Digital Health Middle East Conference sets the stage for the new decade and future health care delivery

Digital Health Middle East 2020, held at the Armani Hotel, Burj Khalifa on the 24th of February will be engaging key stakeholders across the healthcare ecosystem. Held for the past five years in Scandinavia, this is the first time the conference gathers in Dubai to present intelligent design, pioneering technologies, advance clinical services and personalised care to improve outcomes, reduce costs and prioritise on prevention.

 

“This conference will address studies, hands-on cases and latest technology utilisation for future healthcare delivery, defining digital strategies, service improvement, ethical flows of data and secure, personalised care. Digital Health in itself will provide more accurate health outcomes and better patient experiences” – Johan Ehrstrom, CEO of Digital Health Middle East 2020.

 

Meet 250+ peers from across the ecosystem, and 20+ global speakers for a dialogue, vital insights and networking as this C-level hub facilitates knowledge exchange and game-changing strategies. Digital Health Middle East brings C-level attendees including executives and CXO’s, governmental department heads, hospital leaders, nurse leaders, regulators, technologists, futurists and entrepreneurs.

 

In the new decade, Digital Health will reform the industry with preventive information and new care solutions. Exponential technologies will increase access and improve how care will be delivered with the highest levels of safety, quality and patient experience, at the lowest cost.

 

Attendees will discover the powers of AI, machine learning and robotics among pioneering technologies affecting healthcare delivery, get hands-on case studies, objective insights, real-world scenarios and accurate foresight on the future of digital health.

 

Private sector participants can register on www.digital-health.me for USD 795 including materials, case examples, food & beverage and valet. Public sector attendees can register for USD 495.

 

Infoblox to Host Cybersecurity Roadshow 2020 across Middle East and Africa

Infoblox Inc., the leader in Secure Cloud-Managed Network Services, announced thatitis hostinga5-citycybersecurity tourthroughoutMiddleEast &Africa (MEA) under the theme ‘Take Network Security to the Next Level’. The roadshow will kick off on February 24th, 2020 inAmman, Jordan and will conclude in Kuwait City on the 11thof March.  

Ashraf Sheet, Regional Director MEA at Infoblox says, “Today’s enterprise is truly borderless. The network perimeter is dissolving with digital transformations like SD-WAN, IoT, and hybrid cloud, complicating traditional security approaches. Remote branches are directly connecting to the internet, losing the protection of the full security stack deployed in the data centre.”

“Securing these evolving IT architectures adds to the burden on short-staffed security teams who are already dealing with an overwhelming number of alerts and rigid siloed security tools. What’s needed is a foundational approach that is simple yet pervasive, cost-effective yet powerful and boosts the efficiency of security operations through automation.”

At the 2020 road tour, Infoblox and its strategic partners will help regional organizations understandhow to unleash the full power of their security stack, improve incident response times through extensive integrations and extend protection to support their digital transformations.

Infoblox experts will discuss how organizations are addressing core networking challenges in security and next-gen data centres and eliminating weaknesses within the core infrastructure. Event attendees will get an opportunity to participate in interactive sessions, see live demos and be inspired by industry leaders and real-world stories from organizations who will share how they are driving growth, innovation and digital transformation with Infoblox solutions. The interactive sessions will cover how to:

  • Use foundational network services to easily and cost-effectively secure evolving IT architectures
  • Provide visibility into and secure multi cloud platforms
  • Understand security risk when internal DNS is bypassed due to the use of DoH (DNS over Https)
  • Lower incident response times using automatic data sharing and ecosystem integrations
  • Optimize your security costs

The full schedule of the road show, with dates andcitiesforthetouracross Middle East & Africa areasfollows:

24 February 2020       Amman, Jordan                       Register

26 February 2020       Doha, Qatar                             Register           

02 March 2020            Riyadh, Saudi Arabia               Register

04 March 2020            Johannesburg, South Africa   Register

10 March 2020            Kuwait City, Kuwait                 Register

Aruba Advances Digital Retail Experiences with SD-Branch Innovations

SD-Branch Pioneer Extends Zero Trust Security and New Cloud-native Management Capabilities to Enable Non-stop Retail Operations at Scale

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), today announced the next milestone for its SD-Branch solution that enables more secure, streamlined and simplified deployment and management of large distributed retail networks.

A critical component of the company’s Edge-to-Cloud strategy, Aruba’s SD-Branch solutionintegrates Aruba Branch Gateways with the Aruba Centralcloud management platform to provide a single point of control and management for SD-WAN, wired and wireless networking to enable secure, simplified branch connectivity at scale. The innovations include: 

  • An expansion of Aruba’s unified branch defense capabilities to provide unique, identity-based attack detection and intrusion prevention to deliver zero trust in-store network security; 
  • New enhancements to the SD-WAN Orchestrator in Aruba Central to deliver unified edge-to-cloud management and secure connectivity to cloud workloads; 
  • New branch gateways that provide non-stop connectivity via built-in cellular, including LTE. 

Retail IT teams are under tremendous pressure to drive digital transformation within brick-and-mortar locations and “place the store at the center of their customer experience”[1]in order to compete with online merchants and marketplaces. To achieve this, they are leveraging next generation technologies to enable personalized, immersive experiences within the stores, but are consistently challenged by the lack of on-site technical staff at branch locations. As such, IT staff responsible for connecting, securing and managing retail locations must rethink the way they architect their branch networks. A unified edge-to-cloud architecture that automates and secures LAN, WAN and cloud connectivity is paramount to driving operational efficiency and addressing the lack of IT staff.  

“As we continue to grow our retail stores internationally, we are laser-focused on using technology to deliver our customers a truly unique shopping experience,” said Stewart Ebrat, CIO at Vera Wang. “With Aruba’s SD-Branch solution as the solid foundation for a secure, easy-to-deploy and centrally managed infrastructure, we will also be able to better engage with our customers by identifying them via their mobile phones so that store associates can help personalize and transform their in-store shopping experience.” 

Delivering Zero Trust Security to the Retail Branch

While retailers are embracing digital technologies – such as mobility and IoT – to enhance the shopper experience, they are also facing new security threats and an increased attack surface. Traditional security techniques were simply not designed to handle these new and evolving threats; as a result, many IT teams are adopting a Zero Trust Security framework, an architecture that dictates that no one within or outside the network is trusted. Key elements of a Zero Trust Security framework include a policy engine/trust broker, the ability to dynamically segment traffic on the basis of identity and role, and continuous monitoring for changes in security status with the corresponding real time adjustment of access policies. In addition, IT teams gain enhanced security by employing a Secure Access Service Edge (SASE) approach, which combinesnetwork security functions with WAN capabilities to support the dynamic secure access needs of organizations.[2]

Aruba has long supported the principles of a Zero Trust Security framework with its market-leading role-based access technology and Dynamic Segmentationwhich provides unified, software-defined micro-segmentation across the network, in branch and campus environments, to isolate users, devices and applications from one another based on role, not the type or location of the network connection. Aruba is advancing its unified branch defense capabilities with new IDS/IPS functionality that integrates with Aruba’s ClearPass Policy Managerand Policy Enforcement Firewall. By leveraging role-based access, Aruba adds a new identity-based detection dimension to traditional intrusion detection and prevention, enabling security teams to focus on alerts that matter. 

Aruba’s unified branch defense also includes:

  • One-click integration with cloud-based security solutions;
  • Threat visibility and trend analysis;
  • Correlation of security events with sites, clients, applications and network infrastructure;
  • Out-of-box policies for enforcement and incident response;
  • Security event streaming to third-party Security Information and Event Management (SIEM) solutions;
  • ClearPass Policy Manager for global access policy development and propagation.

Aruba’s unified branch defense capabilities deliver a complete solution for security and connectivity at retail locations, defending against a myriad of threats, including phishing, denial of service (DoS) and increasingly widespread ransomware attacks. 

Seamless Zero Trust from Edge-to-Cloud 

As adoption of software-as-a-service (SaaS) applications and virtual private clouds (VPCs) continue to rise, so has the complexity of maintaining security and control over the data, traffic and users accessing the cloud. Aruba is extending its Zero Trust Security model to the cloud with the enhanced SD-WAN Orchestrator in Aruba Central,making it easier for branch network operators to deploy flexible and secure overlay topologies in a large-scale edge infrastructure, securely connecting thousands of remote locations to applications in data centers and the cloud. 

Aruba Virtual Gateways, available for AWS and Azure, combined with orchestration, cost-effectively extend network and security policies to workloads running in the public cloud while the new SaaS Express prioritization feature continuously probes hosting locations for SaaS applications to ensure application performance.

Ensuring Non-Stop Operations at Every Retail Location

To help ensure a seamless shopping experience, retailers need a highly reliable network infrastructure as the foundation for digital transformation. Built-in cellular access in the Aruba 9004 Series Gateways gives customers the option to use the connection as a primary or secondary uplink or in a load shared active-active mode with other broadband links.Further, for cost control purposes, retailers can selectively use the cellular uplink for certain applications in any of these modes. 

Embedded cellular provides retailers with reliable, high performance backup connectivity with seamless failover that can be centrally managed. IT staff are able tune and optimize connectivity by defining SLA policies across a combination of MPLS, Internet and cellular links enforced with dynamic path steering in real-time with the ability to select the preferred cellular link. The cellular link can also be used for remote locations or to accelerate the deployment of a new store until the dedicated MPLS or Internet links are installed.

“Aruba pioneered the SD-Branch solution, creating a new category beyond pure-play SD-WAN offerings that gives retail IT the ability to face the higher-level challenges of remote branch connectivity, such as reducing device footprint, unified management across WAN and LAN, and security,” said Kishore Seshadri, vice president and general manager of SD-WAN Solutions at Aruba, a Hewlett Packard Enterprise company. “Today’s advancements extend Aruba’s SD-Branch solution to further support retail network operators with new, integrated in-store security capabilities, public cloud workload orchestration, and resiliency that retailers need for non-stop operations.”


[1]Forrester Research, US Retailers: Adapt Your Stores to Compete with Marketplaces, December 2019

[2]Gartner, Say Hello to SASE (Secure Access Service Edge),December 29, 2019

Parivar Restaurant opens doors at Al Raha Mall

Parivar Restaurant is now open at Al Raha Mallserving wholesome and heartwarming North Indian, Pakistani and Nepalese cuisine featuring chaat, tandoori, veg and non-veg dishes, soups and desserts made with fresh handpicked ingredients and authentic spices.

Mr. SadiqAfridi, Mall Manager at Al Raha Mall said, “We are excited to add Parivar Restaurant as an additional F&B feature for Al Raha Mall as it is unique in offering Indian, Pakistani and Nepalese in one setting and offers an additional advantage for the nearby community by providing delivery services for their convenience. Al Raha Mall is committed to bringing a variety of dining options to enhance the retail experience for shoppers.”

Waqas Sheikh, Managing Partner, Parivar Restaurant adds, “Our chefs bring guests an enjoyable dining experience by offering authentic dishes that are always made fresh for dine in as well as bespoke catering services for both private and corporate events. We are also opening Baan Thai Restaurant in Al Raha Mall where the famous Chef Supaniya from Bangkok will be preparing mouthwatering authentic Thai cuisine. We look forward to providing the best service to Al Raha Mall patrons and the neighboring community.”

With ample parking and a host of retail and service outlets, Al Raha Mall is an ideal mall for busy professionals and families looking for a one stop venue to eat, shop and play.

Other Al Raha Mall outlets include, Lulu Express Supermarket, Brands4U, Dubai Library, Borders bookshop, Al Raha Cinema, Sparky’s, Damas Jewellery, Aster Optical, Tag World, Orlando Sports, ELC, Nayomi, H collection. Services include Etisalat, Du, Al Ansari Exchange, Jumassan Salon, Young Musician, Photo studio, ATM’s and Green Land Flowers. Food lovers can enjoy Caesar’s Restaurant & Confectionery, Tche Tche Boulevard Restaurant, Subway, Papa Murphy’s, Charley’s, Burger Hut, Soulful Restaurant, Samurai Japanese Restaurant, Sapori Veri Restaurant. Coffee connoisseurs can head to Fresh Bakes Café, Bonjour Bonsoir Café, Gloria Jeans and Orange Wheels.

NetApp 2020 Predictions

By: Atish Gude – Senior Vice President and Chief Strategy Officer (CSO) NetApp

2019 was a year of rapid innovation—and disruption—for both the IT industry and the broader business community. With the widespread adoption of hybrid multicloud as the de facto architecture for enterprise customers, organizations everywhere are under tremendous pressure to modernize their infrastructure and to deliver tangible business value around data-intensive applications and workloads.

As a result, organizations are shifting from on-premises environments to using public cloud services, building private clouds, and moving from disk to flash in data centers—sometimes concurrently. These transformations open the door to enormous potential, but they also introduce the unintended consequence of increased IT complexity. 

We predict that a demand for simplicity and customizability will be the number one factor that drives IT purchasing decisions in 2020. Vendors will need to offer modern, flexible technologies with the choice of how to use and to consume those technologies so that customers can keep pace with their evolving business models. As IT departments strive to deemphasize maintenance and hardware, to reduce overhead, and to adopt pay-as-you-go models, simplicity and choice will be crucial. 

Achieving this simplicity will serve as the foundation for companies as they navigate the exciting technological trends that we identify in the following sections.

 

1. As the advent of 5G makes AI-driven Internet of Things (IoT) a reality, edge computing environments are primed to become even more disruptive than cloud was.

In preparation for the widespread emergence of 5G, lower-cost sensors and maturing AI applications will be used to build compute-intensive edge environments. This effort will lay the groundwork for high-bandwidth, low-latency AI-driven IoT environments with the potential for huge innovation—and disruption.

The advent of 5G is what AI-driven IoT has been waiting for. It will take a few more years for 5G data technology to spread across the Middle East. However, 2020 will see many players in the technology industry and business community invest in building edge computing environments to support the reality of AI-driven IoT. These environments will make possible new use cases that rely on intelligent, instantaneous, and autonomous decision-making, with low-latency, high-bandwidth capabilities. This evolution will bring us to a world where the internet will work on our behalf—without even having to ask. 

This AI-driven IoT innovation, however, will depend on a massive prioritization of edge computing, further disrupting IT infrastructures and data management priorities. As edge devices move beyond home devices (such as connected thermostats and speakers) and become more far-reaching (such as connected solar farms), more data centers will be placed at the edge. Also, platforms such as artificial intelligence for IT operations (AIOps) will be necessary to help monitor complex environments across the edge, the core, and the cloud. 

 

2. The impact of blockchain will be undeniable as indelible ledgers rapidly enable game-changing use cases outside of cryptocurrency. 

The world is quickly moving beyond Bitcoin to adopt enterprise-distributed indelible ledgers, setting the stage for a transformation that’s exponentially bigger than the impact that cryptocurrency has had on blockchain in finance. 

While the crypto frenzy continues to steal the limelight when it comes to blockchain, most players in the industry understand the bigger picture of the technology and its potential. Going into 2020, we will see a tipping point for larger implementations as enterprises go a step further to adopt indelible ledgers based on Hyperledger, which represents the maturation of blockchain for wider use cases. Indeed, we will start to see blockchain go “mainstream” as it enables industries such as healthcare to create universal patient records, to improve chain-of-custody pharmaceutical processes, and more. 

With such use cases validating blockchain and indelible ledgers, additional widespread adoption of the technology will drive transformation across society on a larger scale. This widespread adoption will build on the disruption that cryptocurrency has brought to finance to touch nearly every industry. As a result, new data management and compute capabilities will encourage companies to invest in indelible ledgers to build differentiated applications and to collaborate on critical, sensitive datasets.

 

3. Hardware-based composable architecture will have less short-term potential against commodity hardware and software-based infrastructure virtualization.

Continued improvements in commodity hardware performance, software-based virtualization, and microservice software architectures will eliminate much of the performance advantage of proprietary hardware-based composable architectures, relegating them to niche data center roles soon. 

Hardware-based composable architecture is being hyped as the next evolution of hyperconverged infrastructure (HCI). This architecture enables CPUs, networking cards, workload accelerators, and storage resources to be distributed across a rack-scale architecture and to be connected with low-latency PCIe-based switching. And although composable architecture does have potential, standardization has been slow, and adoption has been even slower. Meanwhile, software-based virtualization of storage, combined with software-based (but hardware-accelerated) compute and networking virtualization solutions, offers much of the flexibility of hardware-based composable architectures today with lower cost and consistently increasing performance.

Next year, attempts to build a true hardware-based rack-scale computing model will no doubt continue, and the space will continue to evolve quickly. However, most organizations that must transform within 2020 will be best served by a combination of modern HCI architectures (including disaggregated HCI) and software-based virtualization and containerization. 

Winter Holiday Travel Tips: Staying Protected from Cybercrime

By: Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox

As 2019 draws to a close and expatriates pack their bags and book their tickets to return to their home countries for the winter holiday season, nothing could possibly go wrong—except for a potential cybersecurity attack! Here are eight tips on how to stay protected while you are away on holiday:

Avoid travel booking scams

Quite a few people get scammed while booking travel plans online. Unfortunately, there are many fraudulent websites that lure customers in by using fake domain names similar to those of well-known travel-booking agencies. To keep yourself protected, do your research on different travel booking websites and make sure you are using real and trustworthy websites. A quick check to see if there is a “lock” icon in front of the URL and the website domain doesn’t have any unusual letters is a great place to start.

Protect your log-in credentials

Whether checking into a flight, confirming reservations for hotels, or making new reservations with websites you have accounts with, your information can be vulnerable. Sophisticated “forgeries” of popular booking sites are far too common and fool people into surrendering their usernames and passwords, which attackers will exploit. A simple technique to avoid falling victim is to use a username and password you know is wrong. If the site accepts it, pretending to log you in, you will know that it is a fake site, and your credentials are still protected.

Be cautious of using public Wi-Fi networks

Many airports and local cafes offer free and public Wi-Fi networks for users. These are often tempting to use, especially as a traveller who wants to stay connected online and get some work done. However, these networks are not secure—even if they are paid. Paying to use restricted networks does not necessarily make them safe. Infiltrators have complete and easy access to these open networks, and they are ready to attack at any given moment. For example, be aware of evil twins: attackers can establish rogue Wi-Fi networks with names such as “Free Wi-Fi.” Be sure to confirm the name of the hotspot before connecting. To stay protected, use a VPN or a private mobile hotspot when browsing the web on vacation to keep your data secure.

Avoid using public computers

When opting to use a public computer, it is best to refrain from accessing sensitive information, including logging into bank accounts and making online transactions. Assume that all activity on public computers can be seen and recreated by others. Attackers can install keyloggers on public computers, allowing them to recreate any data including log-in credentials and more. Rather than purchasing items online, it is highly recommended to pay for items upfront at the vacation destination. However, if you absolutely need to use the internet during travel, use your mobile device, which is much safer than a shared computer system. You can also get VPN apps for most mobile devices, so if you need public WiFi as well, your connection will be protected.

Disable Bluetooth access

Bluetooth connections are generally secure, as they typically require confirmation from the person who is pairing the devices together. However, there is a real risk of Bluetooth settings not being configured properly, resulting in cybersecurity dangers. Occasionally, personal devices are set to automatic pairing, giving cybercriminals easy access to devices. This allows them to easily steal data and to infiltrate systems with malware. Before leaving on vacation, check to make sure all Bluetooth connectivity settings are secure. However, the safest option would be turning off Bluetooth networking altogether.

Update and backup devices

Keeping technology software and applications up-to-date is crucial. Outdated software leaves users vulnerable to security breaches because hackers are often able to find security holes. The easiest way to do this is to turn on automatic updates on all your devices. To prepare for the worst, it is suggested to back up all of your information before the trip in the event that files and data go missing.

Pack a portable charger

Bring a portable charger or a personal charging cube along. Avoid using public charging stations as much as possible to keep from falling victim to “juicejacking.” This crime occurs when hackers trick travellers into charging their devices, while the charger cord actually connects to a hidden computer. The computer then downloads all the information off of the personal device, including important data such as usernames and account numbers. Therefore, it is much safer to bring a personal power source.

Install a privacy screen

Privacy screens “black out” the sides of devices, ensuring that the only person who can read the screen is the person who is actually using the device. They are inexpensive and provide a very easy solution for prying eyes. They are also much more effective than simply dimming the brightness of the screen. Anyone could be lurking nearby at the airport or at the hotel lobby, so play it safe and get a privacy screen today.

Conclusion

There are many simple and cheap precautions that travellers can take to keep safe while traveling. Don’t let attackers ruin vacation or cause worry about cybersecurity issues.

New Fortinet Survey Provides Insight into the role of Cybersecurity in OT

The Importance of Cybersecurity to Enable Safety and Reliability is Recognized but Obstacles Remain

Fortinet,a global leader in broad, integrated and automated cybersecurity solutions, today announced that a commissioned study conducted by Forrester Consulting found that industrial firms, due to increased digitalization, are more exposed to cyber threats than ever before. In addition, the lack of collaboration between Information Technology (IT) and Operational Technology (OT) teams represents another cybersecurity barrier for organizations that want to take full advantage of IT/OT convergence to increase their business benefits.

Industrial firms are committed to further digitalizing their factory floor to find new efficiencies and improve their ability to gather data that can provide business insight into production processes. 66% of respondents said their factories run through IP-connected networks and use real-time data to inform business decisions. However, these IP-connected networks bring up new cybersecurity risks with 73% of respondents in agreement that the attack surface has expanded. Meanwhile, only half of respondents agreed that their factory machinery is well prepared to fight off cybersecurity threats, leaving the other half unprepared and 55% of respondents either have no plans to implement or plan to implement cybersecurity technologies in the next 12 months. 

Another key finding showing Industrial Control Systems (ICS) are at risk due to lack of collaboration between the IT and OT environments with 51% of respondents claiming they operate in silos, meaning the OT team manages critical industrial equipment and any OT cybersecurity whereas the IT team is responsible for management of IT cybersecurity. A quarter to over a third of respondents did not know who had primary responsibility for cybersecurity solutions such as process, control and automation systems, and even business planning and logistics. However, 91% stated that security of factory machinery should be a shared IT and OT responsibility, as well as having clear and regular communication on the IT/OT convergence vision (58%) in order to ensure a successful IT/OT convergence. 

Organizations have much to gain from convergence and close collaboration between OT and IT teams, with the biggest being access to real-time data insights from manufacturing operations (66%) then being able to monetize and create new business opportunities via increased insight into production data (59%). Numerous efficiency gains are to be obtained as well, with 43% of respondents citing reduced duplication of processes and workflows between plants, as well as enhanced visibility to mitigate cybersecurity threats.

Joe Sarno, VP International Emerging & Operational Technology & Critical Infrastructure EMEA at Fortinet: “Industrial firms need to change at the operational level in order to bridge the divide between IT and OT environments and build trust between these teams, to ensure a successful convergence. As the attack surface expands, IT and OT teams must collaborate to improve visibility and defend against cyber threats. That’s why at Fortinet we are investing a lot of time and resources into R&D for ICS cybersecurity solutions.”

Fortinet commissioned Forrester Consulting to conduct an online survey in India, Turkey, the UK, Spain, Poland, Germany, Slovakia, Italy, France, the Czech Republic, and the Netherlands to evaluate the techniques industrial firms use to manage security, security roles and responsibilities between IT and OT, and the challenges and opportunities of IT/OT convergence.The survey included 459 IT and OT decision makers responsible for ICS at industrial enterprises with 1,000 employees or more (automotive, transportation, manufacturing, maritime, and aviation engineering) in Europe and India.

Kodak Alaris Claims Prestigious 2020 Scanner Line of the Year Award from the Analysts at Keypoint Intelligence – Buyers Lab

Buyers Laboratory (BLI), the world’s leading independent evaluator of document imaging hardware, software, and services, today announced that Kodak Alaris has won BLI’s coveted 2020 Scanner Line of the Year award for the fourth time in five years. Given once a year, this award recognizes the vendor whose product line is deemed best overall based on its rigorous laboratory evaluations.

Scanners from Kodak Alaris enable businesses of all shapes and sizes to extend business process automation to the point of capture. Across the entire line, customers can expect highly integrated onramps for entering all paper-based information to the systems that drive their business. Each device is characterized by its exceptional media handling, top-notch image enhancement and OCR capabilities, flawless reliability, and a simple user experience.” said Lee Davis, Keypoint Intelligence’s Senior Editor, Scanner Analysis and Software Evaluation. “Whether it’s a small desktop unit or a production scanner—and everything in between—scanners from Kodak Alaris are class leaders that can add tremendous value to any business, earning the company its fourth Line of the Year award in five years, and its fifth overall.”

To determine the Scanner Line of the Year award recipient, BLI analysts consider current scanners in the OEM’s line that have been submitted to BLI’s lab for testing. To judge the overall quality of the line, the analysts look at the overall rating a scanner received after testing, as well as the ratings in key categories such as Reliability, Productivity, Media Handling, Image Quality, Ease of Setup, Drivers/Utilities, OCR Performance, and Value.

“Kodak Alaris is by far the most-awarded scanner manufacturer in BLI’s 62-year history, with 30 Pick and Outstanding Achievement awards along with the five Line of the Year honors,” said Don Lofstrom, President and General Manager, Alaris, a Kodak Alaris business. “As we kick off a new decade with this prestigious award, we look forward to innovating, delighting customers and growing with our partners for many years to come.”

OmniClouds Signs Strategic Partnership with Infonas Telecom Bahrain

Enterprises to benefit from SD-WAN security and speed to drive business-first model

OmniClouds, a native cloud service provider and cloud migration enabler in the EMEA region has signed a strategic partnership with Infonas Telecom, the Bahrain-based global telecom carrier and ICT provider. Through this partnership, Infonas willprovide SD-WAN services to enterprises in Bahrain using virtualizedservice platform provided by OmniClouds.

“As more and more enterprises adopt a cloud or multi-cloud approach, SD-WAN becomes the natural choice for providers to leverage cloud and IOT driven applications securely and fast ,” said Amr A Eid, Chief Executive Officer and Board Member, OmniClouds, “We are the trusted platform for enterprise customers in the Middle East and Africa region to enable their cloud migration and adoption journey. The OmniClouds hybrid platform with our native partners and the MSP model plays a critical role in seamlessly enterprises with their move to the cloud by simplifying the operations and providing security and assurance they need for such a critical part of their business. We firmly believe expansion through partners as a key success to cloud adoption in this shared economy era, creating value for all the ecosystem. Our partnership with Infonas will empower enterprises to reap the benefits of their cloud investments and drive a business-first model.”

The improved connectivity will allow enterprises to seamlessly transform their global network into an automated, programmable SD-WAN using the Nuage technology. Software-defined WAN (SD-WAN) technology is the next-generation network technology that offers carriers flexibility, end-to-end control and uninterrupted connectivity to services. It is emerging as a networking approach that delivers multiple performance and cost benefits, including end-to-end network visibility and feedback to improve transmission efficiencies on the fly.

“Infonas and OmniCouds together are committed to helping enterprises in their digital transformation journey,” said Hamad Al- Amer, Board Member and Managing Director at Infonas WLL. “Our partnership with OmniClouds will enable enterprises in Bahrain to connect efficiently to multiple cloud providers such as Amazon, Microsoft, IBM Softlayer, Google Cloud Platform, as well as benefit from Zero-touch Provisioning, Managed Security, and guaranteed SLA. This is the right time for end users to think beyond the legacy methods of doing things.”

From Big Data Management to Cyber Hunting Security, What to Expect in 2020

Article By: Mena Migally, Senior Director, MENA at Riverbed

While 2020 marks the start of a new decade, many of the technology trends that have dominated conversations through 2019 —big data, cyber hunting, IoT, 5G, and user experience — will continue to shape IT roadmaps as companies begin to take action and look for the impact of their strategic investments. 

At Riverbed Technology, we believe the dawn of the new year presents the ideal opportunity to take stock of the advancements made in the year gone by and explore how these will continue to evolve in 2020. 

Digital Transformation Will Radically Shape Business Strategies and Outcomes

While talk of digital transformation has been ongoing for several years now, organizations’ transformation efforts have seen mixed results. Even enterprises that started down the road in 2018 and 2019 have realized that an organization and its infrastructure cannot be completely transformed overnight and that it will instead be an ongoing exercise. The reality is that many organizations were not equipped for a true digital transformation or to embrace SD-WAN. This is set to change as we head into 2020. The digital transformation march will continue to move forward, along with the adoption of SD-WAN.

There’s an inherent risk for those businesses that buck the trend. The Amazonification of consumer expectations has reshaped enterprise go-to-market strategies in a huge way by going beyond just situating a solution in the cloud. The winners here will be those who can deliver the desired experiences and outcomes at the speed customers demand. Today, enterprise customers expect the incredible speed and convenience that’s traditionally been demanded by consumers. They have been shaped, as we all have, by getting what we’ve asked for at a blink-and-you’ll-miss-it level of service. Not everyone will be able to keep up so expect to see some players merge with others – or simply fall by the wayside.

IoT and 5G Will Push Applications to the Edge

There no doubt that 2019 was the year of cloud in the Middle East. The market’s momentum is only set to increase and we can expect distributed cloud to become the new data center that truly empowers the edge. As more organizations start incorporating IoT technologies, their applications will need to run at the edge to ensure high performance and faster response. With IoT heading to the forefront – and soon to be enabled by the proliferation of 5G networks – organizations in 2020 are starting to think about how to address the new visibility challenges that will stem from the need of edge applications to communicate back to a centralized point. 

Also, the security of that network traffic is going to be paramount. There is no getting away from security being at the top of the agenda for organizations’ investments in 2020. It’s going to be imperative for organizations to be able to track which devices are communicating with other devices and determine whether they’re part of a distributed cloud or still being sent back to a consolidated location. 

Threat Hunting Will Become a Mandatory Security Exercise

Sticking with the theme of cybersecurity, we will see an increase in the number of “advanced persistent threats,” sophisticated, systematic cyber-attack programs that continue for an extended period of time, often orchestrated by a group of skilled hackers. These are the hacks that do the most damage to organizations and if a company doesn’t have proactive threat detection measures in place, it could be unaware of the attack until after the damage is done.  

As networks for organizations have grown, they have become like the Roman empire – big, sprawling and hard to defend. Throwing up a “wall,” or firewall, to defend against attacks is less likely to be effective when the advanced persistent threats have multiple ways to attack the cracks in those walls. 

The best way to combat advanced persistent threats is to engage in “cyber hunting,” the process of proactively and iteratively searching networks to detect and isolate advanced threats that evade existing security solutions. As hackers become smarter and find new evasive ways to infiltrate a network, organizations in 2020 will begin adopting the proactive cyber hunting approach to complement traditional reactive threat management approaches of installing firewalls, intrusion detection systems and SIEM systems. 

The Days of Data Hoarding are Over 

The proliferation of the cloud and its immense data storage capabilities are double-edged swords for organizations that have been “data hoarding.” As we move into 2020, many organizations will realize that while big data has tremendous value, some of that data may be a liability.  The potential risk of a breach involving sensitive client data is too substantial to a company’s bottom line, especially with the emergence of more consumer data protection laws, such as CCPA, coming down the line in 2020. To combat this, organizations will start reviewing collected data to determine what clearly enhances the business’s performance and delete the rest, as the risk is too high to continue to store customer data without a foreseeable purpose. 

Why These Matter2020 will see many game changing technologies reach maturity and no doubt, emerging technologies such as AI will take root as they begin to deliver tangible value for businesses. As the technologies we know and love continue to evolve, they will open up the possibility of new