Wireless Anker Soundcore Life Q20 Bluetooth Headphones perfect for travel and work

Soundcore Life Q20

Hear songs in the way they are meant to be heard with Anker Soundcore Life Q20 Bluetooth Headphones. The wireless Over Ear Headphones are perfect for travel and work as it features custom 40 mm dynamic drivers to reproduce sound with extraordinary clarity, Hybrid Active Noise Cancelling, Hi-Res Audio and Deep Bass for a heightened listening experience.

Compatible with smartphones, tablets, laptop computers and more, Life Q20 offers up to 40 hours of non-stop playtime in wireless active noise cancellation mode and a single charge can play over 600 songs.

Soundcore LifeQ20

For optimal noise cancellation, memory foam earcups gently mold around your ears, while the headband’s rotating joints automatically adjust the earcups to fit the shape of your head.

This ensures that Life Q20 active noise cancelling headphones deliver maximum comfort and a secure seal to enjoy the BassUp technology that stops ambient sounds, enhancing your listening experience. Life Q20’s built-in microphone allows convenient hands-free calls, enhances voice pick-up to ensures you sound crystal clear.

Soundcore Life Q20 comes with a travel pouch to conveniently store the headphones, a 3.5 mm AUX cable to keep the music playing when you’re low on battery and a Micro USB cable plus a user Manual and 18-Month Warranty.

 

Heaven on Earth – Picturesque Pakistan

attaabad-4332042

By Shereen Shabnam

Pakistan is blessed with abundant natural and dynamic landscapes with crystal clear rivers, arid deserts, lakes, waterfalls, springs and snowcapped mountains in abundance but I only realized how beautiful the country really is recently when I chanced upon some images online of the Hunza Valley and Gilgit.

Visitors to this fascinating region describe it as heaven on earth and the stunning mountain ranges has started bringing tourists to the country in great numbers recently.

What caught my eye in the images was the spectrum of colours in the natural surroundings of the villages that leaves one truly mesmerised. The lakes, the trees, the meadows, the flora and fauna brightening up the scene with pink, white, red and orange flowers looking as magical as the fiery sunsets in the evenings.

This motivated me to explore more images of Pakistan, a place I have wanted to visit as a child when I first started learning Urdu in school in Fiji Islands. The country has bustling cities, wild frontiers, colourful landscapes but most of all, the message that came across strongly from visitors and travel bloggers was the charm and hospitality of the locals.

tree-2363346

Every Pakistani friend I have met, every travel blog I read and speaking with foreigners and travellers I met around the world as we exchanged our travel notes said the kindest, down to earth, hospitable, charitable and warm people they met during their travels was in Pakistan which made me even more curious to plan a visit but a pandemic laid my plans to rest.

Not wanting to give up hope of visiting this enchanting country in the future, I asked my friends for information, images and ideas on where to go and what to do in Pakistan. Trying wholesome local food was on top of the list of everyone who has been to Pakistan. As a foodie and as an editor of three coffee table cookbooks, this was music to my ears.

My Pakistani friend in UAE invited me to sample some delicacies at her home so I would know what to order when I got to Pakistan. She cooked many iftar meals in Ramadan and the Biryani dishes, meat dishes and sweets surpassed every curry meal I have ever had so I am looking forward to a delectable culinary journey when I land in Pakistan when borders open.

hunza-2211845

Another thing that caught my eye as a motoring enthusiast and Jury for regional and international Car awards was the stunning and epic highways in Pakistan – most roads are amazing for picturesque drives but some are an astonishing feat of engineering cut across mountains against the odds – somehow the local drivers make it look easy. Seeing the road trips others have taken and their pictures showcasing the natural beauty of the terrain makes the journey worth it up the rolling mountains and the quaint villages and valleys.

Most of our readers also love adventure tourism and Pakistan has plenty of that, including hiking, trekking and hunting. Those brave enough to venture outdoors into the rough terrain can come across mountain species like sheep, deers, gazelles, wild cats, buffalos, golden jackals, goats etc.

gilgit

Personally, if I ever make it there, I would prefer a walk along the small villages near Hunza and Gilgit areas that includes beautiful scenery, culture, some history, and try the fresh local fruits and authentic Pakistani food.

In addition to the outback areas, also on my bucket list is to experience the bustling city life in Pakistan, in particular the different markets. As I continue to explore Pakistan virtually for ideas on where to go and what to do, I am praying for travel restrictions to ease world over so that we get a chance to experience the beauty of countries like Pakistan first hand instead of images and videos online.

Environment friendly Express Auto Wash opens with express services

Express Auto Wash

Sanitising and disinfecting of car wash areas a priority in revolutionary car wash facility in Abu Dhabi

Express Auto Wash (EAW), a premium environment friendly automatic car wash facility located behind Mushrif Mall in Abu Dhabi is now open from 9am to 9pm daily offering express services for a five-minute exterior wash.

The cars are cleaned thoroughly using premium products from the USA as

the environment friendly facility allows multiple cars to be washed simultaneously, saving valuable time and ensures 95% of the water is recycled.

Express Auto Wash has the most reliable and safest high-tech car wash systems with high-pressure undercarriage water nozzles that add to the efficiency of the wash while the MN Tech 21 Turbo Drying System completes the drying process.

The fast and yet thorough clean saves customers valuable time that can be spent more productively at home and in the office. Auto Wash also offers touch free car wash for the more delicate and premium cars.

An Exterior Sedan wash costs AED 30/- and Exterior SUV costs AED 35/-.

Treat your dad this Father’s Day with gadgets from Anker Innovations

Anker Power Box

Make sure your father never runs out of charge on his phone with Anker Power Box. This Power Box contains three flagship products from Anker:

1) PowerCore 10400mAh Power Bank, a high capacity Power Bank that offers up to 3 times charging for Flagship Phones and comes with optimized output for Multiple Device Charging.

2) Powerport+1 Charger, equipped with PowerIQ Technology and Multiprotect Safety System, along with a micro USB cable, is travel ready with Quick Charge 3.0.

3) Powerline II 3-in-1 Charging Cable, the extremely durable and MFi Certified charging cable with 3-in-1 Connectors i.e. Lightning, Micro and C-Type and is Universally Compatible with every phone that uses these one of the three charging connectors. Available in Jumbo Electronics and EMAX.

Anker PowerConf Bluetooth Speakerphone

The new Anker PowerConf Bluetooth Speakerphone is perfect for dads. It can help him make any place a conference room as It can connect to the mobile phone or laptop ensuring he has clear discussions as the incoming amplified sound allows him to listen and speak simultaneously in any surroundings. This feature is perfect for teachers conducting e-learning classes as well.

The device features Omni-Directional Voice Pickup with six microphones arranged in a 360° array to pick up voices of up to eight people in a room without distracting noises and is compatible with all popular online conferencing services, including Skype, Google Hangout, Facetime, Zoom, WebEx, GotoMeeting, and Chromebox.

The PowerConf Bluetooth speakerphone has 24 Hours of call time and comes with integrated Anker PowerIQ technology that allows you to charge other devices via PowerConf at optimized speeds.

The lightweight and compact travel case protects PowerConf while on business trips or moving around and does not require other equipment to set up, making it perfect for small spaces. It is available on amazon.ae.

Soundcore Liberty Air 2

Soundcore Liberty Air 2 is known to be the true wireless in-ear headphones that comes with four built-in microphones with noise cancellation and filters out ambient noises.

Environmental noises are reduced by 60% to 95% to ensure crystal-clear diamond enhanced sound with twice the amount of bass. The HearID technology maps hearing sensitivity at multiple frequencies and intelligently analyzes results for a truly personalized listening experience.

For convenience, the one-Step Pairing ensures automatic connection to your device. The earbuds allow for 7 hours of playtime but the charging case provides a longer battery life of 28 hours on the go. Liberty Air 2 can also recharge its power through wireless chargers.

With a comfortable fit and the IPX5 for Water & Sweat Resistant, Liberty Air 2 gives freedom from messy wired headphones and offers the convenience of listening to music by the pool, during morning walks or while cooking and relaxing.

Available in all major electronics retail stores, Amazon.ae and noon.com

Nebula Apollo Pocket Projector

Nebula Apollo Smart Pocket Projector is a new generation pocket cinema in a compact, mobile and soda-can size design. Hosting capabilities such as Google Assistant, remarkable clarity with Sharp 200 ANSI lumen image and improved audio, it is the perfect entertainment device to enjoy together with family.

Nebula Apollo is perfect for dads who want to enjoy their favorite match or TV shows through streaming apps on the go on a bigger screen powered by Android 7.1 which brings great content to you, so you spend less time browsing and more time watching movies with loved ones.

Nebula Apollo provides 4-hours of video playtime with single full charge and offers big 360o sound with a 6W speaker. Nebula Apollo offers an advanced entertainment experience, anytime, anywhere with your loved ones.

Soundcore Infini Pro Soundbar

Give dad a Soundcore Infini Pro, the world’s leading surround sound technology, perfect for enjoying music, movies and favourite matches with astonishing clarity and richness.

Soundcore Infini Pro reproduces breathtaking, cinema-like audio from all around as Dolby Atmos® adds an overhead dimension to create an even more immersive movie watching atmosphere.

To produce room-filling sound, dual 2.5-inch mid-range drivers and 1-inch tweeters are paired with built-in up-facing 3-inch subwoofers and symmetrical bass reflex ports. To add even more bass intensity, the BassUp technology enhances bass output in real time.

Get the best Father’s Day gifts from Anker Innovations

As an unsung hero, provider and mentor, fathers always make our lives easier and better through many sacrifices and to make his life easier, Anker Innovations have curated a few gadgets that will make his day special and it is a perfect way to thank the main guy in our lives.

ANKER POWER BOX Pack-C2C

Anker Power Box

Make sure your father never runs out of charge on his phone with Anker Power Box. This Power Box contains three flagship products from Anker:

1) PowerCore 10400mAh Power Bank, a high capacity Power Bank that offers up to 3 times charging for Flagship Phones and comes with optimized output for Multiple Device Charging.

2) Powerport+1 Charger, equipped with PowerIQ Technology and Multiprotect Safety System, along with a micro USB cable, is travel ready with Quick Charge 3.0.

3) Powerline II 3-in-1 Charging Cable, the extremely durable and MFi Certified charging cable with 3-in-1 Connectors i.e. Lightning, Micro and C-Type and is Universally Compatible with every phone that uses these one of the three charging connectors. Available in Jumbo Electronics and EMAX.

Anker PowerConf Bluetooth Speakerphone

Anker PowerConf Bluetooth Speakerphone

The new Anker PowerConf Bluetooth Speakerphone is perfect for dads. It can help him make any place a conference room as It can connect to the mobile phone or laptop ensuring he has clear discussions as the incoming amplified sound allows him to listen and speak simultaneously in any surroundings. This feature is perfect for teachers conducting e-learning classes as well.

The device features Omni-Directional Voice Pickup with six microphones arranged in a 360° array to pick up voices of up to eight people in a room without distracting noises and is compatible with all popular online conferencing services, including Skype, Google Hangout, Facetime, Zoom, WebEx, GotoMeeting, and Chromebox.

The PowerConf Bluetooth speakerphone has 24 Hours of call time and comes with integrated Anker PowerIQ technology that allows you to charge other devices via PowerConf at optimized speeds.

The lightweight and compact travel case protects PowerConf while on business trips or moving around and does not require other equipment to set up, making it perfect for small spaces. It is available on amazon.ae.

Soundcore Liberty Air 2

Soundcore Liberty Air 2

Soundcore Liberty Air 2 is known to be the true wireless in-ear headphones that comes with four built-in microphones with noise cancellation and filters out ambient noises.

Environmental noises are reduced by 60% to 95% to ensure crystal-clear diamond enhanced sound with twice the amount of bass. The HearID technology maps hearing sensitivity at multiple frequencies and intelligently analyzes results for a truly personalized listening experience.

For convenience, the one-Step Pairing ensures automatic connection to your device. The earbuds allow for 7 hours of playtime but the charging case provides a longer battery life of 28 hours on the go. Liberty Air 2 can also recharge its power through wireless chargers.

With a comfortable fit and the IPX5 for Water & Sweat Resistant, Liberty Air 2 gives freedom from messy wired headphones and offers the convenience of listening to music by the pool, during morning walks or while cooking and relaxing.

Available in all major electronics retail stores, Amazon.ae and noon.com

Nebula Apollo Pocket Projector

Nebula Apollo Smart Pocket Projector is a new generation pocket cinema in a compact, mobile and soda-can size design. Hosting capabilities such as Google Assistant, remarkable clarity with Sharp 200 ANSI lumen image and improved audio, it is the perfect entertainment device to enjoy together with family.

Nebula Apollo is perfect for dads who want to enjoy their favorite match or TV shows through streaming apps on the go on a bigger screen powered by Android 7.1 which brings great content to you, so you spend less time browsing and more time watching movies with loved ones.

Nebula Apollo provides 4-hours of video playtime with single full charge and offers big 360o sound with a 6W speaker. Nebula Apollo offers an advanced entertainment experience, anytime, anywhere with your loved ones.

Soundcore Infini Pro Soundbar

Give dad a Soundcore Infini Pro, the world’s leading surround sound technology, perfect for enjoying music, movies and favourite matches with astonishing clarity and richness.

Soundcore Infini Pro reproduces breathtaking, cinema-like audio from all around as Dolby Atmos® adds an overhead dimension to create an even more immersive movie watching atmosphere.

To produce room-filling sound, dual 2.5-inch mid-range drivers and 1-inch tweeters are paired with built-in up-facing 3-inch subwoofers and symmetrical bass reflex ports. To add even more bass intensity, the BassUp technology enhances bass output in real time.

Security in the Age of Digital Transformation

By: Dr. Cherif Sleiman, Senior VP International Business at Infoblox

One of the privileges of my job is the opportunity to talk to business leaders across Asia about where they see the opportunities and challenges in their fields. And in all these conversations, two issues keep coming up: the digital transformation and cybersecurity.

Many of these leaders talk about these issues as though they are distinct, but after all my years of experience in this industry, I see them as essentially two sides of the same coin. Leaders really cannot consider the digital transformation without considering the broader cybersecurity concerns that come with it. And indeed, companies need to have robust cybersecurity policies in place if they want to take full advantage of the opportunities afforded by this fourth industrial revolution.

I will begin by talking about the challenges and opportunities afforded by the digital transformation, especially as they pertain to security.

Next, I will discuss the implications of big data on security, what this means for companies, and how they can forge a “new social contract” that will address the unique concerns of the data driven economy.

Finally, I will explain why companies seeking to undergo the digital transformation should focus on security first, and provide some advice for how they can integrate security-minded thinking into their digital transformation strategies.

Challenges of the Digital Transformation

The 2020s will be the decade of the digital transformation around the world.

Organizations are building their networks in a different way—taking advantage of concepts like multi-cloud and SD-WAN technologies, and leveraging the power of IoT devices and the software-as-a-service revolution—to provide better customer service, empower their employees, and respond more quickly to market opportunities.

As businesses invest in these new tools to digitize their operations and move to the cloud so they can better compete, the legacy world of data center and interlocked branches policed centrally is fundamentally changing. The network perimeter that we have been used to is permanently dissolving.

Indeed, as devices proliferate, remote access becomes the norm, and companies increasingly store data and run applications from the cloud, the threat matrix that companies face becomes varied and complex.

Enterprises need to understand that the more they take advantage of the benefits of the digital transformation, the more of their critical applications and data will be stored, accessed and run in the public domain—outside of direct corporate control. And at the same time, the expansion of IoT devices, BYOD policies, and remote access is increasing the surface area through which malicious actors can gain access to the network.

Security is no longer something that can be considered as an add-on to running an enterprise network, it needs to be integrated into how enterprises think about their entire digital transformation strategy.

A New Social Contract

Ask anyone what the key to digital transformation is and they’ll likely respond with one word: data. Data is what allows companies to allocate resources efficiently, identify new business opportunities, and provide targeted services to customers.

But data is also a resource in its own right, and one that is highly sought after by cyber-criminals. Criminals can steal data outright, as they did in the 2017 Equifax breach, or it can be locked down and held for ransom, like in the WannaCry ransomware virus that spread around Asia and the world in 2017.

So the opportunity for business is there, and so too is the risk. The digital transformation gives companies the chance to grow, and provide goods and services when and where they are needed, all while reducing operating costs and lowering friction between buyers and sellers. But as the value of personal data becomes more widely appreciated, the importance of securing that data becomes more important—both to a company’s reputation and to their bottom line.

We used to look at the “social contract” between businesses and customers as a simple financial transaction: a customer provides money and the company provides goods or services in return. A company’s reputation depended primarily on its ability to deliver on its promise.

Today—thanks in part to the digital transformation—that contract has changed. Reputations still depend on a company’s ability to provide goods and services, but a company’s ability to protect data plays a critical role as well.

In cases like this, the social contract is murkier. Customers may be receiving a service—but they are paying with their data, not dollars, or rupees, or yen. Furthermore, unlike dollars which become the company’s once the transaction is finished, data is fundamentally still tied to the customer, and will remain so forever.

Companies who collect and deal in valuable personal data, and that includes pretty much all organizations, thus have a much higher obligation to protect the data that they are gathering—not only to their customers, but to their owners and shareholders as well.

Data breaches can have dramatic effects on a company’s market value. A 2019 analysis published by British consumer-advocate website Comparitech found that the share price of companies who suffered a data breach lost an average of 7.27% in the immediate aftermath. The real damage occurs over the long term. While stock prices largely recover within a year, breached companies still lag behind the broader market, by 6.5% after one year, and nearly 13% after two.

The costs of cyber-threats

The decline in corporate value after a cyberattack has many causes. Some of the costs are obvious: the value of the information stolen, the disruption to customers and corporate productivity, and the cost of addressing the attack itself. There are longer-term costs as well. The company may incur fines or liabilities stemming from the attack, they may lose business or customers, or their share price may drop because of the hit to their reputation.

In 2018, Microsoft commissioned a study which found that these long-term, indirect losses can really add up. Microsoft found that cyber-attacks could cost large firms in Asia up to $30 million, a majority of which came from the deeper impacts on the company’s business, ecosystem, and economy.

Cyberattacks can also do damage before they even occur. The Microsoft study found that nearly 60% of their respondents were putting off initiatives to take advantage of the digital transformation because of concerns over cybersecurity.

This is the most tragic cost of cyber-security. Sixty percent of businesses aren’t taking advantage of opportunities afforded by the digital transformation, choking off growth before it even has a chance to begin.

Next Level Networking: A new model for network security

As enterprises build networks for this new digital era, we are finding that they have very different architectures from the traditional hub-and-spoke, data-center-centric model.

As the pace of digital transformation accelerates, the way that businesses operate, procure, and consume technology is changing more quickly than ever before. Organizations need to embrace this change and understand that in this new era, the way that we build secure networks is changing as well. We call this new paradigm “next level networking.”

Organizations need to think differently about network security in this new era of networking. Companies need to change their mindset: as the digital transformation seeps through industries in all sectors, the way organizations procure and consume technologies is changing as well.

Organizations can’t afford to think of network and security as separate fields, with individual solutions siloed from one another. Concepts like SOAR (Security Orchestration, Automation and Response) demand networking professionals to re-think their architecture from the ground up. Fundamental services like DNS can’t be an afterthought to security, but rather can be brought into the security picture and leveraged for a stronger defense.

This paradigm shift will not be comfortable for many. It is never easy to fundamentally change two decades of expertise and learn something new.

But if businesses are to succeed in this new era and take advantage of the benefits of digital transformation, they will need to embrace innovation quickly and rethink the role that cybersecurity plays across their network. Integrated, robust cybersecurity must be a fundamental consideration when considering business strategy, not only for today, but for the future.

Dimension Data, in partnership with NTT Ltd., is Offering Incident Response, at no cost, to UAE Hospitals Impacted by COVID-19 Cyber Attacks

Security specialist will provide 40-hours of Incident response services, at no cost, to public and private hospitals in the UAE that have faced attacks, enabling rapid restoration of critical healthcare services for COVID-19 patients

Following a significant spike in COVID-19 themed cyber-attacks on the healthcare sector, Dimension Data, a leading global systems integrator and managed services provider, is offering world-class Incident Response Remediation assistance at no cost to UAE hospitals combatting the pandemic.

Expertly designed to effectively contain and mitigate threats, Dimension Data’s service will enable affected UAE hospitals to rapidly restore operations after a successful cyber-attack and thus continue to deliver critical services to patients. Public and private hospitals as well as acute care hospitals, urgent care clinics, community health centres, and other emergency care settings are all eligible to 40-hours of incident response support, at no cost, on the condition that they are directly providing care to COVID-19 patients.

In a recent statement, INTERPOL, the International Criminal Police Organization, highlighted that it has detected a significant increase in cyber-attacks against hospitals around the world that are engaged in the COVID-19 response, and warned that these attacks that could ‘directly lead to deaths’.

“The incredible rate at which the virus has spread has overwhelmed the healthcare sector. Dealing with the impact of the virus is challenging enough without the added complication of critical operations being derailed by cyber-attacks,” said Redouane Gaouar, Director Go-to-Market Practices and Strategic Partner Alliances at Dimension Data Middle East. “By offering our Incident Response service at no cost , our intension is to get front line doctors and nurses as well as all supporting functions trying to work in a compromised hospital, back to saving lives as quickly as possible.”

Given the National Disinfection Programme being implemented across the UAE, and concerns around social distancing, an especially attractive and relevant feature of Dimension Data’s Incident Response service is that it can be delivered on a 100% remote basis. Even under normal circumstances, the company performs 90% of its Incident Response engagements remotely and is therefore uniquely positioned to support hospitals in their recovery from cyber-attacks at this time.

“This global pandemic requires everyone to come together and help in any way possible. Dimension Data and its parent company, NTT Ltd., have the right skillsets, resources, and global scale to stand by our hospitals in this time of urgent need. We believe all hospitals should be secure and this program in deeply aligned with our global ‘Tech for Good’ values,” said Peter Pappas, Security Operations Executive at Dimension Data.

For further details on Dimension Data’s program and to request for support, healthcare providers are requested to visit https://www.dimensiondata.com/en-gb/expertise/intelligent-security/free-incident-response-during-covid-19.

SonicWall Advances Network Edge Security, Adds Multi-gigabit Switch Series, Easy-to-Manage SD-Branch Capabilities

Distributed organizations are continuously challenged with administering necessary security measures to thwart escalating cyberattacks to protect workforces outside of the protection of traditional networks. To simplify security deployment, management and visibility for organizations with growing branch footprints, SonicWall unveils new secure SD-Branch capabilities, and a complete line of new multi-gigabit switches, to cost-effectively scale and manage remote or branch locations.


“Business success often coincides with expansion, leading to an increased need for visibility, security and bandwidth across a distributed organization,” said SonicWall President and CEO Bill Conner. “As the world begins to re-open its doors, organizations must re-architect for the ‘new business normal,’ which includes implementing cost-effective, software-defined networking and security principles across the business.”

SD-Branch Critical Technology as Organizations Re-Architect for New Business Normal

To simplify the management needs associated with distributed locations, campuses and branch offices, new SonicWall secure SD-Branch capabilities deliver single-pane-of-glass management across LAN, WAN and security controls.

Complementary Zero-Touch Deployment capabilities help address the shortage of cybersecurity experts by enabling quick deployment of appliances and services. Cost-effective secure SD-WAN allows organizations to leverage less expensive internet links. Organizations also can choose cost-effective subscription license models to control costs and reduce operational overhead.

New SonicWall Switch Line Features 7 Models for All Business Use Cases

SonicWall’s new multi-gigabit switch line works seamlessly with SonicWall next-generation firewalls and SonicWave wireless access points, creating an end-to-end multi-gigabit network that can be easily managed via Capture Security Center, a scalable cloud security management system.

To maximize stack capacity, the switch can work independently, or with multiple switches, and can be daisy-chained to form a single switch with the port capacity of the combined switches. Organizations can tailor their speed and power with the option of seven different switches, managed with SonicWall next-generation firewalls (SonicOS 6.5.4.6 firmware), Web UI, CLI or the Capture Security Center (CSC).

“We have a unique environment with a mix of different vendor switches,” said Greg Thomas, ComLogic. “The ability to deploy two independent platform switches that seamlessly integrate with SonicWall products significantly helps streamline processes and reduce operational costs.”

SFP ports can be leveraged for multi-gigabit performance up to 10 Gbps, making it ideal for SD-Branches and enterprises with increasing bandwidth needs. The switch also features gigabit ethernet ports to power on wireless access points, VOIP phones and IP cameras.

“With companies forever changing how they operate with remote employees and offices, it’s more important than ever to ensure the maximum performance of applications, traffic and workflows,” said Conner. “These additions will allow IT departments to focus on other issues at hand, reduce budget constraints and finally address the shortage of critical cybersecurity skills.”

Accelerating Endpoint Protection for Boundless Workforces in COVID-19 Era
Employees warrant the same protection outside of the confines of corporate networks as they do when mobile or working from home. SonicWall Capture Client helps control and manage content accessed by endpoints with configured policies that allow or block access to various websites. This allows endpoint security and content filtering to be managed from the same management console and includes web activity reporting for easier monitoring.

Common operating systems, including endpoints using Windows, Windows Server, Mac and Linux, are protected from malware and other malicious attacks by autonomous detection and protection in mission-critical data centers or a standalone/disconnected networks.

As the number of endpoints become increasingly significant challenges for IT departments to manage and protect, a combination of SonicWall Capture Client, Secure Mobile Access and Cloud Application Security can provide protection for end-users, devices and applications beyond the traditional network.

Boundless Cybersecurity for the ‘New Business Normal’

The distributed IT reality is creating an unprecedented explosion of exposure points across enterprises, SMBs and governments. SonicWall’s unified Boundless Cybersecurity platform handles the most evasive and cutting-edge threats across a ‘boundless’ workforce of remote, mobile and cloud-enabled users.

This approach protects organizations across a range of attack vectors, including networks, email, mobile and remote access, cloud, SaaS applications, endpoints, IoT devices and Wi-Fi.

It is Security, not Covid-19, that Challenges the Commercial Deployment of 5G

By: Mohammed Al-Moneer, Regional Vice President of Sales – MENA at A10 Networks

Since the beginning of the current pandemic, false and unsubstantiated rumours of 5G and its impact on people’s health have been prevalent in social media. Phone masts have reportedly been damaged or destroyed in several European countries.

The scale of the problem prompted the World Health Organisation (WHO), the UN agency which is leading the response to the pandemic, to add the 5G conspiracy to its COVID-19 myth busters article, which highlighted that “viruses cannot travel on radio waves/mobile networks. COVID-19 is spreading in many countries that do not have 5G mobile networks.”

In the midst of this controversy, A10 Networks released a  report titled, “Toward a More Secure 5G World,” which highlighted how COVID-19 may result in some short-term delays for operators, but ultimately it demonstrates a global need for higher speed, higher capacity 5G networks and the applications and use cases they enable. The study also found that 81% believe industry progress toward 5G is moving rapidly, mostly in major markets, or is at least in line with expectations.

Whilst the report shows 5G adoption is scaling rapidly, one of the main concerns from the report was surrounding cybersecurity. As 5G networks expand, so does the explosive growth in network traffic, connected devices, and mission-critical IoT use cases. This will impact network security and reliability more than ever before. The report supported this view, with 99% respondents expecting 5G networks will increase security and reliability concerns and 93% have or may change security investments in light of 5G.

To address this challenge, service providers need highly cost-efficient security solutions that offer flexibility, scalability, and protection as they evolve their networks to 5G and integrate cloud and edge capabilities. This means a comprehensive security stack at service provider scale with other functions most needed in mobile networks, including a firewall for all network peering points, deep packet inspection (DPI), carrier-grade network address translation (CGNAT) and IPv6 migration, integrated distributed denial of service (DDoS) threat protection, intelligent traffic steering and analytics.

Below is a blueprint of five of the key solutions required for a successful migration to 5G.

  1. Gi-LAN Security – Gi/SGi Firewall

Significant threats to mobile subscribers and networks come through the internet interface – the Gi/SGi.  As traffic volume, devices and cybercriminal expertise increases, so do these threats. An integrated Gi/SGi firewall protects infrastructure and subscribers and delivers the performance that mobile carriers require. The Gi/SGi firewall solution meets both current and future traffic requirements for any service provider. This comprehensive and consolidated approach provides best-in-class performance, efficiency and scale to protect the mobile infrastructure while reducing OPEX and CAPEX costs. Service providers can also use a Gi/SGi firewall solution in a virtual form factor to gain a flexible, easy-to-deploy and on-demand, software-based deployment.

  1. Mobile Roaming Security – GTP Firewall

The GTP protocol used in the roaming and other EPC interfaces has known vulnerabilities that can be readily exploited by malicious actors. Operators must meet the growing security challenges while also providing a seamless subscriber experience – wherever they travel, whatever devices they use, and whatever network is accessed. A GTP firewall provides extensive capabilities including stateful inspection, rate limiting, and filtering of traffic for protocol abnormalities, invalid messages, and other suspicious indicators. It protects against GTP protocol vulnerabilities such as fraudulent use, confidentiality breaches, DDoS attacks by malicious peers and other threats. A GTP firewall can be inserted into multiple interfaces carrying the GTP traffic. In the primary use case, it is inserted on S5-Gn and S8-Gp (roaming) interfaces. The GTP firewall provides scalability and supports uninterrupted operations while protecting subscribers and the mobile core against GTP-based threats such as information leaks, malicious packet attacks, fraud and DDoS attacks through GTP interfaces in the access networks and GRX/IPX interconnect.

  1. Network Slicing – Intelligent Traffic Steering

Network slicing will allow mobile operators to offer security and other capabilities tailored to each vertical application and to capture revenue from these diverse use cases, without losing the economies of scale of common infrastructure. Network slicing isolates each use case or service from one another so that the services can be independently deployed, managed securely, and delivered in a robust way.  This solution identifies specific types of traffic by multiple criteria including radio access type, IP address, DNS address, device type, destination, subscriber ID, and other parameters and then redirects these “slices” of traffic to value-added service platforms, such as protection platforms for deeper threat analysis and scrubbing.  This re-direction can be based on either static policy or dynamic factors. This solution enables differentiated treatment to the developing 5G use cases, deepens the security posture and boosts revenue opportunity without adding unnecessary inspection load on the entire network.

  1. Network Wide DDoS Detection and Mitigation System

Mobile operators must maintain high network availability at all times. DDoS attacks target mobile networks and their subscribers with high volume message floods that overwhelm infrastructure and can cause service degradation and network outages. Now, targeted attacks can also come from any network peering point and include both volumetric and lower volume, sophisticated attacks against specific network elements or important applications of key enterprise customers. Over-provisioning of network elements to meet rising threat volume or simply blocking traffic during an attack increases costs and can result in service denial for critical traffic. Operators need a more cost-efficient and comprehensive approach that quickly detects and mitigates DDoS and infrastructure attacks across the entire mobile network without denying service to important traffic. Service providers can achieve full DDoS resilience and improve security by using a layered approach for detecting and mitigating attacks of all types and sizes before attackers take down their targets.

  1. Secure, Efficient MEC

Multi-Access Edge Compute (MEC) architecture is often part of the 5G transition plan. In a MEC architecture, network traffic processing functions move from a centralised data centre or mobile core to a number of distribution points that are located closer to the user at the “edge.” A distributed architecture with thousands of nodes increases management difficulty and requires a high level of automation and analytics for deployment, management and security and operational changes. We at A10 Networks offer a Thunder CFW solution that offers high performance, low latency in a software-based or hardware form factor for firewall, CGNAT and IPv6 migration, traffic steering and other functions. Many functions that may have been provided by single point appliances are combined into one appliance, virtual instance, bare metal or container.  Cost-efficient, high-performance security is ensured without exceeding space and power limitations. Centralised management and analytics simplify operations for lower TCO.

As we reach the halfway point of 2020, the A10 study indicates that major mobile carriers around the world are on track with their 5G plans, and more expect to begin commercial build-outs in the coming months. That means mobile operators globally need to proactively prepare for the demands of a new virtualised and secure 5G world. That means boosting security at key protection points like the mobile edge, deploying a cloud-native infrastructure, consolidating network functions, leveraging new CI/CD integrations and DevOps automation tools, and moving to an agile and hyperscale service-based architecture as much as possible. All these improvements will pay dividends immediately with existing networks and move carriers closer to their ultimate goals for broader 5G adoption.

 

Introducing Aruba ESP, the Industry’s First Cloud-Native Platform Built for the Intelligent Edge

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), today introduced Aruba ESP (Edge Services Platform), the industry’s first AI-powered, cloud-native platform that predicts and resolves problems at the network edge before they happen. Built on AIOps, Zero Trust network security, and a Unified Infrastructure for campus, data center, branch and remote worker locations, Aruba ESP delivers an automated, all-in-one platform that continuously analyzes data across domains, ensures SLAs, identifies anomalies and self-optimizes, while seeing and securing unknown devices on the network. Aruba ESP is designed to deliver a cloud experience at the edge and can be consumed either as a service in the cloud or on-premises, as a managed service delivered through Aruba partners, or via network as a service through HPE GreenLake. Tailored for varying economic requirements, customers may also procure it with flexible financing options via HPE Financial Services.

The technology market undergoes a major transition about once every decade. The last two decades were centered on delivering ubiquitous mobility followed by the move to cloud-based applications. We are now entering an era of data analytics driven by IoT, AI and automation supported by compute and modern networking to power a new breed of applications and workloads that work in concert with the cloud but that operate at the edge. As a result, enterprises are generating massive amounts of unstructured data at the edge which, if analyzed and acted upon properly, can be used to improve efficiencies, enhance experiences and enable new business outcomes. The key to turning these real-time insights into meaningful actions is to analyze and process this data at the point of origin – the edge – where people, devices and things connect to the digital world. This ability to generate actionable insights based on data is especially pertinent today during this unprecedented time in history where businesses, employees and, subsequently, the corporate network must adapt to rapidly evolving business and workplace needs.

Utilizing unstructured data at the edge requires a network that leverages AI via network telemetry to process that data at a rate and volume beyond what’s possible at human scale. It also requires an infrastructure with an AI-powered “sixth sense” that proactively identifies impending issues, recommends an accurate resolution and leverages automation to turn that into logical actions, all without manual intervention. Through continued analysis of network, user, and device insights, Aruba ESP turns information into knowledge, helping organizations accelerate transformation and maintain business continuity via a single, cloud-native platform that can reside either on-premises or in the cloud, and secures and unifies the infrastructure across the enterprise built on the following core principles:

  • AIOps is the critical component of Aruba ESP, which uses AI and analytics to identify exact root causes with greater than 95% accuracy, auto-remediate network issues, proactively monitor the user experience, tune the network to prevent problems before they occur, and use peer benchmarking and prescriptive recommendations to continuously optimize and secure the network. In a live customer deployment, using AIOps resulted in a 15% increase in throughput capacity and reduced issue resolution time by nearly 90%, ultimately resulting in a vastly improved end user and IT experience.
  • Unified Infrastructure consolidates all network operations for switching, Wi-Fi and SD-WAN across campus, data center, branch, and remote worker environments under Aruba Central, a cloud-native, single-pane-of-glass console that correlates cross-domain events to reduce issue resolution time and manual errors. In addition, Aruba’s unified infrastructure approach provides customers with a choice between controller services on-premises or in the cloud, delivering maximum flexibility at enterprise scale.
  • Zero Trust Network Security combines built-in role-based access technology, Dynamic Segmentation and identity-based intrusion detection to authenticate, authorize and control every user and device connecting to the network, while still detecting, preventing, isolating and stopping attacks before they impact the business.

“The Intelligent Edge is the catalyst that will spark limitless possibilities for organizations and enterprises that want to accelerate transformation and ensure business continuity by leveraging their technology investments as their greatest asset,” said Keerti Melkote, president of Aruba, a Hewlett Packard Enterprise company. “Built upon Aruba’s guiding principles of connect, protect, analyze, and act, Aruba ESP is the culmination of years of innovation, R&D, Aruba ingenuity and, most importantly, input from our valued customers whose honest feedback and insightful perspective has helped to make this platform a network that knows.”

New Innovations Within Aruba ESP

Aruba ESP is the industry’s most scalable, full-stack, cloud-native platform for wired, wireless and SD-WAN environments that unifies multiple network elements for centralized management and control. Aruba ESP is based on open standards and enables integration with a variety of third-party solutions and services. Significant innovations introduced today include:

  • Cloud-native management for any size enterprise – Aruba Central currently runs mission critical networks for over 65,000 customers and now with new ArubaOS services, it is the industry’s only controllerless, cloud-based platform to provide full-stack management and operations for wired, wireless and SD-WAN infrastructure of any size across campus, data center, branch, and remote worker locations to be consumed on-premises or in the cloud.
  • Simplified daily operations with unified infrastructure – With access to a common data lake via Aruba ESP, the latest version of Aruba Central has been enhanced with simplified navigation, advanced search, and contextual views to present multiple dimensions of information through a single point-of-control, virtually eliminating the need for disparate tools to collect and correlate information across numerous domains and locations.
  • Reduced resolution time with AI and automation – Aruba has a proven track record of bringing AI-powered innovations to market, including unique technologies like Aruba AirMatch. Based on modeling data from over one million network devices generating over 1.5B data points per day, Aruba’s new AI Insights reduces troubleshooting time by identifying hard-to-see network configuration issues and providing root-cause, prescriptive recommendations and automated remediation to continuously optimize network operations.
  • AI-powered IT Efficiencies—Aruba Central now offers AI Search, a Natural Language Processing data discovery service that enables IT teams to eliminate “swivel chair” investigations by using simple, English language queries to extract comprehensive user and device information from Aruba ESP’s common data lake to present relevant information in context to quickly resolve a problem. For more complex issues, AI Assist uses event-driven automation to collect and post all the relevant data for both the internal help desk and Aruba Technical Assistance Center (TAC).
  • Granular visibility across applications, devices and the network – Enhancements to Aruba Central enable user-centric analytics from User Experience Insight to identify client, application, and network performance issues faster.
  • Extension of next-gen switching to distributed and mid-size enterprises – To help organizations accelerate Edge transformation, Aruba has expanded its CX Switch portfolio to include the Aruba CX 6200 Switch Series. This new series brings built-in analytics and automation capabilities to every network edge where user and device connectivity occurs, generating insights that can be applied to informing better business outcomes. The CX 6200 switch series further expands Aruba’s end-to-end CX switching portfolio, enabling customers to run a single operating model from the enterprise campus and branch access layer to the data center.
  • Ongoing innovation with new Developer Hub – Aruba is introducing the Developer Hub, a comprehensive resource for developers that includes Aruba APIs and documentation to streamline the development of innovative, next-generation edge applications leveraging the open Aruba ESP platform.

“Our large-scale network spans multiple campuses and learning centers that run performance-stringent applications to keep our students, academics and researchers connected and productive,” said Ron Gardner, senior infrastructure engineer at James Cook University. “We have chosen to take a cloud-first approach to operating our infrastructure and the enhancements to Aruba Central and ArubaOS give us the visibility and insight to simplify operations while reducing our equipment footprint and securely manage our large campuses and distributed locations from the cloud, ultimately allowing us to proactively identify and address issues before they disrupt operations.”

To address the varying business and technical requirements of organizations looking to harness the power of the Intelligent Edge, Aruba has expanded its consumption and procurement options. These include network as a service through HPE GreenLake or customers can procure Aruba ESP with flexible financing options via HPE Financial Services. For example, customers can acquire the technology they need today and pay only 1% of the total contract value each month for the first eight months, deferring over 90% of the cost until 2021.

“With the size of our infrastructure and massive volume of data being generated at the edge, we needed a way to identify, fix and fine-tune the network automatically,” said Brandon Stratton, ES network administrator of Information Technology at the University of Houston. “Aruba’s expertise and approach with AI-based solutions, like NetInsight, represents a pragmatic path for us to analyze and then act on the insights we capture.”

Tune into ATM Digital beginning June 9th to see Aruba ESP in action, hear from industry luminaries and experts, and learn about the latest advancements in networking. Register here to attend.