86% Percent of Public Sector Decision Makers Believe their Organisations’ Productivity Depends on Network and Application Performance

Riverbed® today launched its expanded ‘Rethink Possible: Visibility and Network Performance – The Pillars of Business Success’ Study, focused on the public sector. The study revealed that 89% of IT decision makers (ITDMs) and 82% of business decision makers (BDMs) in the public sector believe productivity is reliant on effective network and application performance. In addition, three-quarters of those surveyed (72% ITDMs and 79% BDMs) agreed that visibility into IT performance is the key to driving business innovation and staff retention.

These and other findings in the study highlight the necessity for public sector organisations to have effective IT infrastructure in order to be successfully productive, innovative and drive their growth. These are key considerations given the critical challenges public sector organisations are facing to maintain infrastructure, policing, health, and political balance in today’s environment.

Poor visibility and outdated systems proving to be a hindrance

Decision makers within the public sector recognise that improved visibility into network and application performance will have a direct, positive impact on their organisations’ development. In fact, over three-quarters of ITDMs (77%) think that having more visibility into their organisation’s systems will help to mitigate risk and ensure productivity. Both of which are essential factors in improving efficiency, driving employee engagement, and developing projects within public sector organisations. However, a clear conflict exists in the public sector between the visibility experienced by the IT teams and business decision makers. More than half of ITDMs (54%) state that they do not have enough visibility into the performance of their networks, applications, or infrastructure, compared to 76% of BDMs who believe IT has a comprehensive overview of applications. This disconnect may be why 75% of public sector leaders surveyed felt frustrated by their current network performance (74% of BDMs and 76% of ITDMs). Ensuring ITDMs and BDMs see eye-to-eye is paramount to helping them recognise the need for new technology that will improve visibility and performance, overcoming this frustration.

Productivity and organisational growth need the right IT infrastructure

As the recent global pandemic has shown, the public sector needs technology that evolves with the increasing demands placed on national services. In fact, over 90% of IT decision makers in the public sector believe future success hinges on their organisations’ ability to innovate and break boundaries. It is therefore encouraging to see that over 85% of both ITDMs (89%) and BDMs (86%) in the public sector believe there should be more investment in technology solutions that enhance overall IT visibility. With more than three quarters (78%) of public sector leaders agreeing that investment in next-generation technology is vital, organisations need to act quickly or they risk not only diminishing productivity levels from employees but also failing to keep up with customer needs and expectations.

Commenting on the research findings, Mena Migally, Senior Director, MENA at Riverbed, said: “Strong IT infrastructure is essential for any business but in the public sector – where ineffective systems cause major disruptions for national government departments, non-departmental public bodies such as the NHS, and service delivery – it is crucial. Especially during these unprecedented times, it is really positive to see that both IT and business decision makers in the public sector recognise the need to invest in the right technology to optimise their IT infrastructure – for both employees in the office and those working remotely – and successfully achieve business growth, now and in the future.

Migally, continued, “At Riverbed, we want to encourage public sector leaders to work together in order to identify and overcome the IT challenges they may be facing, from the lack of visibility, to poor network performance and inefficiencies due to outdated infrastructure. We fundamentally believe that in finding a solution to these problems, ITDMs and BDMs can unlock the capability to evolve their business, drive innovation, boost productivity and ultimately, achieve success in the public sector.”

Rethink Possible: Evolving the Digital Experience

Over 80% of all public sector leaders (87% of ITDMs and 81% of BDMs) agree that organisations must rethink what is possible to gain true success in today’s fast-moving world. Technology has to be the enabler in the process. Riverbed’s portfolio of next-generation solutions is giving customers in the public sector across the globe the visibility, acceleration, optimisation and connectivity that maximizes performance and visibility for networks and applications.

To find out more, download the full ‘Rethink Possible: Visibility and Network Performance – The Pillars of Business Success’ report by visiting here, and join in the conversation here.

Natural New Zealand water source and Executive Property with Equestrian facilities promoted by Courtney & Co.

Courtney & Co., a well-respected Real Estate Company based in Auckland, New Zealand, appoints Coral Coast PR as their official PR agency for the GCC market to promote a very exclusive offering for overseas investors looking to purchase a unique equine property, with a massive natural underground pH9 Mineral Water source in Auckland.

The property is 15 acres set up for horses, both for Equestrian activities and Racing. There is a current income from a tenanted dwelling that accommodates a hair salon, beauty spa, nail spa, Chinese massage and a quality three-bedroom apartment penthouse.

Complementing this fabulous property is a four-bedroom executive family home. Including a pool, games room, garaging and spa. Together with a large barn, out buildings, stable, there are two massive equestrian arenas, training track, horse walker, the grazing paddocks are kept in park like condition.

According to Courtney Wood, CEO of Courtney & CO., this unique offering comes with a large annual volume take, of 100% Natural High Alkaline Mineral Water pH9, that comes from a deep underground sustainable Aquifer providing this incredibly healthy and pure drinking water. This water source is one of only ten natural sources with a bottling consent in the Auckland region.

The naturally energized water sourced at the Riverhead property is super hydrating and offers revitalizing cellular health for humans and animals alike. The property has Auckland Council resource consent to construct a factory, abstract the water, and bottle at source, creating a lucrative export opportunity.

Located three minutes to the North West Motorway, 35 minutes to Auckland CBD and International Airport (Emirates 3 weekly direct flights). The property is perfectly positioned for a large volume water business to be established with possible future land subdivision potential. An 18-hole golf course is on the properties back boundary, with exclusive membership.

Coral Coast PR is proud to be the publicity partner to bring this offering to you. The chance to purchase your own exclusive Natural Water source in New Zealand, with considerable export potential, with all additional attributes, is now.

More information for the property and water business opportunities can be discussed further with the PR team at Coral Coast PR.

Email: shereen@coralcoastpr.com

Mobile: +971 50 769 0087

By: Claude Schuck, Regional Manager, Middle East at Veeam

Over the last few months, we’ve seen many organizations in Saudi Arabia have arranged for employees to work from home. Living in the golden age of Digital Transformation means that we are connected at all times. Consequently, the workplace today has evolved significantly to allow individuals to communicate seamlessly and connect from anywhere through mobile devices, digital tools, cloud services and many more. But what does this mean for organizations and the protection of its data?

With many employees working from home, businesses can expect a huge spike of personal file storing coming in from external sources. This is the perfect opportunity for malicious malware to make their way into servers, potentially corrupting a network of data.

Here are some of the necessary steps businesses should be taking to protect their data and IT architecture:

3 layers in the circle of defense

Businesses need to be aware of how they manage data between cloud and consider tools that will give them an advantage. Today, businesses are continuously backing up and replicating applications and we can only expect this to increase over the next few years as others learn the significance of data that are easily recoverable.

They need to understand the different roles that are needed for consideration when optimizing their systems for backup and replication. This can be easily summed up into the 3 layers of defense in data protection.

  • Perimeter: Firstly, businesses must consider the situation at hand – in this instance, it is remote working or working from home. Protection must be made available for employees to be able to access the cloud and in turn, ensure that these data can be backed up.
  • Mid: Next, businesses need to note that with an increase in the number of people working from home, measures must be put in place so that the systems are still able to run smoothly and efficiently. To counter this, it is highly recommended that servers be optimized for different groups of networks to tap into.
  • Base: It goes without saying that having more people accessing the servers from an external network will also result in an increase in the number of personal files coming in. Businesses need to ensure that they are able to mitigate any malware that might make its way through.

 Data backup and protection

There are many unforeseen circumstances that businesses need to prepare for. Therefore, it is important for them be highly adaptable. Having data that is easily accessible is part of the solution to be ready for remote working. Over the next few years, businesses can expect to see an increase in the number of tools that can allow them to continuously back up their data and perform recovery in a matter of minutes. With these tools, they will be insured with more than just backed up data – they will also have access to insights that will allow them to make informed decisions in their digital transformation journey.

Apart from that, it is also important for businesses to protect their data – as seen with the recent increase of data breach. Cloud Data Management is expected to see an increase in mobility and portability over the next few years. With added security measures, businesses will have access to data easily outside of their workplace with a peace of mind.

Prevention of cyberattacks

One of the essential steps businesses need to take is to minimize administrative access to platforms and servers and increasing rules of operation. Not everyone needs to be able to access all the systems in place.

It is also vital for organizations to educate their employees – often, ransomware finds its way through a system because of an individual’s mistake. It is important for businesses to remind employees on best practices, especially in times when telecommuting is an option for everyone. They need to understand that being connected to a network outside of the company’s system exposes the servers to potential malware.

To sum it all up, businesses in Saudi need to always prepare ahead for any disruption that might have an impact in the way they work. Especially in an era where remote working is a step forward, organizations need to ensure that their systems are ready and fully protected so that their employees can remain efficient and productive.

 

Age of Uncertainty drives the need for a dynamic Startup Studio to build a UAE entrepreneurship ecosystem

Innovating and Scaling in the Age of Uncertainty drives the need for a dynamic Startup Studio

To bring together innovative and forward-thinking visionaries to build an entrepreneurship ecosystem in the UAE that engages not only entrepreneurs but also decision makers and encourages startups to aim higher in terms of visibility and impact on the global stage, Strategi Advisors initiates their startup arm, the Strategi Startup Studio.

With an abundance in Risk Capital in the UAE and startup scalability being the new heaven for investments diversification, Investors at all levels like HNI, family offices, shares and crowd-funding see great potential in technology especially post COVID-19 but need guidance in paring up with an innovator with similar passion and vision.

Mana Sultan Al Suwaidi, Founder of Strategi Startup Studio said, “The need for an evolving Startup Studio was evident way before COVID-19 but the recent crises strongly drive a larger force towards technology infrastructure and efficiency in all areas of business. We believe that successful businesses emerge when great ideas and entrepreneurs come together in a creative and nurturing environment to bring new concepts to life.”

Strategi Startup Studio conceives, launches and scales local and international startups bringing innovative ventures to the city. Supported by Strategi Advisors that already has dedicated experts on board to cultivate a world class tech driven ecosystem, stakeholders can benefit from the team’s local know how, get clarity and be inspired to transform their businesses with the best global talent and capital.

Mana adds, “We hope to build ventures with success stories for unicorns created in the UAE making local, regional and international impact. Experts from Strategi Advisors will represent, support, and protect the growth of the startup business community with world-class expertise in every discipline required to build a market-leading company. Our objective is to collaborate with the most experienced and trusted partners to give direction to high growth startup entrepreneurs by listening, reflecting and guiding them.”

Offering requirements of a conducive Tech Ecosystem with capital, talent, Infrastructure, market potential and supportive regulations, Strategi Startup Studio aims to make Dubai a thriving global startup hub by working in synergy with the local government, incubators and accelerators.

According to Mana, UAE is ready to create its own hub for building businesses and the young generation is ready for this. Coming from a pedigree of Emiratis keen on cultivating the vision and framework of leadership, entrepreneurship and “glocalization”, Mana and his peers aspire to demonstrate an advanced level of ecosystem development, characterized by cross-border venture building capabilities.

In the last four months, Strategi Startup Studio has been in investment discussions with a sovereign fund in Abu Dhabi and other regional venture capital investors to invest USD50 millions for exchange of equity in startups in the next five years.

To investors, UAE’s strategic positioning as a vibrant hub for trade, finance, media, tourism, hospitality, talent and technology offers great potential for investment opportunities across multiple sectors as 60% of humanity exists within a 5-hour flying radius of UAE (China, India, Europe, Russia and North Africa).

While neighbouring countries are competing as conventional economies, UAE is evolving into a knowledge economy offering the perfect platform to connect startups, investors and enablers with relevant resources, accessibility and opportunities and Strategi Startup Studio is the first step towards building an ecosystem that rivals entrepreneurial hubs like the Silicon Valley.

Today more than ever companies need a forward-thinking strategy with new set of tools and frameworks to navigate through uncertainty and stay relevant. Strategi Startup Studio aims to do just that and guide businesses to think and act differently as well as gain leverage as ecosystems gain relevance to impact economies in a meaningful way.

TLS/ SSL Decryption – One of the Main Pillars of Zero Trust Model

Adil Baghir Photo

By: Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks

In a world where everything and everyone is connected to the internet, in one way or another, it’s hard to imagine a network that is truly secure. Data, large amounts of it, are at the centre of it all. With industries from healthcare to the education sector to the government using the internet to provide easy access to data, it is no wonder that cybersecurity teams are always working around the clock to try and come up with better ways of defending these networks and the data they store.

Insider Threats – Need for Security to Evolve from “Castle and Moat” Approach

Modern cyberattacks are not limited to just network intrusion from the outside. Internal threat actors can often be found at the centre of sophisticated attacks.

Initially, we had the concept of zones, perimeters and network segments – placing all the protected assets “inside” the secured network perimeter. However, attackers are always evolving the methods they use; always on the lookout for weak points in your network defences; and coming up with newer ways of infiltrating the perimeter. Keeping up with them is a challenging and ongoing struggle. We also need to realize that the “castle and moat” approach to our network defences was mostly effective against threats that resided outside the network. But what about the threats on the inside? What about modern attacks that work on multiple levels to try to bring your networks down? How do we protect our networks from people who have legitimate access to all its resources? How do we battle the ever-growing and ever-evolving modern cyberattacks? Add to these questions, regulations like GDPR, and the rising fines, and you will see that having your networks attacked and data breached is one of the worst things that can happen to your company. With these issues as the backdrop, we are forced to re-assess and re-think the way we defend our networks, users and data.

Zero Trust Model – a Modern Cybersecurity Approach

Zero Trust attempts to fix the problems, and patch the holes, in our cybersecurity strategies. At the core of it, the Zero Trust model is based on the principal of “trust nobody.” The Zero Trust model dictates that no one in your network should be trusted completely, that access should be restricted as much as possible, and that trust should be seen as yet another vulnerability that can put your network at risk.

Some of the precepts of the Zero Trust model are:

  • Networks need to be redesigned in a way that east-west traffic and access can be restricted.
  • Incident detection and response should be facilitated and improved using comprehensive analytics and automation solutions, as well as centralized management and visibility into the network, data, workloads, users and devices used.
  • Access should be restricted as much as possible, limiting excessive privileges for all users.
  • In multi-vendor networks, all solutions should integrate and work together seamlessly, enabling compliance and unified security. The solutions should also be easy to use so that additional complexity can be removed.

Danger of Security Blind Spots

In recent times, we have witnessed a phenomenal rise in the use of encryption across the internet. Google reports that over 90 percent of the traffic passing through its services is encrypted. The same is true for all the other vendors. This rise has been driven by many factors, including privacy concerns.

However, with encryption comes the creation of a “blind spot” in our network defences as most of the security devices we use are not designed to decrypt and inspect traffic. The Zero Trust model is not immune to this problem as visibility is considered as one of the key elements to its successful implementation. Without complete encrypted traffic visibility, the model will fail, introducing vulnerabilities that can be exploited by both insiders and hackers.

TLS/SSL Decryption – One of the Main Pillars of Zero Trust

A centralized and dedicated decryption solution must be placed at the centre of the Zero Trust model and should be included as one of the essential components your security strategy.

Many security vendors will make claims of the ability to decrypt their own traffic, working independently of a centralized decryption solution. However, this “distributed decryption” approach can introduce problems of its own, including inferior performance and network bottlenecks, and fixing these would require costly upgrades. In a multi-vendor, multidevice security infrastructure, the distributed decryption also forces you to deploy your private keys in multiple locations, creating an unnecessarily large threat surface in your network, which could be subject to exploitation.

Key features of a good TLS/ SSL Decryption Solution

It is important that a dedicated, centralized decryption solution provides full visibility to the enterprise security infrastructure for TLS/SSL traffic. Not only that, but the solution also needs to provide a multi-layered security approach, which then makes it the perfect candidate to be deployed at the centre of a Zero Trust network.

Below are some of the features to look out for when looking to implement a TLS/ SSL Decryption Solution:

  • Full Traffic Visibility – It needs to enable the entire security infrastructure to inspect all traffic in clear-text, at fast speeds, ensuring that no encrypted attacks or data breaches can slip through
  • Ease of Integration – It should be vendor agnostic and easily integrate with security devices already deployed within the network. This drives down additional costs and upgrades.
  • Multi-Layered Security Services – These are additional security services, including URL filtering, application visibility and control, threat intelligence and threat investigation, that help strengthen the security efficacy of the entire enterprise network
  • User Access Control – The product should be able to enforce authentication and authorization policies to restrict unneeded access, log access information and provide the ability to apply different security policies based on user and group IDs.
  • Micro Segmentation – It should facilitate micro-segmentation through its ability to provide granular traffic control, user and group ID-based traffic control, and support for multi-tenancy
  • Securing Cloud Access – SaaS security is an important feature which can be provided by enforcing tenant access control and visibility into user activities.

In conclusion, without a centralized and dedicated TLS/SSL decryption solution, the Zero Trust model is unable to do what it was designed to do – protect our networks, users and data from threats residing inside and outside the network.

 

Kodak Alaris Announces 2020 Partner of the Year Award Winners for EMEA Region

Kodak Alaris has recognised eight partners from the Europe, Africa and Middle East region (EMEA) in its annual Partner of the Year awards. The awards are an integral part of the global information capture leader’s annual Partner Summit, which this year was held as a virtual event due to the COVID-19 pandemic.

The Kodak Alaris Partner Awards acknowledge partners who have demonstrated excellent growth, engagement, innovation, and implementation of customer-centric solutions based on Kodak Alaris’ technology and services portfolio. The finalists and winners were chosen based on their commitment to customers, investment in solutions from Kodak Alaris, year on year revenue and growth trajectory, as well as successful joint wins over the past year.

“Kodak Alaris has a market-leading partner network and I am delighted to formally recognise our highest performing partners who continue to deliver added value to our joint customers, helping them to transform their and their clients’ businesses,” said Gerry Kelliher, Managing Director, EMEA Region, Alaris division of Kodak Alaris. “This year’s winners stand out by delivering the expertise organisations need to automate business processes, to maximise productivity and drive growth in increasingly complex business environments.”

Kodak Alaris Virtual Partner Summit 1

Spigraph, Benelux was named Top Value Added Distributor; the company has collaborated closely with the Kodak Alaris sales team and continued to drive high market share in the region. “To be awarded as Top Value Added Distributor of the year is a great recognition of all our joint efforts to drive profitable growth through the region,” said Koen Beeuwsaert, Vice President Sales, Northern Europe, Spigraph. “The unique ecosystem built between our reseller community, Spigraph and Kodak Alaris is offering tremendous value to end users that are in the middle of their Digital Transformation.”

Having delivered significant revenue growth in FY20, long-standing partner ALOS, one of the leading system providers of capture and Enterprise Content Management solutions in German-speaking countries, secured the Top Performing Partner accolade. The Top Solutions Provider award category which recognises partners’ success in developing solutions capability around Kodak Alaris’ complete hardware, software and services offering, was won by e-das, Germany. “We have been a partner of Kodak Alaris now for over 20 years,” said e-das CEO Helmut Geilenkeuser. “We have a fantastic working relationship and many successful projects. A good relationship is important but not everything. Brilliant products like the scanner range from Kodak Alaris as well as the software and service offerings make the total package complete.”

Pitney Bowes UK scooped the Top Strategic Partner award. The partnership between the two companies is a relatively new one. Pitney Bowes has very quickly integrated Kodak Alaris into its solutions portfolio, rapidly growing the business and is driving new opportunities, particularly within the digital mailroom. In the service category, Restore Digital UK won the 2020 Service Partner ‘Large Deal’ award, and the Service Partner ‘Loyalty’ award was presented to ScanfabrikTM KG.

A Special Award went to Wietec in Israel celebrating its successes over the past 12 months, most notably winning three major tenders to deliver election solutions despite tough competition. And Dubai-based distributor Rookie Ninja, was the first recipient of the Service Partner ‘Start-up’ award which was designed to recognise a partner that has built a successful service business from scratch. “We are proud and humbled to receive this award from Kodak Alaris for our Services,” said Shashank Patel, Managing Director, Rookie Ninja. “Kodak Alaris believes in delivering industry leading service to its clients globally and it feels great to be the torch bearer for the same in this region.”

To learn more about the Kodak Alaris Partner Programme, please click here.

SUNREEF 70: A FUTURE CLASSIC

The Sunreef 70 joins Sunreef Yachts range of exclusive sail catamarans. With outstanding living spaces, Sunreef Yachts’ latest model balances extreme comfort, great performance under sail and advanced technology. A fully-customizable craft, she offers an infinite variety of layouts and décors.

Named Ocean Vibes, the first launch of the Sunreef 70 features a spacious 5 cabin layout, a vast flybridge and a bow terrace accessed directly from the main saloon. Equipped with a hydraulic aft platform, the yacht’s generous stern cockpit uses the yacht’s entire 10.8m beam to provide for supreme comfort and perfect conditions for watersports.

The Sunreef 70 now joins Sunreef Yachts’ sail catamaran range, alongside the Sunreef 50Sunreef 60, and Sunreef 80. For more information about the Sunreef 70, feel free to get in touch with the team.

IKK Group Replaces Legacy Backup Solution with Veeam, Fueling Accelerated and Cost-Effective Business Operations

Veeam® Software, the leader in Backup solutions that deliver Cloud Data Management™, today announced that the Issam Khairy Kabbani Group of Companies (IKK Group) in Saudi Arabia has implemented Veeam® Availability Suite™ and Veeam® ONE™ in order to guarantee uptime of services for all users and customers. Veeam’s solutions have increased efficiency of the system engineers, enabling them to focus on enhancements and improvements, besides proving 30% more cost effective than the legacy solution. The introduction of the ‘instant recovery’ feature has cut restore time from days to a few hours.

IKK Group which started operations in Saudi Arabia in the 1970s is a diversified group in terms of products, services, and geography operating in the field of trading, manufacturing and contracting. Today, some 14,000 staff work in 42 independent IKK Group companies, spread over many divisions, branches, and outlets in more than ten countries. The Group’s showrooms, sales offices, factories and R&D offices can be found across the MENA region.

The IKK Group operates a centralized IT department that oversees technology services for all IKK Group lines of business. One of the key concerns of this central IT team is to guarantee uptime of services for all users and customers. “If our data is compromised, or if our services are unavailable, a tremendous number of users and end customers are impacted,” said Ayman Mansour, IT Infrastructure Department Manager, IKK Group. “Service downtime translates to a direct loss of productivity and business.”

With lack of prompt support, rising errors and system incidents, the IKK Group’s legacy backup solution presented a significant business risk.

“Besides a solution that could meet our technical requirements, we needed better support and communications from the vendor itself,” Mansour explained. “Going through partners and facing long delays was no longer viable for us.”

After careful market analysis, the IKK Group selected Veeam Availability Suite to address the technology and support shortcomings it was facing.

The financial benefits were evident immediately. Veeam’s innovative licensing model which bases fees on number of sockets as opposed to terabytes (TB), proved to be 30% more cost-effective than IKK Group’s previous legacy backup solution. Further resource savings have been made possible by Veeam ONE (part of Veeam Availability Suite), which provides the centralized IT team with comprehensive monitoring and analytics for their virtual and physical environments. This has enabled IKK Group to optimize resource planning and maximize utilizations of existing investments as they scale their IT infrastructure.

By reducing backup and recovery process time, errors and issues, Veeam’s solutions enable the IKK Group’s IT team to invest efforts and time into enhancement projects that deliver major business benefits. This includes implementing production and backup data security best practices and access control strengthening to mitigate the threat of malware and cyber risks.

With Veeam’s Instant VM Recovery, large terabyte sized VM servers which used to take days to recover are now done in just a few hours, while services are restored in a few minutes in some cases. This delivers a seamless experience for thousands of users, across the Group’s entities, who rely on the availability of data and services to carry out their job functions.

Equally beneficial has been the relationship that the IKK Group’s IT team shares with Veeam. From their very first engagement, the commitment and expertise of Veeam’s regional team was evident to IKK Group’s centralized IT team, who appreciated the vendor’s ability to deliver dependable, 24/7 support.

“With Veeam, it isn’t just their solutions but also their support that can boost customer satisfaction – you get 24/7 support for incidents whenever needed. If we had to rate Veeam’s regional support, it would be 5-star service most of the time. Today, Veeam is one of the pillars of our service availability and business continuity strategy. If the corporate management decides to establish a DR site, we shall use it an opportunity to extend our relationship with this reliable technology provider,” Mansour said.

“Ensuring data availability and protection is not only essential to business continuity, but also to maintaining competitive advantage, maintaining brand reputation and complying with regulations. As IKK Group transforms its digital infrastructure, we are proud to have been able to provide world class backup and recovery technology that helps deliver secure and uninterrupted digital services and experiences to the Group’s employees, vendors and customers,” concluded Claude Schuck, Regional Manager, Middle East at Veeam.