Kodak Alaris Announces 2020 Partner of the Year Award Winners for EMEA Region

Kodak Alaris has recognised eight partners from the Europe, Africa and Middle East region (EMEA) in its annual Partner of the Year awards. The awards are an integral part of the global information capture leader’s annual Partner Summit, which this year was held as a virtual event due to the COVID-19 pandemic.

The Kodak Alaris Partner Awards acknowledge partners who have demonstrated excellent growth, engagement, innovation, and implementation of customer-centric solutions based on Kodak Alaris’ technology and services portfolio. The finalists and winners were chosen based on their commitment to customers, investment in solutions from Kodak Alaris, year on year revenue and growth trajectory, as well as successful joint wins over the past year.

“Kodak Alaris has a market-leading partner network and I am delighted to formally recognise our highest performing partners who continue to deliver added value to our joint customers, helping them to transform their and their clients’ businesses,” said Gerry Kelliher, Managing Director, EMEA Region, Alaris division of Kodak Alaris. “This year’s winners stand out by delivering the expertise organisations need to automate business processes, to maximise productivity and drive growth in increasingly complex business environments.”

Kodak Alaris Virtual Partner Summit 1

Spigraph, Benelux was named Top Value Added Distributor; the company has collaborated closely with the Kodak Alaris sales team and continued to drive high market share in the region. “To be awarded as Top Value Added Distributor of the year is a great recognition of all our joint efforts to drive profitable growth through the region,” said Koen Beeuwsaert, Vice President Sales, Northern Europe, Spigraph. “The unique ecosystem built between our reseller community, Spigraph and Kodak Alaris is offering tremendous value to end users that are in the middle of their Digital Transformation.”

Having delivered significant revenue growth in FY20, long-standing partner ALOS, one of the leading system providers of capture and Enterprise Content Management solutions in German-speaking countries, secured the Top Performing Partner accolade. The Top Solutions Provider award category which recognises partners’ success in developing solutions capability around Kodak Alaris’ complete hardware, software and services offering, was won by e-das, Germany. “We have been a partner of Kodak Alaris now for over 20 years,” said e-das CEO Helmut Geilenkeuser. “We have a fantastic working relationship and many successful projects. A good relationship is important but not everything. Brilliant products like the scanner range from Kodak Alaris as well as the software and service offerings make the total package complete.”

Pitney Bowes UK scooped the Top Strategic Partner award. The partnership between the two companies is a relatively new one. Pitney Bowes has very quickly integrated Kodak Alaris into its solutions portfolio, rapidly growing the business and is driving new opportunities, particularly within the digital mailroom. In the service category, Restore Digital UK won the 2020 Service Partner ‘Large Deal’ award, and the Service Partner ‘Loyalty’ award was presented to ScanfabrikTM KG.

A Special Award went to Wietec in Israel celebrating its successes over the past 12 months, most notably winning three major tenders to deliver election solutions despite tough competition. And Dubai-based distributor Rookie Ninja, was the first recipient of the Service Partner ‘Start-up’ award which was designed to recognise a partner that has built a successful service business from scratch. “We are proud and humbled to receive this award from Kodak Alaris for our Services,” said Shashank Patel, Managing Director, Rookie Ninja. “Kodak Alaris believes in delivering industry leading service to its clients globally and it feels great to be the torch bearer for the same in this region.”

To learn more about the Kodak Alaris Partner Programme, please click here.

IKK Group Replaces Legacy Backup Solution with Veeam, Fueling Accelerated and Cost-Effective Business Operations

Veeam® Software, the leader in Backup solutions that deliver Cloud Data Management™, today announced that the Issam Khairy Kabbani Group of Companies (IKK Group) in Saudi Arabia has implemented Veeam® Availability Suite™ and Veeam® ONE™ in order to guarantee uptime of services for all users and customers. Veeam’s solutions have increased efficiency of the system engineers, enabling them to focus on enhancements and improvements, besides proving 30% more cost effective than the legacy solution. The introduction of the ‘instant recovery’ feature has cut restore time from days to a few hours.

IKK Group which started operations in Saudi Arabia in the 1970s is a diversified group in terms of products, services, and geography operating in the field of trading, manufacturing and contracting. Today, some 14,000 staff work in 42 independent IKK Group companies, spread over many divisions, branches, and outlets in more than ten countries. The Group’s showrooms, sales offices, factories and R&D offices can be found across the MENA region.

The IKK Group operates a centralized IT department that oversees technology services for all IKK Group lines of business. One of the key concerns of this central IT team is to guarantee uptime of services for all users and customers. “If our data is compromised, or if our services are unavailable, a tremendous number of users and end customers are impacted,” said Ayman Mansour, IT Infrastructure Department Manager, IKK Group. “Service downtime translates to a direct loss of productivity and business.”

With lack of prompt support, rising errors and system incidents, the IKK Group’s legacy backup solution presented a significant business risk.

“Besides a solution that could meet our technical requirements, we needed better support and communications from the vendor itself,” Mansour explained. “Going through partners and facing long delays was no longer viable for us.”

After careful market analysis, the IKK Group selected Veeam Availability Suite to address the technology and support shortcomings it was facing.

The financial benefits were evident immediately. Veeam’s innovative licensing model which bases fees on number of sockets as opposed to terabytes (TB), proved to be 30% more cost-effective than IKK Group’s previous legacy backup solution. Further resource savings have been made possible by Veeam ONE (part of Veeam Availability Suite), which provides the centralized IT team with comprehensive monitoring and analytics for their virtual and physical environments. This has enabled IKK Group to optimize resource planning and maximize utilizations of existing investments as they scale their IT infrastructure.

By reducing backup and recovery process time, errors and issues, Veeam’s solutions enable the IKK Group’s IT team to invest efforts and time into enhancement projects that deliver major business benefits. This includes implementing production and backup data security best practices and access control strengthening to mitigate the threat of malware and cyber risks.

With Veeam’s Instant VM Recovery, large terabyte sized VM servers which used to take days to recover are now done in just a few hours, while services are restored in a few minutes in some cases. This delivers a seamless experience for thousands of users, across the Group’s entities, who rely on the availability of data and services to carry out their job functions.

Equally beneficial has been the relationship that the IKK Group’s IT team shares with Veeam. From their very first engagement, the commitment and expertise of Veeam’s regional team was evident to IKK Group’s centralized IT team, who appreciated the vendor’s ability to deliver dependable, 24/7 support.

“With Veeam, it isn’t just their solutions but also their support that can boost customer satisfaction – you get 24/7 support for incidents whenever needed. If we had to rate Veeam’s regional support, it would be 5-star service most of the time. Today, Veeam is one of the pillars of our service availability and business continuity strategy. If the corporate management decides to establish a DR site, we shall use it an opportunity to extend our relationship with this reliable technology provider,” Mansour said.

“Ensuring data availability and protection is not only essential to business continuity, but also to maintaining competitive advantage, maintaining brand reputation and complying with regulations. As IKK Group transforms its digital infrastructure, we are proud to have been able to provide world class backup and recovery technology that helps deliver secure and uninterrupted digital services and experiences to the Group’s employees, vendors and customers,” concluded Claude Schuck, Regional Manager, Middle East at Veeam.

 

The new 24-hour home security system from eufy security camera protects your family from potential crime

During this stressful and desperate times, it is important to keep homes and communities safe and away from potential crime but neighbourhood watch schemes are not as reliable as a 24-hour home security system such as a eufy security camera that can help us keep a close eye on all activity indoors and outdoors.

With job losses and uncertainty, cases of “Anxiety” amongst families makes it difficult to keep a 24/7 eye on intruders, children alone at home or elderly parents who live remotely.

Because of this, Eufy Security Smart Cameras and Video doorbells have a unique feature “Motion activity alerts” that can be set up by defining the designated zone to get alerts on human detection, suspicious activity and when someone is entering or leaving your private space.

This is supported by functional features like two-way communication, alarm function to alert the neighborhood in case there is stranger near your house and a wide-angle coverage.

The Instant Mobile Alerts allows you to speak directly to anyone who approaches your home giving you complete control over your surveillance and meets the growing demand in smart home products and security solutions. You can save footage to local storage with no monthly charges.

The eufyCam2 is a wireless Home Security Camera System with 365-Day Battery Life on one charge and comes with features that include HD 1080p for clear crystal footage, IP67 Weatherproof that withstands all elements, state of the art Advanced Night Vision and is compatible with Amazon Alexa and Homekit.

It has a 2-Cam Kit and does not bind users to a monthly fee which means a one-time purchase that combines security with convenience. Eufy Security products store, process, and calculate user data locally using military grade encryption. For privacy reasons, videos are stored locally but accessible anytime, anywhere, via a secure AES 256 encryption by logging into your account.

An additional security gadget to compliment the eufyCam2 is the Eufy doorbell which can be installed near the front door and is triggered by motion detection with users receiving a smartphone alert when the motion is recorded and the video is viewable instantly allowing for a two-way communication.

The Smart Image Enhancement feature gives a clearer, brighter view of the people in-shot while the built-in AI technology identifies and focuses on the human in the image.

As the eufy motto is “Smart Home Simplified”, it brings easy-to-use smart home devices that are designed to secure your property and family and helps reduce crime.

A10 Networks Demonstrates Commitment to Channel with A10 Affinity Partner Virtual Summit 2020

A10 Networks (NYSE: ATEN), today announced that it has successfully hosted its A10 Affinity Partner Virtual Summit 2020 on June 17th – 18th, 2020. The event saw attendance of 350 channel partner executives across the EMEA and SAARC regions. 

“Our partners and distributors are a key and valued part of the A10 operation. Hosting the virtual summit is in line with our continuing ambition to clearly define, differentiate and communicate our evolving proposition as a leader in cyber security, and to unequivocally demonstrate the business value of being an Affinity channel partner. We’re dedicated to strengthening and expanding our channel organisation and ensuring that all current and future partners, as leaders in the marketplace, are emboldened to sell A10 products and solutions, and enabled to grow their customer base with the best possible resources and support. Because when our partners succeed, we succeed,” said Ehab Halablab, Regional Channel Manager – MEA at A10 Networks.

This year’s Affinity Partner Virtual Summit was created to deliver an unmissable experience for all A10 partners, one which reflected the company’s ongoing focus and commitment to the growing network. The packed two half-day virtual summit brought partners fully up to speed with what’s been happening at A10 Networks since the start of 2020. Attendees had an opportunity to hear from the company’s top executive team. They were given insights into how to grow their business pipeline. The agenda also included a customer interview, partner use cases, deep dive technical sessions and to keep things interesting, even fun activities with prizes.

Below is a closer look at some of the key areas covered during the Virtual Summit:

Keynote Address by the CEO

In an inspirational address CEO, Dhrupad Trivedi, revealed how his new vision and direction is positioning A10 for significant growth and highlights why there’s never been a more exciting time to be a A10 Networks partner.

Marketing Download

From refreshing the brand, to revamping the company’s partner program, attendees heard  from Worldwide Marketing VP, Gunter Reiss how A10’s dynamic marketing approach will enable it’s partner community to power up their sales now and in the future.

Portfolio Update

Partners learned about A10’s latest product releases and discovered what innovative product plans are in store for 2020 and beyond. The session provided thought leading insights on 5G security and multi-cloud application delivery and security.

Vertical Focused Case Studies

Geared around growing partners’ understanding of A10 solutions, the vertical focused case studiesdemonstratedhow the company supported service providers, e-commerce retailers and 5G expansion.

Personalised Sessions

Attendees were provided access to personalised sessions, designed to empower and provide invaluable knowledge, information, and practical advice. Commercial partners were given insights into how they could move up to the next partnership tier (platinum) and take their business to the next level; whilst technical partners embarked on a deeper technical dive with A10 experts.

The League of A10 Alphas

Partners were given a chance to find their competitive side and join the league of A10 Alphas. Using knowledge gained throughout the Affinity Partner Summit, partners had an opportunity to complete quizzes and fun tasks to earn points and rise up the A10 Alphas league table. Epic prizes for winners were on offer along with the chance to secure a place in the A10 Alphas Hall of Fame.

“Despite these unprecedented times and the current climate, we’re delighted to have been able to invite our partners to Affinity 2020 and share exclusive insights, exciting A10 news and the very latest business updates. We believe the summit has set up our partners for success this year and beyond,” concluded Ehab.

Securing Connections in the Cloud and Across All Your IoT Devices

By Jonathan Nguyen-Duy, Vice President, Global Field CISO Team, Fortinet

The hyper-connected, global marketplace of the 21st century has shifted the landscape for networking and security. Two prevalent trends in this area—cloud adoption and the rise of the Internet of Things (IoT)—are seemingly two different components of digital transformation, with separate purposes and scope. However, they actually work together, fueling one another in the digital ecosystem. This symbiotic relationship has important implications when it comes to deploying, using, and securing cloud services and the IoT.   

As the number of IoT devices grows, so does the amount of data that they generate. This is in addition to the massive stores of data that are already being amassed by businesses, governments, and even individuals – data that must be collected, processed, mined, and stored. Take, for example, the use of sensors in warehouses where inventory can be tracked. This technology provides managers with essential data on purchasing trends so they are better equipped to manage inventory, especially on fast-selling items. Similar devices in retail locations provide information not just about inventory, but everything from temperatures in refrigeration units to customer purchasing trends.

IoT sensors installed on manufacturing equipment provide production managers with critical information. Environmental data from these sensors signal evidence of wear and tear on expensive equipment, alerting managers about maintenance before that equipment fails and costs the organization millions of dollars in lost productivity. 

As a result of these and other use cases, organizations are finding that in order to keep up with the massive amounts of data they are amassing, they need to act fast and build out their data management resources. For many, this comes in the form of a standard, two-pronged solution: easily scalable cloud data centers and high-performing infrastructures developed to support data mining for critical information. 

An Increased Digital Footprint Results in Increased Risk

One of the top challenges associated with IoT adoption is security. Botnets are the most common IoT cyber threat, causing Distributed Denial of Service (DDoS) attacks like the notorious Mirai, which infected tens of thousands of IoT devices before causing massive disruption. 

When compromised, IoT devices may do the following:  

  1. Intercept data being transmitted  
  2. Act as a vehicle for malware
  3. Fall under control of a botnet to carry out a specific, disruptive task such as DDoS

According to research conducted by the team at FortiGuard Labs, IoT devices were involved in half of the top 12 exploits last year. This is due primarily to the fact that most IoT devices are designed with fault code, no built-in security measures, and an inability to be updated even when network managers identify a vulnerability. 

IoT and the Cloud: A Uniquely Challenging Combination

Every IoT device is potentially another cloud connection, and every connection to the network represents yet another security vulnerability. So, what does this mean for your organization? As you develop new IoT assets and move to the cloud, your security strategies for both need to be in sync with one another. When an IoT device is compromised, your public and private clouds are at risk, and this can eventually affect your core network and even your customers. 

How to Secure IoT and Cloud Connections

There are six key considerations when it comes to securing IoT and cloud environments:

  1. Robust vulnerability management. Understanding what is on your network and the potential threats they pose is critical. Keeping track of your IoT devices ensures they can be updated with security patches (where possible), properly segmented and isolated, or protected using effective proximity controls that can offer defense in the case of an attack. 
  2. Compensating controls. By implementing proper controls, security teams can mitigate risks posed by those devices that can’t be updated. Proximity devices, including firewall and IPS systems, should be leveraged to ensure the inspection of data moving between IoT devices and the cloud. Additionally, behavior-based detection can be used to identify traffic discrepancies, such as the communication between botnet command and control centers.
  3. Encryption. This practice should be leveraged where possible to ensure the confidentiality and integrity of data. 
  4. Hardened security at the cloud edge. Not all IoT environments are secure, so hardening the cloud network is essential. In addition to other mitigation efforts, avoiding DDoS attacks and malware is also a matter of inspecting traffic at the cloud edge.
  5. Integration and automation. The policies that govern security tools and the collection of security event data need to exist within the same management platform. This will ensure event correlation, consistent functionalities, reliable configuration delivery, and the orchestration and enforcement of policies all through a single pane of glass.
  6. Security plus performance. Security platforms must be consistently reliable, no matter the environment in which they are deployed. Regardless of whether they are deployed as a virtual instance or a physical appliance, they must be able to process large amounts of data without slowing down the collection and processing of critical data.

Final Thoughts

To maximize the benefits of digital transformation, organizations must employ effective security strategies for IoT devices and the cloud. A unified strategy that addresses both the cloud and IoT using advanced threat intelligence and automation is vital. This will secure critical connections moving forward and set your organization up for success in the modern marketplace. 

Warba Bank Digitizes Online Banking and Enhances Customer Experience with Nutanix

Kuwaiti FSI leader targets mobile computing and financial services governance in bold digital transformation program

Nutanix (NASDAQ: NTNX), a leader in enterprise cloud computing, today announced that Kuwait’s Warba Bank has digitally transformed its financial services and mobile banking using the power of Nutanix’s hyper-converged infrastructure platform.

Warba Bank was established in 2010 and currently runs 14 branches nationwide, with several further launches already in the pipeline. To keep pace with the changing demands of retail, private and corporate customers, and to align with its plans of continued growth, the bank began an ambitious digital transformation program that targeted mobile applications and the governance of financial services.

“Mobile applications make our customers’ journeys so much easier,” said Wael Shawareb, Senior Director of Cyber Security and IT Governance, Warba Bank. “But once you get into digital transformation in our sector, you have to consider the governance of financial services, which is very strict when it comes to data protection and privacy concerns. You have to make sure you implement your security levels in accordance with meticulous standards.”

In selecting Nutanix as a partner for digitization, Shawareb and his team were drawn to Nutanix’s ability to integrate with Warba Bank’s legacy hypervisor.

He said: “Their understanding of the hypervisor running underneath showed that Nutanix were doing impeccable research into the back-to-back vendors, even for the non-related tickets relating to operating system issues. That, more than anything, showed us how solid they were. They were an ideal partner for us.”

Warba Bank’s journey to hyperconverged architecture began with software-defined storage. The organization then migrated to full IT automation lifecycle management. By digitizing its online banking services through Nutanix’s platforms, Warba Bank is now able to enhance the customer experience, by bringing newfound stability and simplicity to backend infrastructure, and delivering rich digital interfaces to its clients at the front end.

“The first thing we noticed after the implementation of Nutanix’s solution was the speed,” said Shawareb. “Once you realize that, ‘Oh, my goodness; I just created that server with all of that storage, and provisioned it faster than I have ever been able to do before,’ that is the moment where you understand just what profound change you have brought to your organization by going with Nutanix. Their GUI, from the moment you log in, gives you the impression that you are dealing with the simplest ever infrastructure. Deployment was a dramatic mind shift for us.”

Nutanix also supported Warba’s stakeholders in their migration of the company’s critical mobile banking application. The core services of Warba’s mobile banking services run on top of Nutanix. A series of legacy vendors had to be integrated to carry Warba’s digital transformation ambitions forward. By simplifying management and maintenance, and by enhancing provisioning speeds, Warba Bank discovered that its IT function was freed up to innovate. The team can now concentrate on the enhancement of the customer experience.

“Today, banking customers of all types expect to have relationships with their assets and investments like they are in the palm of their hand,” Shawareb said. “That close, 24-7 relationship calls for a robust mobile banking offering with impenetrable security, high availability and low latency. We also need to be able to roll out enhancements to that customer experience in real time, with no disruption to service. Nutanix understood all of that. And for that reason, and many others, we now see them as a strategic technology partner for Warba Bank.”

“The regional FSI sector is one of the most fiercely competitive industries in operation today, with customers that have some of the highest expectations imaginable,” said Aaron White, Regional Sales Director, Middle East at Nutanix. “The mobile computing and governance issues faced by Warba Bank are exactly the kinds of complexities that can be smoothed over by Nutanix technology that brings consumer-grade simplicity into enterprise data centres. We have enabled the Bank to leverage agile, efficient, multicloud-capable IT to become a truly digital enterprise.”

Cordless Handheld Vacuum Cleaner, eufy HomeVac H11 by Anker Innovations makes cleaning effortless and quick.

Lightweight and Compact, eufy HomeVac H11, an ultra-lightweight cordless handheld vacuum cleaner by Anker Innovations makes cleaning effortless and quick.

Featuring a Dust Devouring Suction with 5500Pa power, any accidental mess can be cleaned in a jiffy and that too with absolute ease. This lightweight handheld 2-in-1 crevice tool helps to clean the deepest corners of your house furniture, cars, baby chairs, recliners etc.

Faraz Mehdi, Regional Sales Head at Anker Innovations MEA said, “The easy to store efficient HomeVac H11 offers tasteful yet practical solutions for all your everyday cleaning needs. Each lightweight and cordless vacuum is designed for efficiency and complete mobility.”

The washable high-efficiency filter ensures simple and minimal maintenance and improved performance. Weighing just 1.2lbs, the ergonomic, non-slip design allows for comfort and precise handling. This amazing device can also freshen up the air in the immediate vicinity by eradicating odors by activating Ozone feature. This is a very useful features for your cars, sports equipment or well used shoes.

For convenient charging, users can simply use a USB phone charger or car charger and enjoy up to 13 minutes of max suction cleaning time from a full charge. The sleek, non-slip design allows for comfortable and precise handling, making cleaning effortless.

Soundcore Life Q20 Bluetooth Headphones by Anker offers Impressive sound and comfortable fit

Hear songs in the way they are meant to be heard with Anker Soundcore Life Q20 Bluetooth Headphones. The wireless Over Ear Headphones are perfect for travel and work as it features custom 40 mm dynamic drivers to reproduce sound with extraordinary clarity, Hybrid Active Noise Cancelling, Hi-Res Audio and Deep Bass for a heightened listening experience.

Compatible with smartphones, tablets, laptop computers and more, Life Q20 offers up to 40 hours of non-stop playtime in wireless active noise cancellation mode and a single charge can play over 600 songs.

For optimal noise cancellation, memory foam earcups gently mold around your ears, while the headband’s rotating joints automatically adjust the earcups to fit the shape of your head.

This ensures that Life Q20 active noise cancelling headphones deliver maximum comfort and a secure seal to enjoy the BassUp technology that stops ambient sounds, enhancing your listening experience. Life Q20’s built-in microphone allows convenient hands-free calls, enhances voice pick-up to ensures you sound crystal clear.

Soundcore Life Q20 comes with a travel pouch to conveniently store the headphones, a 3.5 mm AUX cable to keep the music playing when you’re low on battery and a Micro USB cable plus a user Manual and 18-Month Warranty.

Treat your dad this Father’s Day with gadgets from Anker Innovations

Anker Power Box

Make sure your father never runs out of charge on his phone with Anker Power Box. This Power Box contains three flagship products from Anker:

1) PowerCore 10400mAh Power Bank, a high capacity Power Bank that offers up to 3 times charging for Flagship Phones and comes with optimized output for Multiple Device Charging.

2) Powerport+1 Charger, equipped with PowerIQ Technology and Multiprotect Safety System, along with a micro USB cable, is travel ready with Quick Charge 3.0.

3) Powerline II 3-in-1 Charging Cable, the extremely durable and MFi Certified charging cable with 3-in-1 Connectors i.e. Lightning, Micro and C-Type and is Universally Compatible with every phone that uses these one of the three charging connectors. Available in Jumbo Electronics and EMAX.

Anker PowerConf Bluetooth Speakerphone

The new Anker PowerConf Bluetooth Speakerphone is perfect for dads. It can help him make any place a conference room as It can connect to the mobile phone or laptop ensuring he has clear discussions as the incoming amplified sound allows him to listen and speak simultaneously in any surroundings. This feature is perfect for teachers conducting e-learning classes as well.

The device features Omni-Directional Voice Pickup with six microphones arranged in a 360° array to pick up voices of up to eight people in a room without distracting noises and is compatible with all popular online conferencing services, including Skype, Google Hangout, Facetime, Zoom, WebEx, GotoMeeting, and Chromebox.

The PowerConf Bluetooth speakerphone has 24 Hours of call time and comes with integrated Anker PowerIQ technology that allows you to charge other devices via PowerConf at optimized speeds.

The lightweight and compact travel case protects PowerConf while on business trips or moving around and does not require other equipment to set up, making it perfect for small spaces. It is available on amazon.ae.

Soundcore Liberty Air 2

Soundcore Liberty Air 2 is known to be the true wireless in-ear headphones that comes with four built-in microphones with noise cancellation and filters out ambient noises.

Environmental noises are reduced by 60% to 95% to ensure crystal-clear diamond enhanced sound with twice the amount of bass. The HearID technology maps hearing sensitivity at multiple frequencies and intelligently analyzes results for a truly personalized listening experience.

For convenience, the one-Step Pairing ensures automatic connection to your device. The earbuds allow for 7 hours of playtime but the charging case provides a longer battery life of 28 hours on the go. Liberty Air 2 can also recharge its power through wireless chargers.

With a comfortable fit and the IPX5 for Water & Sweat Resistant, Liberty Air 2 gives freedom from messy wired headphones and offers the convenience of listening to music by the pool, during morning walks or while cooking and relaxing.

Available in all major electronics retail stores, Amazon.ae and noon.com

Nebula Apollo Pocket Projector

Nebula Apollo Smart Pocket Projector is a new generation pocket cinema in a compact, mobile and soda-can size design. Hosting capabilities such as Google Assistant, remarkable clarity with Sharp 200 ANSI lumen image and improved audio, it is the perfect entertainment device to enjoy together with family.

Nebula Apollo is perfect for dads who want to enjoy their favorite match or TV shows through streaming apps on the go on a bigger screen powered by Android 7.1 which brings great content to you, so you spend less time browsing and more time watching movies with loved ones.

Nebula Apollo provides 4-hours of video playtime with single full charge and offers big 360o sound with a 6W speaker. Nebula Apollo offers an advanced entertainment experience, anytime, anywhere with your loved ones.

Soundcore Infini Pro Soundbar

Give dad a Soundcore Infini Pro, the world’s leading surround sound technology, perfect for enjoying music, movies and favourite matches with astonishing clarity and richness.

Soundcore Infini Pro reproduces breathtaking, cinema-like audio from all around as Dolby Atmos® adds an overhead dimension to create an even more immersive movie watching atmosphere.

To produce room-filling sound, dual 2.5-inch mid-range drivers and 1-inch tweeters are paired with built-in up-facing 3-inch subwoofers and symmetrical bass reflex ports. To add even more bass intensity, the BassUp technology enhances bass output in real time.

Security in the Age of Digital Transformation

By: Dr. Cherif Sleiman, Senior VP International Business at Infoblox

One of the privileges of my job is the opportunity to talk to business leaders across Asia about where they see the opportunities and challenges in their fields. And in all these conversations, two issues keep coming up: the digital transformation and cybersecurity.

Many of these leaders talk about these issues as though they are distinct, but after all my years of experience in this industry, I see them as essentially two sides of the same coin. Leaders really cannot consider the digital transformation without considering the broader cybersecurity concerns that come with it. And indeed, companies need to have robust cybersecurity policies in place if they want to take full advantage of the opportunities afforded by this fourth industrial revolution.

I will begin by talking about the challenges and opportunities afforded by the digital transformation, especially as they pertain to security.

Next, I will discuss the implications of big data on security, what this means for companies, and how they can forge a “new social contract” that will address the unique concerns of the data driven economy.

Finally, I will explain why companies seeking to undergo the digital transformation should focus on security first, and provide some advice for how they can integrate security-minded thinking into their digital transformation strategies.

Challenges of the Digital Transformation

The 2020s will be the decade of the digital transformation around the world.

Organizations are building their networks in a different way—taking advantage of concepts like multi-cloud and SD-WAN technologies, and leveraging the power of IoT devices and the software-as-a-service revolution—to provide better customer service, empower their employees, and respond more quickly to market opportunities.

As businesses invest in these new tools to digitize their operations and move to the cloud so they can better compete, the legacy world of data center and interlocked branches policed centrally is fundamentally changing. The network perimeter that we have been used to is permanently dissolving.

Indeed, as devices proliferate, remote access becomes the norm, and companies increasingly store data and run applications from the cloud, the threat matrix that companies face becomes varied and complex.

Enterprises need to understand that the more they take advantage of the benefits of the digital transformation, the more of their critical applications and data will be stored, accessed and run in the public domain—outside of direct corporate control. And at the same time, the expansion of IoT devices, BYOD policies, and remote access is increasing the surface area through which malicious actors can gain access to the network.

Security is no longer something that can be considered as an add-on to running an enterprise network, it needs to be integrated into how enterprises think about their entire digital transformation strategy.

A New Social Contract

Ask anyone what the key to digital transformation is and they’ll likely respond with one word: data. Data is what allows companies to allocate resources efficiently, identify new business opportunities, and provide targeted services to customers.

But data is also a resource in its own right, and one that is highly sought after by cyber-criminals. Criminals can steal data outright, as they did in the 2017 Equifax breach, or it can be locked down and held for ransom, like in the WannaCry ransomware virus that spread around Asia and the world in 2017.

So the opportunity for business is there, and so too is the risk. The digital transformation gives companies the chance to grow, and provide goods and services when and where they are needed, all while reducing operating costs and lowering friction between buyers and sellers. But as the value of personal data becomes more widely appreciated, the importance of securing that data becomes more important—both to a company’s reputation and to their bottom line.

We used to look at the “social contract” between businesses and customers as a simple financial transaction: a customer provides money and the company provides goods or services in return. A company’s reputation depended primarily on its ability to deliver on its promise.

Today—thanks in part to the digital transformation—that contract has changed. Reputations still depend on a company’s ability to provide goods and services, but a company’s ability to protect data plays a critical role as well.

In cases like this, the social contract is murkier. Customers may be receiving a service—but they are paying with their data, not dollars, or rupees, or yen. Furthermore, unlike dollars which become the company’s once the transaction is finished, data is fundamentally still tied to the customer, and will remain so forever.

Companies who collect and deal in valuable personal data, and that includes pretty much all organizations, thus have a much higher obligation to protect the data that they are gathering—not only to their customers, but to their owners and shareholders as well.

Data breaches can have dramatic effects on a company’s market value. A 2019 analysis published by British consumer-advocate website Comparitech found that the share price of companies who suffered a data breach lost an average of 7.27% in the immediate aftermath. The real damage occurs over the long term. While stock prices largely recover within a year, breached companies still lag behind the broader market, by 6.5% after one year, and nearly 13% after two.

The costs of cyber-threats

The decline in corporate value after a cyberattack has many causes. Some of the costs are obvious: the value of the information stolen, the disruption to customers and corporate productivity, and the cost of addressing the attack itself. There are longer-term costs as well. The company may incur fines or liabilities stemming from the attack, they may lose business or customers, or their share price may drop because of the hit to their reputation.

In 2018, Microsoft commissioned a study which found that these long-term, indirect losses can really add up. Microsoft found that cyber-attacks could cost large firms in Asia up to $30 million, a majority of which came from the deeper impacts on the company’s business, ecosystem, and economy.

Cyberattacks can also do damage before they even occur. The Microsoft study found that nearly 60% of their respondents were putting off initiatives to take advantage of the digital transformation because of concerns over cybersecurity.

This is the most tragic cost of cyber-security. Sixty percent of businesses aren’t taking advantage of opportunities afforded by the digital transformation, choking off growth before it even has a chance to begin.

Next Level Networking: A new model for network security

As enterprises build networks for this new digital era, we are finding that they have very different architectures from the traditional hub-and-spoke, data-center-centric model.

As the pace of digital transformation accelerates, the way that businesses operate, procure, and consume technology is changing more quickly than ever before. Organizations need to embrace this change and understand that in this new era, the way that we build secure networks is changing as well. We call this new paradigm “next level networking.”

Organizations need to think differently about network security in this new era of networking. Companies need to change their mindset: as the digital transformation seeps through industries in all sectors, the way organizations procure and consume technologies is changing as well.

Organizations can’t afford to think of network and security as separate fields, with individual solutions siloed from one another. Concepts like SOAR (Security Orchestration, Automation and Response) demand networking professionals to re-think their architecture from the ground up. Fundamental services like DNS can’t be an afterthought to security, but rather can be brought into the security picture and leveraged for a stronger defense.

This paradigm shift will not be comfortable for many. It is never easy to fundamentally change two decades of expertise and learn something new.

But if businesses are to succeed in this new era and take advantage of the benefits of digital transformation, they will need to embrace innovation quickly and rethink the role that cybersecurity plays across their network. Integrated, robust cybersecurity must be a fundamental consideration when considering business strategy, not only for today, but for the future.