threats that evade existing security solutions. As hackers become smarter and find new evasive ways to infiltrate a network, organizations in 2020 will begin adopting the proactive cyber hunting approach to complement traditional reactive threat management approaches of installing firewalls, intrusion detection systems and SIEM systems. 

The Days of Data Hoarding are Over 

The proliferation of the cloud and its immense data storage capabilities are double-edged swords for organizations that have been “data hoarding.” As we move into 2020, many organizations will realize that while big data has tremendous value, some of that data may be a liability.  The potential risk of a breach involving sensitive client data is too substantial to a company’s bottom line, especially with the emergence of more consumer data protection laws, such as CCPA, coming down the line in 2020. To combat this, organizations will start reviewing collected data to determine what clearly enhances the business’s performance and delete the rest, as the risk is too high to continue to store customer data without a foreseeable purpose. 

Why These Matter2020 will see many game changing technologies reach maturity and no doubt, emerging technologies such as AI will take root as they begin to deliver tangible value for businesses. As the technologies we know and love continue to evolve, they will open up the possibility of new 

FERRETTI GROUP IS THE SUPERSTAR AT BOOT DÜSSELDORF WITH A FLEET OF 6 YACHTS, INCLUDING A PERSHING WORLD PREMIÈRE AND A RIVA PREMIÈRE FOR THE GERMAN MARKET

The Group opens 2020 in grand style with a product world preview and the announcement of the new and eagerly awaited “TØ project” range, both for the Pershing brand

Ferretti Group continues to triumphantly ride the wave of cutting-edge nautical innovation, lining up a fleet of 6 fabulous yachts in Düsseldorf. There will be two premières: Riva Dolceriva, making its debut on the German market, and a world première, a Pershing Generation X model in the 50-to-70 feet segment. 

BOOT, to be held from 18th to 26th January, is the ideal stage for presenting a preview of the latest news and flagship products of the new nautical season, thanks to the significant numbers: over 1,800 exhibitors, 900 of which from more than 60 countries. 

The crowds flocked to the magnificent stand (Halle 6, stand D28) thanks to the innovative concept featuring original and welcoming lounges, each dedicated to one of the Group’s brands, and a very spacious VIP area complete with cocktail bar. 

The two premières will be accompanied by a number of the Group’s hugely successful models: 

  • • Ferretti Yachts 670 and Ferretti Yachts 780 
  • • Riva 90’ Argo 
  • • 48’ Wallytender 

As always, the new projects will be presented during the inaugural press conference, featuring those from Riva, Pershing, and Ferretti Yachts, in addition to the ones already announced in the last few months, like the long-awaited TØ project. Pershing’s new range redefines the boundaries of the 25-to-40-metres market segment, revolutionising the concept of sports yachting and setting game-changing standards of yachting pleasure, with strong points like high technology, unrivalled performance, and the unique style created by Fulvio De Simoni. The appointment will also be an opportunity to look back at the past year and forward to 2020. 

At BOOT 2020, Ferretti Group’s partnerships with prestigious Italian and international brands will continue: 

Jaguar Land Rover, official automotive partner; La Scolca winery of Gavi will enchant visitors with its selection of fine wines; Seabob will display its limited edition models created ad hoc for the Group’s brands; Mogi Caffè will delight guests with the best Italian coffee blends; Flos and 8-Light will furnish exclusive LED lamps; and Slam will supply the uniforms of the Ferretti Group crew. 

FERRETTI GROUP PREMIÈRES AT BOOT 2020 IN DÜSSELDORF: 

RIVA DOLCERIVA 

Born of the collaboration between Officina Italiana Design, the firm headed by Mauro Micheli and Sergio Beretta that has designed the entire Riva fleet for over 25 years, and the Ferretti Group’s Engineering Department and Product Strategy Committee, Dolceriva is 14.92 metres (48 ft) long with a full beam of 4.26 metres (14 ft). 

The latest spellbinding creation by Riva is a 48’ open yacht designed to offer unrivalled on-board comfort. The objective is to challenge the market segment with a series of unprecedented features: a brand new exterior design developed by Officina Italiana Design, which ushers in a new style philosophy for all Riva models; a perfectly optimised use of all the on-board spaces; and an exciting array of details that pays homage to the brand’s incomparable heritage. 

PERSHING PREMIÈRE 

Resulting from the collaboration between the Fulvio De Simoni’s design studio, the Ferretti Group Product Strategy Committee, led by engineer Piero Ferrari, and the Group’s Engineering Department, the new star of Generation X expands the Brand’s current range, entering the over 20 metres market segment with a competitive product that embodies a genuine evolution from the point of view of style and functionality as well as performance. 

Carbon fibre, the primary construction material, was the inspiration for the concept of a design focused on greater weight reduction, also by means of various construction solutions. The design of the sleek, sporty exterior adds considerable aesthetic innovation to the quintessential Pershing style. In addition, the first unit introduces a new colour for the hull and superstructure. The storage areas and space have been increased, without any compromises in terms of performance or the inclusion of high-tech features. This Pershing will easily attain a top speed of 50 knots (preliminary data), in absolute comfort and complete safety, a testament to the sporting vocation of Generation X. 

Fortinet Secure SD-WAN Chosen by Over 21,000 Global Customers, Supports Enterprises with up to 100,000 Sites

 

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced continued momentum and global customer adoption of Fortinet Secure SD-WAN by over 21,000 organizations across different industries and verticals. Fortinet’s security-driven networking approach to SD-WAN seamlessly integrates enterprise-grade SD-WAN, advanced security, and advanced routing in a unified offering to modernize customers’ WAN edge and help achieve their digital innovation goals with FortiManager Orchestration that can scale to support up to 100,000 SD-WAN sites.

 

Cybersecurity has become a top-of-mind strategic business issue for enterprise organizations deploying SD-WAN solutions. As a result, organizations worldwide are turning toward solutions that tightly integrate next-generation firewall security and SD-WAN functionality. The latest Gartner Magic Quadrant for Network Firewalls states, “By 2024, 50% of new firewall purchases in distributed enterprises will utilize SD-WAN features with the growing adoption of cloud-based services, up from less than 20% today.”1

 

“Our rapidly growing market share and customer base around the world and across different verticals highlights the need for Fortinet’s security-driven networking approach to SD-WAN” said John Maddison, EVP of Products and CMO at Fortinet. “Customers continue to recognize the importance of integrated security and SD-WAN as they select Fortinet’s Secure SD-WAN solution to reduce complexity and enhance their organization’s security posture. As a leading SD-WAN vendor, Fortinet empowers organizations to achieve optimal user experience, visibility, and security at their WAN edge to enable digital innovation.”

Fortinet delivers full-featured SD-WAN via the FortiGate next-generation firewall, and today Fortinet Secure SD-WAN has emerged as one of the top solutions on the market to support enterprises in their pursuit of reducing WAN complexity and cost while enhancing application experience and security. To support large enterprises, Fortinet Secure SD-WAN is able to scale to up to 100,000 SD-WAN sites thanks to Fortinet’s 20-year investment in building single-pane-of-glass management, which can now support the most demanding use cases for both security and SD-WAN.

Fortinet received the highest score for the “Security-Sensitive WAN” use case and scored in the top third for all remaining WAN Edge use cases in the November 2019 Gartner analyst research report, “Critical Capabilities for WAN Edge Infrastructure.” “Gartner recommends that users consider the set of critical capabilities as some of the most important criteria for WAN Edge solution acquisition decisions.” Fortinet believes these results further highlight its focus on Secure SD-WAN innovation.

Customer Validation of Fortinet Secure SD-WAN

Today, over 21,000 companies of all sizes and verticals worldwide, including some of the largest service providers, have chosen Fortinet Secure SD-WAN to achieve the following business benefits:

• Enable a Cloud-ready Branch: On-ramping branch offices and other remote locations to the cloud through Fortinet Secure SD-WAN enhances customers’ application experience and extends the cloud’s power, flexibility, and productivity gains to all users.

• Simplify Operations: By delivering advanced routing, SD-WAN and advance security in a single offering, Fortinet simplifies operations and allows for unified management. Zero-touch provisioning further reduces complexity and allows customers to deploy a new branch in minutes instead of weeks.

• Reduce Costs: Customers are able to consolidate point products into one enterprise-grade solution to significantly reduce capital costs. Augmenting MPLS with broadband reduces operational costs while a full stack of integrated security functions—including NGFW, IPS, anti-virus and anti-malware, web filtering, SSL inspection (including TLS 1.3), and sandboxing—ensures security without compromise and limits the potential costs related to a security breach.

Here’s what a number of Fortinet’s over 21,000 customers from around the world and within various industries have to say about Fortinet Secure SD-WAN:

 

“The ability to on-ramp our branch offices to the cloud through Fortinet Secure SD-WAN enables us to extend last mile optimization to all users. Fortinet Secure SD-WAN helped us improve user experience and effectively connect to our multi-cloud environment.”

-Dirk van Gelderen, Group Information Security Officer at De Heus Animal Nutrition

 

“SENATI is the largest technological higher education college in Peru and it’s important that our students are able to access the applications and resources needed to support their educational goals from any location. We chose Fortinet Secure SD-WAN because it not only enables our students to quickly access the resources they need, but also keeps them safe online. Fortinet Secure SD-WAN allows us to optimize and improve visibility of bandwidth usage with integrated software and hardware, helping us reduce costs. Working with Fortinet’s team made integration and migration easy and simple, and they have provided us with a solution that will safely grow with our institution throughout time with their security-first approach.”

-Willy Zamudio Núñez, Information Technology Manager at SENATI

 

“Fortinet Secure SD-WAN has provided The Paper Store with a secure, high-performing, scalable solution that allowed us to significantly improve our security posture and user experience for cloud and SaaS applications. The Paper Store currently has over 80 stores and 3,000 employees throughout the Northeast, and as we continue to expand, Fortinet Secure SD-WAN will help save time and money by enabling us to deploy new branch locations in minutes instead of months. Fortinet’s solution gives us the flexibility to integrate new services into our network without compromising performance or security.”

-Alex Fuchs, Director of IT at The Paper Store

Capillary Technologies Achieves AWS Retail Competency Status

Capillary Technologies, one of Asia’s leading consumer engagement and commerce product companies, announced today that it has achieved the Amazon Web Services (AWS) Retail Competencystatus.

AWS Retail Competency Partners have demonstrated success in offering end-to-end solutions across Customer Engagement, Supply Chain and Distribution, Physical, Digital, and Virtual Store, Advanced Retail Data Science, Core Retail Business Applications, and Consulting Practices for Retail on AWS. 

AWS Retail Competency Partners undergo rigorous validation by AWS to ensure alignment to AWS best practices for building secure, high-performing, resilient, and efficient cloud infrastructure for industry applications – to give customers an increased confidence when making decisions. 

Achieving the AWS Retail Competency differentiates Capillary Technologies as an AWS Partner Network (APN) member that delivers highly specialized technical proficiency for Retail. To receive the AWS Competency designation, APN Partners must possess deep AWS expertise and deliver solutions seamlessly on AWS

Capillary Technologies, has completed 10 years with AWS and has grown 50% year over year since then. The company was launched on AWS and over the years has invested in R&D by building AI-powered Omnichannel Customer Engagement and enterprise-ready eCommerce solutions for connected experience. 

Talking about the AWS Retail Competency, Capillary Technologies’ Chief Technology Officer, Pravanjan Choudhury, said, “Capillary has driven growth through two primary strategies; continuous innovation and geographical expansion. AWS has been a pillar of support in achieving these results. Their constant updates and presence across the globe have helped our customers to implement our solutions globally easier and faster. Today, Capillary Technologies can stand out as an innovative company and offer innovative solutions to our clients such as integration of behavioral events on CRM, Offline clickstreams with data from offline retail stores, and more, and we are happy to share this success with AWS.” 

“Many retailers are reinventing their operations and brand experience with new innovations in the cloud,” said Tom Litchford, Head of Retail Business Development, Amazon Web Services, Inc. “We are delighted to welcome Capillary Technologies to the AWS Retail Competency Program. Their solutions for retail operations, powered and vetted by AWS, can help our customers to accelerate their transformation, modernization, and customer engagement efforts.”

In their journey to become a SaaS leader, Capillary Technologies believes the vast capabilities of AWS have pushed them to explore deeper and come up with innovative products. Some of the key benefits that they have been able to power through AWS in the last few years are:

•                Simplifies expansion to global markets: AWS’s global presence has allowed Capillary to offer our solutions in 30 countries in a short span of 10 years. 

•                Scaling while controlling costs: During peak shopping seasons or campaign periods, the traffic can be up to 50 times higher than usual fo retailers. Capillary has leveraged AWS solutions to stay resilient to this demand and be scale-ready for some of the largest retailers. The company has formed an AI/ML innovation lab dedicated to adding more AI capabilities to its products to enhance ROIs for their customers. Capillary has maintained an availability rate up to 99.97 percent despite a soaring customer base. 

•                Boosting Innovation: Capillary has also used Amazon Rekognition to drive an effective customer engagement solution powered by smart IoT sensors deployed in the stores. The technology captures information about visitors such as how much time they spend in a store or if they are a returning customer with products – VisitorMetrix and VisitorSense. Capillary is also experimenting with Amazon SageMaker to simplify the development and deployment of ML algorithms across its product portfolio. Leveraging the power of AWS has also reduced time to market for new products.

AWS is enabling scalable, flexible, and cost-effective solutions from startups to global enterprises. To support the seamless integration and deployment of these solutions, AWS established the AWS Competency Programto help customers identify Consulting and Technology APN Partners with deep industry experience and expertise.