Network ‘As A Service’ Adoption to Grow by 38% in the Next One to Two Years in UAE

In response to the pandemic, IT leaders in EMEA are now investing more in cloud-based and AI-powered networking technologies as business recovery plans take shape, according to research from  Aruba, a Hewlett Packard Enterprise company.

The findings in a new global report ‘ Preparing for the post-pandemic workplace’ suggested that IT leaders are responding to the challenges associated with enabling a highly distributed workforce and the emergence of the hybrid workplace – with people needing to move seamlessly between working on campus, at home and on the road – and as such are looking to evolve their network infrastructure and shift away from CapEx investments towards solutions consumed ‘as a service’.

The average proportion of IT services consumed via subscription in the UAE will accelerate by 49% in the next two years, from 39% of the total today to 58% in 2022, and the share of organizations that consume a majority (over 50%) of their IT solutions ‘as a service’ will increase by approximately 56% in that time.

“The emergence of the hybrid workplace is pushing IT leaders to deliver a delicate balance between flexibility, security and affordability at the edge,” said Jacob Chacko, Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba. “The workplace as we knew it has significantly changed and to support new norms such as social distancing and contactless experiences, office locations need to have the right technology in place to offer enterprise-level connectivity, security and support. All this must be done in an increasingly challenging financial environment which is spurring the trend for IT decision-makers to opt for the reduced risk and cost advantages offered by a subscription model.”

The report, which surveyed 2400 ITDMs in over 20 countries including the UAE and eight key industries, looked at how they have responded to IT and business demands in the wake of COVID-19, what investment decisions are being made as a result, and the consumption models now being considered. A number of key findings stood out:

IMPACT OF COVID-19 HAS SIGNIFICANT IMPLICATIONS

ITDMs report that the impact of COVID-19 has been significant both on their employees and short-term network investments:

  • In the UAE, 25% describing the impact on their employees as ‘significant’ (widespread furlough or layoffs), while 43% considered it ‘moderate’ (temporary reductions in some functions), and 23% ‘low’ (very few jobs impacted).
  • In EMEA, Russia (27%), UAE (25%), Sweden and France (both 24%) ranked highest in terms of ‘significant’ impact with Spain (13%) and The Netherlands (15%) significantly lower.
  • 86% of organizations in the UAE said that investments in networking projects had been postponed or delayed since the onset of COVID-19, and 31% indicated that projects had been cancelled altogether.
  • Project cancellations were highest in Sweden (59%) and lowest in Italy (11%), project showing there are also significant disparities between countries within the same region, while 37% of ITDMs in education and 35% in hotels and hospitality globally said they have had to cancel network investments.

A POSITIVE OUTLOOK: INVESTING FOR EMERGING NEEDS

By contrast, future plans are aggressive, with the vast majority of ITDMs planning to maintain or increase their networking investments in light of COVID-19, as they work to support the new needs of employees and customers.

  • 38% of ITDM’s globally plan to increase their investment in cloud-based networking, with 45% maintaining the same level and 15% scaling back. The APAC region was the global leader with 45% stating increased investment in cloud-based networking compared to 32% in EMEA, and 38% in UAE and rising to 59% among ITDMs in India. With cloud solutions allowing for remote network management at large scale, these capabilities are particularly enticing for IT teams when being on-premises is not possible or challenging.
  • ITDMs are also seeking improved tools for network monitoring and insight, with 34% globally planning to increase their investment in analytics and assurance, 48% indicating that they will maintain their level of investment and 15% reducing it. This allows IT organizations to troubleshoot and fine-tune the network more efficiently, as demands on it are augmented by a distributed workforce. 
  • There is also an emphasis on innovative technologies that simplify the lives of IT teams by automating repetitive tasks. We found 35% of ITDMs globally are planning to increase their investment in AI-based networking technologies, with the APAC region leading the charge at 44% and EMEA and the Americas both on 30%.

ADOPTION OF NEW CONSUMPTION MODELS IS ACCELERATING

As ITDMs shape their investment plans, they are looking at alternative modes of consumption to achieve the best balance of value and flexibility.

  • 62% in UAE say they will explore new subscription models for hardware and/or software, 58% managed services for turnkey hardware/software and 41% financial leasing – all as a result of the impact of COVID-19. This reflects the increased need for more financially flexible models in a challenging environment.
  • Networking subscription models are more popular in APAC (61%) than in the Americas (52%) or EMEA (50%), and at a country level the highest demands are in Turkey (73%), India (70%) and China (65%).
  • The global industries most likely to be considering the subscription model are hotels/hospitality (66%), IT, technology, and telecom (58%) and education (57%). The impact of COVID-19 on IT behavior has made the desire for flexibility and predictability in spending, while reducing risk from initial capital costs, greater than before.
  • In stark contrast, just 8% globally plan to continue with only CapEx investments, though the proportion is higher in the Netherlands (20%), US (17%), Spain (16%) and France (15%). Across industries, 15% in retail, distribution and transport will continue to focus solely on CapEx investments, versus just 5% in education and IT, tech, and telecoms, and 2% in hotels and hospitality.

“Customers and employee needs have changed so comprehensively in recent months, it’s no surprise to see IT leaders seeking more flexible solutions,” says Chacko. “The need for agility and flexibility in network management is greater than ever and it is now mission critical to ensure that businesses reduce complexity in the network to ensure the secure and seamless experience that users demand.”

“The pandemic has caused many organisations to rethink their IT infrastructure investment to build business models that are agile, adaptable and fit for purpose. While there may have been an initial negative impact on ongoing projects, it is encouraging to see that there are firm medium term plans in place to invest in advancing network technologies enabled by more flexible models of consumption that limit up-front capital demands,” he said.

SASE is All About Delivering Security Everywhere

By John Maddison, EVP of Products and CMO at Fortinet.

Secure Access Service Edge (SASE) is an emerging enterprise strategy that incorporates multiple solutions to enable secure remote access to on-premises, cloud-based, and online resources. Unfortunately, there has been a lot of hype that has left some organizations wondering what exactly SASE is. Understanding the basic concepts and components of SASE is important, as the benefits can be significant for many organizations. Fortunately, getting to the bottom of this is easy, as many of the fundamentals of SASE – such as bringing networking and security together– are trends that customers have been gravitating to for years. However, it is still critical to properly define SASE up front in order to avoid adding complexity or worse, missing the true value of SASE at all.

Security Everywhere

Today’s organizations require immediate, uninterrupted access to the network and cloud-based resources and data, including business-critical applications, no matter where their users are located. The reality is that consumption patterns are changing due to the implementation of 5G, cloud migrations, sustained work from home, and similar outcomes from digital innovation efforts. This has transformed the traditional network to a network of many edges.

At the same time, these dynamically changing network configurations, and the rapid expansion of the attack surface, means that many traditional security solutions no longer provide the level of protection and access control that organizations and users require. In this environment, security has to be delivered anywhere from any place, at any time, and for any device – the WAN Edge, Cloud Edge, DC Edge, Core Network Edge, Branch Edge, and Mobile Remote Worker Edge. This requires the convergence of traditional and cloud-based security, as well as deep integration between security and fundamental networking elements.

Accurately Defining SASE

SASE is designed to help organizations secure these new distributed networks. However, as with any emerging technology category, there is still some uncertainty about what precisely a SASE solution means—and what technologies are included. In addition, vendors are attempting to redefine this market in ways that best reflect their current offerings – which means that some elements are being overemphasized and others, often essential elements get overlooked. Unfortunately, some market definitions of SASE already include important omissions that are leaving some organizations confused about how to best select, implement, and manage the right sort of solution for their unique environments.

Not Just Cloud

SASE is generally classified as a cloud-delivered service, providing secure access to cloud-based resources, secure communications between remote users, and always-on security for devices off-premises. However, there are situations where organizations may require a combination of physical and cloud-based solutions for SASE to work effectively. This may include supporting a physical SD-WAN solution in place that already contains a full stack of security, or the desire to provide protection at the edge when processing confidential or sensitive information rather than shuttling it out to the cloud for inspection.

By combining physical and cloud-based elements, the role of SASE can also be easily extended deep into the network, rather than simply handing off security to an entirely different system at the edge. This ensures that a secure SASE connection is seamlessly integrated with critical solutions that also rely on hardware, such as network segmentation and compliance requirements that a strictly cloud-based security approach can’t address, to provide end-to-end protection.

Secure LAN and WAN

Some SASE definitions also omit things like Secure LAN and Secure WLAN that are essential considerations for many organizations. Including these sorts of technologies in a SASE solution helps ensure that security is applied consistently across an entire security architecture, rather than deploying separate security components for their SASE deployment – which could create gaps in security policy enforcement and limit visibility. 

Flexible Consumption

But regardless of which tools are used or where they are deployed, there is a central issue that needs to be remembered. Every SASE solution must not only meet the access needs of today, but also have the capability to quickly adapt to rapidly evolving network changes and business requirements as they occur. This explains a key criteria for SASE, which is flexible consumption models that give organizations choices depending on their unique use-cases in order to achieve the true vision of SASE.

Essential Security Elements Defined

Any true SASE solution must include a core set of essential security elements. To realize the full potential of a SASE deployment, organizations must understand and implement these security components across the WAN-edge, LAN-edge, and Cloud-edge. 

  • A fully functional, SD-WAN solution. SASE starts with an SD-WAN solution that includes such things as dynamic path selection, self-healing WAN capabilities, and consistent application and user experience for business applications. 
  • • An NGFW (physical) or FWaaS (cloud-based) firewall. SASE also needs to include a full stack of security that spans both physical and cloud-based scenarios. For example, remote workers require a combination of cloud-based security for accessing resources located online, and physical security and internal segmentation to prevent network users from accessing restricted corporate network resources. However, physical hardware and cloud-native security need to deliver the same high performance at scale, enabling maximum flexibility and security.   
  • Zero-trust Network Access. It is primarily used to identify users and devices and authenticate them to applications. Because ZTNA is more of a strategy than a product, it includes several technologies working together, starting with multi-factor authentication (MFA) to identify all users. On the physical side, ZTNA should include secure network access control (NAC), access policy enforcement, and integration with dynamic network segmentation to limit access to networked resources. And on the cloud side, ZTNA needs to support things like microsegmentation with traffic inspection for secure East-West communications between users, and always-on security for devices both on and off-network. 
  • A Secure Web Gateway. It is used to protect users and devices from online security threats by enforcing internet security and compliance policies and filtering out malicious internet traffic. It can also enforce acceptable use policies for web access, ensure compliance with regulations, and prevent data leakage. 
  • A CASB. A cloud-based service enables organizations to take control of their SaaS applications, including securing application access and eliminating Shadow IT challenges. This needs to be combined with on-premises DLP to ensure comprehensive data loss prevention.

SASE – The Convergence of Networking and Security

At a high level, implementing SASE really comes down to enabling secure connectivity and access to critical resources from anywhere on any edge. Unfortunately, very few vendors can provide this because their portfolios are full of disparate, acquired products, or they simply don’t have enough breadth to provide all of the security elements that a robust SASE solution requires. And even when they do, their solutions simply do not interoperate well enough to be effective.

This is a problem, because for SASE to work well, all of its components need to interoperate as a single integrated system – connectivity, networking, and security elements alike. Which means every component needs to be designed to interoperate as part of an integrated strategy bound together by a single, centralized management and orchestration solution. They also need to seamlessly integrate with the larger corporate security framework, as well as dynamically adapt as networking environments evolve. If not, it’s not a true SASE solution.

The recent market momentum around SASE is exciting because it underscores the need for a Security-Driven Networking approach. In the era of cloud connectivity and digital innovation, networking and security must converge. There’s no going back to outmoded and siloed architectures. 

Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture

By: Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox

In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase in DDoS attacks in the first quarter of 2020 when compared with the last quarter of 2019. The NexusGuard research team also detected unusual traffic patterns from ISPs which included traffic generated from infected devices.

In rare harmony, Kaspersky also reported that DDoS attacks have doubled in the first quarter of 202 when compared to the last quarter of 2019[2]. Kaspersky also found that DDoS cyberattacks are increasing in duration – the average attack duration increased by 24% in the first quarter of 2020 compared with the same quarter one year ago.

DNS and DDoS attack vectors have emerged as one of the critical weapons of choice to support fraud, extortion, and malicious attack. Threat actors may be politically motivated, part of organized crime, or even nation-state cyberwarfare operatives. 

The COVID-19 pandemic was the genesis of this new opportunity as the disease continues to impact businesses and economies worldwide. The net result is that 2020 has become the year of the teleworker. The use of online services from home and other remote locations became more critical than ever. Students are online. Employees are serving customers online. Many of us are working from home and highly dependent on internet connectivity. The mix of devices we use often includes our laptops and mobile devices. Threat actors have moved with lightspeed to leverage this opportunity. 

But just when you thought it could not get worse, it does. DDoS for hire (otherwise known as “booter” services) allows threat actors to access thousands of pre-configured servers that can be used to launch DDoS assaults against any organization. Booters are web-based services that provide criminal DDoS services for hire. These tools are often referred to in polite conversation as IP stressors, which are legitimately used to test your networks and servers for resiliency. Certainly, stress testing your own network is normal. But deploying such technology to create a DDoS attack against external parties is illegal and malicious criminal activity. The great majority of these servers are hijacked, and malicious activity is usually completely unknown to their owners.

As you would expect, booters are sold on the dark web using untraceable currencies such as Bitcoin. An informal survey showed that you could “purchase” the use of a compromised server for between $10 to $150 or more. You get the passwords and access to the server. Some criminal enterprises sell access to the use of booters “as a service” and vary pricing by the number of attacks you wish to launch, the duration of the attacks, and even price out the addition of customer support! 

As quickly as law enforcement agencies can find them and shut them down, new ones still seem to spring up. The number of these servers for sale at times looks quite large, with many tens of thousands of hijacked servers accessible at meagre cost for a motivated attacker.

The DDoS attacks launched by these threat actor booter sites take us back to basics. As always, the mix of readily usable attack techniques includes DNS amplification and DNS reflection. They may be used alone and in combination. An amplification attack is a technique used by threat actors where a small query can trigger a massive response. In this scenario, threat actors flood the server with short requests that require long responses, allowing a small compute resource to overload the targeted DNS server. The DNS server is so busy attempting to respond to all these malicious requests that it doesn’t have time to respond to legitimate ones, and network activity grinds to a halt.

The reflection attack vector sends queries that appear to come from the target of the attack. The huge volume of responses, which are amplified, are then sent to the target effectively overwhelming the target. In this scenario, the attacker sends a query to a recursive name server with a spoofed source IP address. Instead of the real IP address, the threat actor places the target (victim) IP address as the source IP address. The recursive name server retrieves the answer to the query from the authoritative name server and sends it to the target.

A sophisticated threat actor can combine the two techniques by spoofing the targets’ IP address and sending a carefully crafted query that will result in a large payload. This double punch can be an overwhelming DNS DDoS attack scenario. This allows the threat actor to attack two different targets at the same time easily. 

Comprehensive and intelligent protection against DNS DDoS attacks should be an essential part of your cybersecurity architecture.


[1] https://www.businesswire.com/news/home/20200630005295/en/DDoS-Attacks-Increase-542-Quarter-over-Quarter-Pandemic-Nexusguard/

[2] https://securityintelligence.com/articles/avoid-ddos-attacks/

Cyber-attacks are the New Norm and Ransomware is on the Rise

By: Ehab Halablab, Regional Sales Director – Middle East at A10 Networks

Last year ransomware made a comeback, as worldwide mobile operators made aggressive strides in the transformation to 5G, and GDPR achieved its first full year of implementation. The industry saw some of the largest fines ever given for massive data breaches experienced by enterprises. As the spike in demand for ransomware-as-a-service tools in underground forums, coupled with the anonymity offered by the dark web, the surge in these types of cyberthreats should not be a surprise.

This year ransomware will continue to garner more international attention as a host of the not new, like the continued rash of DDoS attacks on government entities and cloud and gaming services, to the new and emerging.

Growth of ransomware

One reason for ransomware attacks gaining widespread popularity is because they now can be launched even against smaller players. Even a small amount of data can be used to hold an entire organisation, city or even country for ransom. The trend of attacks levied against global cities and governments will only continue to grow.

Below I can share three new strains of ransomware types introduced:

Modular or multi-levelled/layered ransomware and malware attacks will become the norm as this evasion technique becomes more prevalent. Modular attacks use multiple trojans and viruses to start the attack before the actual malware or ransomware is eventually downloaded and launched. 70 percent of all malware attacks will use encryption to evade security measures (encrypted malware attacks)

It is no surprise that cyber security skills gap will keep on widening. As a result, security teams will struggle with creating fool-proof policies and leveraging the full potential of their security investments.

Slow Adoption of new Encryption Standards

Although TLS 1.3 was ratified by the Internet Engineering Taskforce in August of 2018, we won’t see widespread or mainstream adoption: less than 10 percent of websites worldwide will start using TLS 1.3. TLS 1.2 will remain relevant, and therefore will remain the leading TLS version in use globally since it has not been compromised yet, it supports PFS, and the industry is generally slow when it comes to adopting new standards. Conversely, Elliptical-curve cryptology (ECC) ciphers will see more than 80 percent adoption as older ciphers, such as RSA ciphers, are disappearing.

Decryption: It’s not a Choice Any Longer

TLS decryption will become mainstream as more attacks leverage encryption for infection and data breaches. Since decryption remains a compute-intensive process, firewall performance degradation will remain higher than 50 percent and most enterprises will continue to overpay for SSL decryption due to lack of skills within the security teams. To mitigate firewall performance challenges and lack of skilled staff, enterprises will have to adopt dedicated decryption solutions as a more efficient option as next-generation firewalls (NGFWs) continue to polish their on-board decryption capabilities.

Cyber-attacks are now the new norm. Each year brings new threats, data breaches and operational challenges, ensuing that businesses, governments and consumers must always be on its toes. With the transformation to 5G mobile networks and the dramatic rise in IoT, by both consumers and businesses, the potential for massive and widespread cyber threats expands exponentially. Let’s hope that organizations, as well as security vendors, focus on better understanding the security needs of the industry, and invest in solutions and policies that would give them a better chance at defending against the ever-evolving cyber threat landscape.

Silicon Central is set to be the retail destination of choice for neighbouring communities

The shopping mall and management division of Abu Dhabi-based Lulu Group International, Line Investments & Property LLC (LIP) boasts an impressive portfolio of malls through the Gulf and India. Moreover, with a strategic vision for future growth and development across the GCC, LIP reiterates its position as a renowned industry leader in offering the right kind of support to make any brand a sure-fire winner as it introduces its retail project in Silicon Oasis.

LIP’s latest development is Silicon Central in Dubai, a three-level retail and leisure destination that will provide an enhanced shopping experience to its neighbouring communities.

With a total of 220 stores in 81,500m2, Silicon Central will include a 9,000m2 hypermarket and a 7,800m2 department store, alongside a 35,500m2 array of retail shops and services that will offer a broad mix of brands tailored to ensure shoppers’ complete satisfaction.

Adding to the unique shopping experience, a diverse range of dining options will comprise of 24 casual restaurants and cafes as well as 21 food court units, making it the perfect place to catch up with friends and families in an enjoyable atmosphere or to enjoy a quick snack on the run.

A wide range of entertainment options are also on offer, including a 12-screen cinema, a 6,800m2 Family Entertainment Centre, incorporating a 2,000m2 New Generation Entertainment Centre for both kids and grownups to stay active, plus a 2,500m2 gym to keep the community in shape. It’s all about convenience and accessibility, with nothing forgotten, including 3,500 car parking spaces.

With such a broad range of options, Silicon Central is set to be the destination of choice for families and entertainment seekers throughout its immediate catchment area, which takes in a population of 500,000 people, and further afield.

LIP’s success and commitment to excellence have not gone unnoticed either, with the organisation picking up five awards at the Retail Congress MENA Awards 2019.

Held in the Ritz Carlton, DIFC, the Awards Ceremony honoured the most outstanding achievers in the shopping mall industry in the MENA region. LIP took part in the event together with entries from Mall of Um Al Quwain, Al Wahda Mall, Mushrif Mall, and Khalidiyah Mall, winning one gold and four silver awards in the following categories:

Design & Development

Mall of Um Al Quwain (Gold)

Net Operating Income (NOI) Enhancement

Al Wahda for Celebrity Visit (Silver)

Traditional Marketing:  Cause-Related Marketing

Al Wahda Mall for Operation Smile (Silver)

Traditional Marketing: Digital/Social Media

Khalidiyah Mall for Enhanced Website (Silver)

Traditional Marketing: Sales Promotion

Mushrif Mall for Talentology 2019 (Silver)

The winners of the Retail Congress MENA Awards 2019 were selected by a jury of regional and international industry experts in retail.

Mr. Salim MA, Director Lulu Group International  said, “Our vision is to enhance the retail experience for our customers and partners and receiving awards for all the malls that took part is a testimony that the Line Investments & Property team is committed to excellence in the new age initiatives and community events they bring to the malls.”

With unparalleled expertise stretching across every conceivable specialist field of endeavour, including location-sourcing, design, development, management and marketing, LIP is fully committed to being the preferred investment and property management company in the retail and real estate sector of the regions it operates in. It currently offers 360-degree retail solutions in 23 malls in six countries, with several further properties planned for the future in new cities and markets.

Kodak Alaris Announces Global Alliance with RPA Software Leader UiPath

Vanilda Grando, Director Global Sales Development, Alaris division of Kodak Alaris

Kodak Alaris has announced a global alliance with UiPath, one of the world’s leading Robotic Process Automation (RPA) software companies. The collaboration will enable both companies’ channel partners and customers to leverage Kodak Alaris’ award-winning information capture solutions and UiPath software to accelerate digital transformation by automating and streamlining business processes. The companies also introduced their integration via the Alaris Capture Pro to UiPath Orchestrator Connector, which provides a seamless connection between fully indexed, high quality images from Kodak scanners and UiPath bots.

RPA is the key to working smarter and for many organizations – in particular, those most reliant on paper-based processes – has the potential to be truly transformative when used to modernize information and data capture. The alliance between UiPath and Kodak Alaris will generate new business opportunities for system integrators and software vendors, helping them expand RPA projects and deliver intelligent scanning and information capture solutions to customers in sectors including Government, Financial Services, Logistic and Healthcare.

RPA starts with usable data, which in turn starts with high quality images. Perfect Page Technology from Kodak Alaris optimizes the image quality of every page for more accurate information extraction and up to 20% better[1] OCR read rates, while Capture Pro Software quickly converts batches of paper into high-quality images — the foundation for accurate, streamlined data and decision-making.

“We are delighted to announce this global alliance with UiPath, whose software is among the leading tools for building RPA robots,” said Vanilda Grando, Director Global Sales Development, Alaris division of Kodak Alaris. “Intelligent information capture combined with RPA is especially powerful for finance, IT and IT services, operations and information governance. The combination of Kodak Alaris scanners, software and services, with UiPath’s RPA platform will enable partners to take their customers’ information capture to the next level, making total automation and paper-free processes a business reality.”

The UiPath RPA platform automates sequences of repeatable processes, minimizes disruption, uncovers efficiencies and provides insights, making the path to digital transformation fast and cost-effective. Once information is captured via the scanner, software robots complete repetitive, rules-based tasks such as moving files and folders, extracting structured data from documents and executing processes with it.

“Our two technologies complement one another,” said George Roth, Senior Manager, Technology Alliances at UiPath. “It’s not about taking people out of the loop, it’s about being able to reallocate them and bring them back in if needed. For example, you could set a threshold for OCR read rates at 90%. If the RPA solution doesn’t meet the 90% threshold, the bot will send it to a human for review. So, there’s an opportunity to really make a good human-in-the-loop partnership.”

On July 29th, Kodak Alaris-hosted a virtual event where keynote speaker Jim Walker from UiPath and Joe Yankle from Kodak Alaris shared tips for helping organizations automate business processes, connect their digital workforces and drive better business outcomes. By using technologies like artificial intelligence to automatically recognize documents or redact sensitive data, organizations are freeing up staff for higher-value tasks. Click here to watch the webcast on demand.

For a brief video about Kodak Alaris and UiPath, please click here: Partnering for a Digitized Automated Future:  UiPath & Kodak Alaris


[1] Based on third-party testing performed by BLI and commissioned by Kodak Alaris.  Test was designed by Kodak Alaris with all devices tested in similar operational conditions and where tested with similar operational methods.

New Sennheiser MKE 200 Microphone Enables Middle East Creators to Enhance Audio Capture on Cameras and Mobile Devices

Audio specialist Sennheiser today extended its portfolio of market leading audio-for-video microphones with the launch of its new MKE 200 in the Middle East. The mini-microphone is designed for easy on-camera use with DSLRs and mirrorless cameras as well as mobile devices, where it ensures clean and crisp audio and gives a professional touch to video clips.

“With the MKE 200, we are offering creators the first step to upgrading their sound,” said Tobias von Allwörden, Head of Portfolio Management – Audio for Video at Sennheiser. “Improved audio significantly increases the overall quality of your content. The MKE 200 makes this possible with its unique design which minimizes handling and wind noise. Simply attach it to the shoe mount, select the appropriate cable for your device and you’re good to go!”

Directional, clean audio

The MKE 200 features a directional design which captures the sound of your subject while rejecting unwanted background noise. To minimize any handling noise, the microphone is fitted with a clever internal shock-mount which acoustically decouples the capsule from the housing. To protect from wind noise, Sennheiser engineers designed the MKE 200 with an integrated layer of protective mesh inside the housing. This protection is further enhanced by using the included furry windshield when filming outdoors.

A compact companion

The MKE 200 features a compact, sleek design with a stylish finish thanks to a fully integrated shock-mount and built-in windscreen. Battery-free operation and a lightweight design allow for optimal gimbal performance.

The MKE 200 comes complete with a furry windshield, two locking connection cables for DSLRs or mirrorless cameras (3.5 mm TRS cable) and mobile devices (3.5 mm TRRS cable) plus a draw-string pouch for storage.

The MKE 200 is available in the Middle East as of September 1 and retails at USD 100.00 List Price, excluding local taxes and duties.

Aruba ESP Unifies IoT, IT, and OT Networks to Dynamically Adapt to Changing Environments and User Requirements

First Fully Programmable Platform to Unify IT, IoT and OT Networks with Zero Trust Security and AIOps Enables Organizations to Automate and Optimize Safety, Security, Reliability and Productivity

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), today announced significant enhancements to Aruba ESP (Edge Services Platform) that unifies IoT, IT, and Operational Technology (OT) networks to enable customers to quickly adapt to changing environments and user requirements. Aruba ESP is the first fully programmable platform to generate contextual information – about identity, location, security posture, and applications in use – to power efficient decision making and AIOps. Built to integrate with devices and applications from Aruba’s technology partners, customers can now become hyper-aware of their operating environment so they can quickly adapt to evolving business, visitor, and employee demands.

Today, “connected facilities” only provide device connectivity for subsets of control services, whereas hyper-aware facilities can leverage Aruba ESP-generated contextual data to dynamically adapt a facility to its occupants and operating environment. Unifying these IoT, IT, and OT networks under the Aruba ESP platform, and capturing rich context, enables hyper-aware facilities that are safer, more adaptive, and enhance productivity. That represents a quantum leap forward over what can be achieved by basic connectivity and machine learning-based monitoring.

These enhancements to the Aruba ESP cloud-native, AI-powered platform are integral to sensing, analyzing, and reacting to device data and contextual information. Aruba access points and switches now serve as multi-protocol IoT/OT platforms that interface with Aruba’s expanded technology partner ecosystem. Virtually every subsystem spanning machine inputs and outputs (I/O) on a manufacturing floor through multimedia devices in the CEO suite can be accommodated – from social distance monitors to gunshot detectors, rotating equipment monitors to guest wayfinding – with solutions tailored for education, enterprise, healthcare, hospitality, industrial, manufacturing, retail, transportation, and government applications.

Use cases with Aruba ESP-based hyper-awareness include smart buildings, industrial/manufacturing facilities and the broader Intelligent Edge:

Hyper-aware Smart Buildings for Enterprises, Education, Healthcare, Hospitality, Retail, and Government

  • Building Control and Digital Twin enablement – Using native AI capabilities to create real-time simulation models that change and learn in lock-step with the building, Aruba and technology partners like Microsoft with its Microsoft Azure IoT platform can create digital twins or software models to identify sub-optimized processes, recommend operational enhancements, and monitor the trajectory of energy usage needed for proactive interventions.
  • Context-aware, Real-time Integrated Emergency Response and Notification – During an incident, building occupants need real-time safety information pushed to their mobile devices and first responders need to continuously communicate with those in possible danger. Aruba ESP, with integrated solutions from technology partners like Critical Arc and Patrocinium, can actively communicate with tenants, visitors, and staff, and use unique 4D graphics for first responders to quickly see where people are situated within buildings.
  • Seamless Extension of the 5G Footprint with Wi-Fi – Aruba ESP allows mobile operators to extend their 5G footprint into the building and seamlessly power Wi-Fi calling while delivering gigabit-class guaranteed performance using Aruba Air Slice technology. This provides a seamless user experience and non-stop connectivity without the need for costly and complex distributed antenna systems.

For more context on these use cases, read the Designing hyper-aware smart buildings whitepaper.

Hyper-Aware Industrial Facilities

  • Migrating from Break/Fix to Proactive Maintenance – Proactively addressing maintenance issues minimizes downtime, and maximizes the utilization and performance of assets, reducing maintenance costs by up to 40%. Through deep integration with technology partner devices like ABB’s Ability Smart Sensor, Aruba ESP enables machinery sensors to monitor equipment like motor drives, valves, and pumps for abnormal behavior, to identify points of failure before they happen, improving productivity, reliability, and efficiency.          
  • Reducing Mean Time to Repair with Location Services – Navigating large industrial sites can be challenging, resulting in inefficiencies and safety issues. Native innovations from Aruba Meridian and Aruba ESP provides site occupants with turn-by-turn navigation to their destination without human assistance.    
  • Monitoring Personnel and Asset Safety – For environments with potentially explosive conditions, location-based safety systems are often mandated to safeguard employees and visitors. Aruba ESP, together with technology partner Mobilaris, can deliver real-time 3D situational awareness by tracking the location of people and assets, and can integrate with automated ventilation, geofencing, and vehicular navigation systems.                                

For more context on these use cases, read the Designing hyper-aware industrial facilities whitepaper.

To enable the automation needed to deliver these use cases at scale, Aruba AIOps uses AI and big data to continuously optimize, detect, isolate, and remediate network issues that impact reliability. As sources of IoT, IT, and OT data expand, it becomes increasingly difficult to isolate the source of problems or optimize the infrastructure. Aruba’s Cloud AI already combines telemetry data from over 65,000 customers and one million network devices, supplemented with 18 years of domain expertise to inform supervised learning. Aruba ESP produces AI-powered insights with greater than 95% accuracy to automatically improve communications and visibility across and among IoT, IT, and OT networks. Embedded within Aruba ESP’s unified infrastructure and zero trust security framework allows Aruba AIOps to transcend basic connectivity and simplistic machine learning-based monitoring. Aruba AIOps is a game changer for improved uptime and shortened repair times.

In addition to Unified Infrastructure and AIOps, ESP generates contextual data that make networks situationally aware for enterprise security. The Zero Trust Security framework ensures no user or IoT device is granted entry or ongoing access unless trustworthy. This framework uses AI and exchanges security and policy with more than 130 security technology vendors to obtain a deep understanding of each device and its role, allowing hyper-aware facilities to fold security activities into situational awareness.

“Machines, applications, and interfaces are typically tailored to each IoT, IT and OT vertical application, driving complexity in network management,” said Will Townsend, Senior Analyst, Moor Insights & Strategy. “I have analyzed Aruba ESP and believe its architectural platform based on a unified infrastructure, zero-trust security, and AIOps has the potential to reduce complexity and accelerate smart facility and hyper-awareness use cases both on-prem and in the cloud.”  

Additional information on Aruba’s technology partners can be found at https://www.arubanetworks.com/partners/programs/.

Fortinet’s Security Academy Program Increases Global Impact through Workforce Development

Security Academy Program Provides Academic Institutions and Nonprofits with Fortinet’s Network Security Expert (NSE) Training and Certification Curriculum to Bridge Gap Between Learning and Careers

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced more than 20 new academic institutions and nonprofits worldwide have recently joined Fortinet’s Security Academy Program to provide students, veterans and veteran families with advanced cybersecurity training and certifications. The expansion builds on the program’s momentum, which is available in more than 80 countries and is comprised of over 300 Authorized Security Academies.

“The cyber skills gap affects organizations worldwide and ultimately impacts the digital economy,” said Sandra Wheatley, SVP, Customer Marketing, Threat Intelligence and Influencer Communications at Fortinet.“This is why Fortinet heavily invests in training and education through our Corporate Social Responsibility efforts, including our NSE Training Institute programs. Through these programs we aim to create more cybersecurity career pathways and a diverse pipeline of security professionals.”

Closing the Skills Gap through Global Collaborations and NSE Training Institute

One way Fortinet is creating new opportunities in the digital economy is through global collaborations across sectors. Through its involvement as a founding member of the World Economic Forum’s (WEF) Centre for Cybersecurity and the Cyber Threat Alliance, Fortinet partners with global leaders, like Salesforce – the global leader in Customer Relationship Management (CRM), to further innovate and develop impactful global solutions for challenges such as the talent shortage.

The Fortinet Network Security Expert (NSE) Training Institute was established in 2015 to advance Fortinet’s Corporate Social Responsibility (CSR) initiatives to close the cybersecurity skills gap and make it easier for anyone to start a career in cybersecurity regardless of their previous access to education, background or life experiences. The NSE Training Institute is made up of the Security Academy Program, Certification Program and Veterans Program. Fortinet continues to grow the NSE Training Institute’s programs with recent milestones including:

  • The NSE Certification Program has issued more than 450,000 certifications worldwide, with more than 200,000 of certifications achieved in 2020.
  • In April 2020, Fortinet opened its entire catalogue of NSE self-paced security training courses, including pre-recorded labs, free of charge to the general public. The courses cover a range of topics – such as cloud security and secure SD-WAN – and total more than 350 hours of free training.
  • Fortinet was recognized by Military Times in its “Best for Vets: Employers” rankings for 2020 through the Veterans Program work. The Veterans Program connects military veterans and their spouses with potential employers.

Continued Learning Through the Security Academy Program

The Security Academy Program focuses on creating a diverse, equitable and inclusive pipeline of security professionals. The program does this by partnering with academic institutions and nonprofits worldwide. Through the Security Academy Program, institutions around the world have incorporated Fortinet’s NSE training and certification content into their students’ curriculum.

Military veteran-focused nonprofits joining the Security Academy Program provide their constituents with access to Fortinet’s NSE training and certifications, while the Veterans Program helps Veterans transfer relevant experiences to a career in cybersecurity.

Below are testimonials from academic institutions and nonprofits focused on serving veterans and their families that have recently joined the Security Academy Program.  

“The partnership with Fortinet has been remarkable and will provide a pathway for students to gain the knowledge and skills needed to compete in a rapidly growing global marketplace. Kennedy-King College has undertaken an equity and workforce-focused IT expansion initiative, with a goal to reduce the digital divide currently separating underserved and underrepresented populations from careers in the IT industry. After meeting with the Fortinet team and learning about the Security Academy Program, we knew the partnership would position us to better address this important equity imperative. We are both enthused and confident that Fortinet’s Security Academy Program will serve our students well and ultimately prepare them for high-skill, high-demand work in the IT sector.

-Eddie Phillips, Ed.D., Vice President of Academic and Student Affairs at City Colleges of Chicago, Kennedy-King College

“We were looking to add to our existing robust cybersecurity training curriculum. We joined the Security Academy Program right as the world started to shift to online learning due to the pandemic, so access to the NSE training’s established online curriculum that is instructor led or self-paced was especially beneficial. The path to NSE certifications is also helpful in providing students further validation to employers of their expertise that they can immediately use in the work place.”

– Steve Morrill, Director of Technology & Cyber Science at Loyola Blakefield

“In the face of mounting cybercriminal activity and increasingly sophisticated forms of attacks, companies are looking for cybersecurity professionals to defend against threats. Through the Fortinet Security Academy Program, students can expand and up their skill levels for a career in cybersecurity. This collaboration will help Seacom Skills University to assist in the global cause of creating a more educated workforce by helping our graduates to fill the skill gap in the industry.”

Anish Chakraborty, Chairman, Seacom Skills University

“Networks are a fundamental component of any modern organization’s information systems. The advancement of technology and digital innovations also implies an increase in threats and vulnerabilities. This is why at CIISA we feel that it is crucial to prepare our students to be capable of developing an advanced security posture for their future employers. Joining Fortinet’s Security Academy Program will further allow us to provide high-level training in the ICT area in Chile.”

– Sebastián Otazo Muñoz, Director of Networks, Telecommunications and Cybersecurity Area at CIISA

“The Autonomous University of Guerrero State in Mexico is committed to developing highly qualified IT professionals. We joined the Security Academy Program because it offers a great opportunity to train students on relevant skills for a career in cybersecurity, which is one of the most in-demand areas in IT. Students will have the opportunity to develop hand-on practices through virtual labs to acquire cybersecurity skills that will make them more confident and stand out.”

-Felix Angel, Engineering Faculty at Universidad de Autonoma Guerrero 

“Companies of all sizes and from both private and public sectors need cybersecurity professionals. The need for security professionals will continue to grow and we want to make sure our students acquire the knowledge they need to be successful in their future careers. Fortinet’s Security Academy Program will further help us build our cybersecurity curriculum to set our students up for success to enter the work force.”

– Diego Bolatti, Director of Information Labs at UTN Regional Faculty Resistencia

“Cybersecurity training is more important than ever as the skill gap has become a critical issue for many organizations. Bennett University has signed up with Fortinet Security Academy program to help build and augment skill sets, as well as help develop the next generation of security professionals. By providing this industry recognized certification as part of our curriculum we will ensure that our students gain the required expertise to become part of an elite group of skilled security professionals for whom we are witnessing a great demand.”

– Dr. Deepak Garg, Professor and Head, Department of Computer Science Engineering CSE at Bennett University

“We have noted an increase in employers seeking to hire employees with relevant cybersecurity qualifications. As such, the collaboration with Fortinet will further assist us in equipping our students with in-demand cybersecurity skills employers seek. We look forward to numerous students benefiting annually from the Security Academy Program training resources, leading to them joining the workforce and filling critical cybersecurity roles in Kenya.”

-Dr. Joseph Sevilla, Director of the @iLabAfrica Research Centre at Strathmore University

“Seneca College strives to prepare our students for the workforce and the Security Academy Program was a great way to teach them key competencies associated with network security. Fortinet is at the forefront of this field and our students will benefit immensely from training in this space. We have deployed virtual firewalls and created a robust virtual lab curriculum that integrates many aspects of the Security Academy Program in tandem with other security concepts tied to the Security+ certification. It is our hope that students will continue their learning and get certified in both of these areas after they graduate. Students will gain a broad understanding of security awareness and be able to configure and maintain the Fortinet brand of firewalls, which will prepare them for work in the IT security field.”

– Peter Moscone, Program Coordinator at Seneca College of Applied Arts & Technology

“Through our partnership with Fortinet as part of the Security Academy Program, O2O will further be able to expand O2O’s resources for those looking to enter the cybersecurity industry. Access to Fortinet’s Network Security Expert (NSE) training courses and certifications is an exciting and important step forward in equipping our students with even more resources to succeed in growing and in-demand careers. We are proud to work with Fortinet to advance employment opportunities for veterans, service members and their families.”

– Michael Bianchi, IVMF Senior Director for Education & Career Training at Onward to Opportunity

“With a growing global demand for qualified cybersecurity professionals, our partnership with Fortinet provides innovative new pathways for veterans and their families to gain new skills. The collaboration between Soldier On and Fortinet will enable over 3,000 veterans and family members currently supported by the Soldier On Pathways Program to be connected with new digital learning opportunities in high-demand areas like cybersecurity, giving them more avenues into employment.”

Ivan Slavich, Chief Executive Officer at Soldier On

“Fortinet’s Security Academy Program grants access to the NSE training and certifications, providing military spouses with an opportunity to obtain valuable skills in a high-demand career field. Blue Star Families ensures that wherever American military families go, they can always feel connected, supported and empowered to thrive.  Within a month of launching our new partnership with Fortinet, over 60 Blue Star Families military spouses have expressed interest in pursuing the Fortinet cybersecurity training and we anticipate many more will take advantage of the program as they look for careers in the field.”

Denise Hollywood, Chief Community & Programs Officer at Blue Star Families

Pershing goes from strength to strength with the delivery of the second Pershing 140 unit

The perfect combination of innovation, unique style and forward thinking, the brand flagship continues its growing commercial success

Powerful and spectacular, the uniquely electrifying cruising experience offered by Pershing continues to captivate enthusiasts with an amazing blend of design and technology. Last July saw the delivery of the second Pershing 140 unit, the brand’s first all-aluminium flagship and a milestone that ushers in a new era for yacht construction. 

A product of collaboration between naval architect Fulvio De Simoni, the Ferretti Group Product Strategy Committee led by Piero Ferrari and the Group’s Engineering Department, Pershing 140 is the brand’s first model built at Ferretti’s Ancona Super Yacht Yard, which specialises in the construction of steel and aluminium super and mega yachts over 40 meters in length.

The design of the exteriors, laid out over two decks and a spacious sun deck, confirms the sleek lines that are emblematic of the brand’s sporty and competitive character, combining design innovations with some of the brand’s most iconic details, such as the two lateral wings integrated into the superstructure and then connected at the start of the walkways to the gunwale. Other standout features include the raised cockpit with direct access to the sun deck, the private owner’s area on the main deck, and a beach area that can be extended by opening the three fold-out sides.

Unlike the first unit, which was fitted out at the owner’s request with an entertainment room, this unit has a full-beam private master suite with double bed, entered through the owner’s studio and small lounge. The layout is completed by a roomy walk-in wardrobe and a big bathroom.

The interior design can be fully customised with the support of the designers at Studio Fulvio De Simoni and the Project Architects on hand at the Ferretti Group Super Yacht Yard. The yacht also features the finest materials and furniture produced by top luxury designers, including longtime Pershing partner Poltrona Frau, Minotti, Artemide, Roche Bobois, Molteni and Fontana Arte. 

The second Pershing 140 unit will be on show at the Ferretti Group Private Preview, the exclusive annual event held at the Monaco Yacht Club from September 3 to 6 this year, where a group of selected guests and customers will have the chance to admire firsthand an engineering masterpiece that is arousing growing interest among owners around the world. Underscoring the model’s success, the third unit is now under construction at the Ancona Super Yacht Yard and will be launched next year.