Tech Interviews
RISING TO THE OCCASION
By Editor
Describe Gemalto’s operations in the regionWithout even knowing it, almost all of use Gemalto services on a daily basis, the company being a global leader in secure access solutions. Hsin Hau Hanna, VP, Global Marketing Communications discusses how Gemalto is helping secure our increasingly mobile future
We are a leader in digital security solutions; a lot of that has to do with solutions that run over the servers and that in turn leverage secure personal devices that are there to protect the accessees. It’s different from the usual anti-virus where you are protecting the perimeter of the network. Our solutions are creating the right authenticated access for communications, payment, data access or for physical access of some kind. Basically, our solutions are for creating some kind of authenticated user access. For instance in the region we are doing Electronic Identity Cards, and the systems behind it to manage e-Government services to make sure that people can be properly authenticated and they can maintain their privacy to protect them as well. We also work with mobile service providers that cover 75% of consumers in the region. We also worked with about 30 banks in the region when they migrated to chip cards and now we work with some of the biggest banks in the region including Emirates NBD, Barclays, Standard Chartered and many more.
Discuss some of your solutions in banking and card payments
For banks, we provide them various server services and payment cards so their end customers can have peace of mind as they enjoy the payment services or e-banking and make sure that all the back-end services are well taken care as well. We have many types of solutions in mobile communication; from helping mobile providers send out marketing campaigns to telephones; to setting up mobile payments or for people to use their mobile payments; to enabling people use their smartphones to pay for transport.
We are working with Emirates NBD for their Go4it card, a multi-application card that allows customers to use in in Dubai’s metro system as we all as traditional shopping thus creating more convenience for users in having a single card to use for several different functions. For banks the key is “Top-of-Wallet”, in that whatever you can do, be it an innovative service or marketing; you do what you can do to help consumers have an affiliation with your products that help you push your products better.
What in your opinion sets Gemalto apart from the competition?
What we strive to do is provide a range of security solutions that are convenient to use. Many times security and convenience may seem incompatible with each other. Security applications sometimes means adding layers on top of one another making it very difficult for customers. So we always think of how to make things easy the end result being solutions such as Near Field Communication (NFC). It’s very easy to create consumer friction with people deciding to stop using your services. In the workplace, if you make life too difficult for employees to access the emails or the company account, they may not use it or try for ways around it.
Discuss your solutions for mobile payments and the security protocols around it
People are concerned with the security implications of putting a bank account in a smart phone that is as safe as your own bank card. Gemalto can take your bank credentials and put them in a phone, store it in a tamper-proof place, in this case a sim card and the leverage your payment account and enable you activate it, deactivate it, download it and so on. Within those secure devices, there’s not only secure OS that enable you to run the application, but the one thing that Gemalto has been doing very well is that we have been miniaturizing applications to allow access over smartphones as many of us do not have the luxury to desktops and laptops. The embedded software sitting on those devices is the one doing the authentication.
How can an organization that takes Gemalto as a vendor be able to protect itself from the rising cases of hacking and other security breaches
All organizations need to be able to protect their IT assets; make sure that the right people with the right access have the right credentials. For banks, the database that holds customer information is the most sensitive of all. So you have to be sure that you have all the right security policies and the technology framework around it. The best way is to have a multi-channel and holistic way of looking at all these aspects. It does not take just one breakthrough to compromise the whole system. There are many ways this can be done-you can protect consumers from the back end to make sure their data is not leaked; you can upgrade technology to make sure you are using the latest technology whether they are making card payments, online payments and so on.
If you have high value customers like enterprise customers like company CEOs, make sure you give them two-factor authentication for them whenever they do e-banking so that they are not just logging using their passwords which are inherently insecure. A bank should offer them a secondary factor such as a one-time password or a secure token to verify who they are. For people who are high value risk, it’s not too much of a hassle to have them have extra security. And that is one thing Gemalto has always advocated with our customers for them to take a layered approach to security. Consider who’s a high value risk and then take a segmented approach to security-basic level of security, increased levels of security, or two-factored authentication because if you put the same level of security for everyone, either you are not addressing everyone sufficiently, you are not investing adequately or you are over-investing as some people do not want to use excessive technology.
With a lot other services being offered on the cloud, is this an area you are focusing on?
We are offering a lot of services over the cloud by using our data centres for things like activating payment for mobile phones from our secure data centres. A lot of our services do not need to be heavily installed in the company’s servers. Mobile payment is a very good example with TSM (Trusted Service Management) where we can for instance take a metro ticket and put it in a smartphone. We can do the same for authentication. If a company wants to authenticate the credentials of their employees, the traditional way was to put a big server on the back-end but now we have customers asking us to help do the authentication on their behalf through our servers and then give their employees the access.
Discuss a specific solution for clients over the cloud
A lot of the small service providers do not have the means to install their own servers especially so they rely on hosted services. SensorLogic, now part of Gemalto is a SaaS, runs over the cloud which customers can use to monitor several applications. An example would be small scale healthcare provider. Healthcare provision is typically much localised and niche and the providers do not have the scale to go global sometimes for regulatory reasons. In that situation, it’s very compelling for them to have a cloud service where they can monitor without the expense of putting up a server. They can use our cloud services to run their M2M monitoring and track their patients. This is a very important area because most of the time you are dealing with very sensitive data in healthcare, not just in the personal health records themselves, but also the billing aspect of it. We have to ensure that this health data is well protected. This is where Gemalto excels bringing services that are not only easy to use but they’ve also got the Gemalto security features as well.
What’s the future of secure access in the region from Gemalto’s perspective?
It’s only the beginning for digital security; this is only the beginning. Millions of people still do not have electronic IDs or passports. eGovernment services are just starting while cell phones are only becoming powerful now. The world is only moving in one direction-more digital interaction. And when you go digital, not only do you have to authenticate people well, you got to be able to protect transactions well and you also have to protect their privacy well. Security is the functional mirror image of what’s really at stake. What’s at stake is that people trust your service a lot-consumers are fickle, if they don’t trust your service, they won’t use it.
Describe Gemalto’s operations in the region
We are a leader in digital security solutions; a lot of that has to do with solutions that run over the servers and that in turn leverage secure personal devices that are there to protect the accessees. It’s different from the usual anti-virus where you are protecting the perimeter of the network. Our solutions are creating the right authenticated access for communications, payment, data access or for physical access of some kind. Basically, our solutions are for creating some kind of authenticated user access. For instance in the region we are doing Electronic Identity Cards, and the systems behind it to manage e-Government services to make sure that people can be properly authenticated and they can maintain their privacy to protect them as well. We also work with mobile service providers that cover 75% of consumers in the region. We also worked with about 30 banks in the region when they migrated to chip cards and now we work with some of the biggest banks in the region including Emirates NBD, Barclays, Standard Chartered and many more.
Discuss some of your solutions in banking and card payments
For banks, we provide them various server services and payment cards so their end customers can have peace of mind as they enjoy the payment services or e-banking and make sure that all the back-end services are well taken care as well. We have many types of solutions in mobile communication; from helping mobile providers send out marketing campaigns to telephones; to setting up mobile payments or for people to use their mobile payments; to enabling people use their smartphones to pay for transport.
We are working with Emirates NBD for their Go4it card, a multi-application card that allows customers to use in in Dubai’s metro system as we all as traditional shopping thus creating more convenience for users in having a single card to use for several different functions. For banks the key is “Top-of-Wallet”, in that whatever you can do, be it an innovative service or marketing; you do what you can do to help consumers have an affiliation with your products that help you push your products better.
What in your opinion sets Gemalto apart from the competition?
What we strive to do is provide a range of security solutions that are convenient to use. Many times security and convenience may seem incompatible with each other. Security applications sometimes means adding layers on top of one another making it very difficult for customers. So we always think of how to make things easy the end result being solutions such as Near Field Communication (NFC). It’s very easy to create consumer friction with people deciding to stop using your services. In the workplace, if you make life too difficult for employees to access the emails or the company account, they may not use it or try for ways around it.
Discuss your solutions for mobile payments and the security protocols around it
People are concerned with the security implications of putting a bank account in a smart phone that is as safe as your own bank card. Gemalto can take your bank credentials and put them in a phone, store it in a tamper-proof place, in this case a sim card and the leverage your payment account and enable you activate it, deactivate it, download it and so on. Within those secure devices, there’s not only secure OS that enable you to run the application, but the one thing that Gemalto has been doing very well is that we have been miniaturizing applications to allow access over smartphones as many of us do not have the luxury to desktops and laptops. The embedded software sitting on those devices is the one doing the authentication.
How can an organization that takes Gemalto as a vendor be able to protect itself from the rising cases of hacking and other security breaches
All organizations need to be able to protect their IT assets; make sure that the right people with the right access have the right credentials. For banks, the database that holds customer information is the most sensitive of all. So you have to be sure that you have all the right security policies and the technology framework around it. The best way is to have a multi-channel and holistic way of looking at all these aspects. It does not take just one breakthrough to compromise the whole system. There are many ways this can be done-you can protect consumers from the back end to make sure their data is not leaked; you can upgrade technology to make sure you are using the latest technology whether they are making card payments, online payments and so on.
If you have high value customers like enterprise customers like company CEOs, make sure you give them two-factor authentication for them whenever they do e-banking so that they are not just logging using their passwords which are inherently insecure. A bank should offer them a secondary factor such as a one-time password or a secure token to verify who they are. For people who are high value risk, it’s not too much of a hassle to have them have extra security. And that is one thing Gemalto has always advocated with our customers for them to take a layered approach to security. Consider who’s a high value risk and then take a segmented approach to security-basic level of security, increased levels of security, or two-factored authentication because if you put the same level of security for everyone, either you are not addressing everyone sufficiently, you are not investing adequately or you are over-investing as some people do not want to use excessive technology.
With a lot other services being offered on the cloud, is this an area you are focusing on?
We are offering a lot of services over the cloud by using our data centres for things like activating payment for mobile phones from our secure data centres. A lot of our services do not need to be heavily installed in the company’s servers. Mobile payment is a very good example with TSM (Trusted Service Management) where we can for instance take a metro ticket and put it in a smartphone. We can do the same for authentication. If a company wants to authenticate the credentials of their employees, the traditional way was to put a big server on the back-end but now we have customers asking us to help do the authentication on their behalf through our servers and then give their employees the access.
Discuss a specific solution for clients over the cloud
A lot of the small service providers do not have the means to install their own servers especially so they rely on hosted services. SensorLogic, now part of Gemalto is a SaaS, runs over the cloud which customers can use to monitor several applications. An example would be small scale healthcare provider. Healthcare provision is typically much localised and niche and the providers do not have the scale to go global sometimes for regulatory reasons. In that situation, it’s very compelling for them to have a cloud service where they can monitor without the expense of putting up a server. They can use our cloud services to run their M2M monitoring and track their patients. This is a very important area because most of the time you are dealing with very sensitive data in healthcare, not just in the personal health records themselves, but also the billing aspect of it. We have to ensure that this health data is well protected. This is where Gemalto excels bringing services that are not only easy to use but they’ve also got the Gemalto security features as well.
What’s the future of secure access in the region from Gemalto’s perspective?
It’s only the beginning for digital security; this is only the beginning. Millions of people still do not have electronic IDs or passports. eGovernment services are just starting while cell phones are only becoming powerful now. The world is only moving in one direction-more digital interaction. And when you go digital, not only do you have to authenticate people well, you got to be able to protect transactions well and you also have to protect their privacy well. Security is the functional mirror image of what’s really at stake. What’s at stake is that people trust your service a lot-consumers are fickle, if they don’t trust your service, they won’t use it.
Tech Interviews
Digital Sovereignty in Practice: What It Means for Enterprises Today
In our conversation with Ismail Ibrahim, General Manager, CEMEA at SUSE, we seek to understand the concept better along with his understanding of the industry and how enterprises in the UAE and Saudi Arabia can retain control in a rapidly evolving technology landscape.

What does “digital sovereignty” actually mean for an enterprise today, not in theory, but in day-to-day operations?
From an enterprise perspective, digital sovereignty becomes real the moment it changes what you do on a Monday morning. In practice, it means three things become operational requirements, not policy statements.
First, control over data. Not just where data is stored, but where it is processed, who can access it, and how you prove that in an audit. For many organizations in the UAE and Saudi Arabia, that is increasingly tied to sector rules, procurement requirements, and customer expectations.
You need the ability to keep sensitive workloads within national borders when required, but also to enable controlled data flows when innovation demands it. The important point is that sovereignty is not “ringfencing everything”. It is being deliberate about which data, which workloads and which dependencies must remain under your control.
Second, control over operations. Day-to-day, that looks like resilience and predictability: how quickly you can patch, how confidently you can recover, how consistently you can enforce policy across clusters, clouds and edge sites. This is where many enterprises discover that sovereignty is inseparable from operational excellence. If you cannot reliably manage your environments, you do not really control them.
Third, control over technology choices. This is where open source becomes practical, not ideological. When you build on open, enterprise-supported platforms, you are reducing dependency on opaque codebases and constraining the risk of being forced into a single vendor’s roadmap. Sovereignty is “choice by design”, because choice is what allows you to meet local requirements today and change course tomorrow.
That is why at SUSE we often frame sovereignty around pillars like control, choice and resilience, with autonomy as the long-term outcome. For enterprises, those pillars translate into everyday decisions: architecture, procurement, governance, patching, incident response and lifecycle management.
In the next three years, which will hurt enterprises more: security breaches, or being locked into the wrong technology stack?
It is not an either-or, because the two risks are increasingly connected.
A security breach is immediate and visible. It impacts customers, regulators, operations and reputation. But lock-in to the wrong stack can quietly increase breach risk over time, because it limits your ability to respond. If your architecture makes it hard to patch quickly, to segment workloads properly, to implement new controls, or to move sensitive workloads to a compliant environment, you have turned security into a dependency problem.
Over the next three years, I would say the most damaging scenario for many enterprises is not “breach versus lock-in”, but breach plus lock-in, where an organisation is under pressure and finds it cannot adapt fast enough.
This is exactly why sovereignty has moved into the C-suite and boardroom. Leaders are recognizing that digital sovereignty sits alongside cybersecurity and operational resilience as a strategic requirement. You need a risk-based approach to your data, workloads and support model, and you need the flexibility to change course.
Practically, in the UAE and Saudi Arabia, many CIOs are already building mixed environments across on-prem, sovereign cloud, hyperscalers and edge. The goal is not to avoid the cloud. The goal is to avoid a situation where strategic choices are dictated by a single vendor’s constraints. Open, enterprise-grade platforms help you keep the option to move, modernize or localize when needed, without rewriting everything from scratch.
As AI becomes embedded into infrastructure itself, do you believe enterprises are prepared to trust machines with operational decisions, or are we moving faster than governance allows?
In many cases, we are moving faster than governance, but that does not mean enterprises should slow down. It means they should modernize governance at the same pace as adoption.
The key is to separate hype from reality. “Trusting machines” does not mean handing over full autonomy overnight. For most enterprises, AI enters operations in stages.
Stage one is assistive intelligence, where AI helps surface insights, detect anomalies, recommend actions and reduce manual effort. This is where many organizations see quick operational value, especially in areas like observability, incident triage, capacity planning and security monitoring.
Stage two is bounded autonomy, where AI can execute actions within defined guardrails, such as automated scaling, routing, remediation playbooks, or policy-driven security responses. The governance requirement here is clear accountability: what is automated, under what conditions, with what approvals, and what audit trail.
Stage three is agentic operations, where more complex systems handle multi-step tasks across environments. This is the phase where governance must be mature, because the risk is not simply “wrong output”, it is unintended consequences across interconnected systems.
For the UAE and Saudi Arabia, readiness often depends on whether organisations have already done the foundations: standardised platforms, consistent policy enforcement, clean identity and access controls, and modern lifecycle management. If the foundation is fragmented, AI simply accelerates fragmentation.
This is why we are seeing strong interest in approaches that support governance by design, including the ability to run AI solutions in more controlled environments. In many regulated sectors, that includes air-gapped or restricted environments, where organizations want to adopt AI while keeping strict control of data movement and operational boundaries.
My view is that enterprises can absolutely trust AI in operations, but only when they treat trust as an engineering outcome: transparent systems, auditable controls, clear guardrails, and the ability to override. Governance is not a blocker. Governance is what makes adoption sustainable.
By 2030, will enterprises still control their infrastructure choices, or will hyperscalers and AI vendors effectively decide that for them?
Enterprises will control their choices if they design for control now. If they do not, the market will make the decision for them.
By 2030, the default buying motion will push organizations toward managed services, vertically integrated AI stacks, and increasingly opinionated platforms. That can deliver speed, but it can also compress choice, especially if your applications, data pipelines, security controls and operational tooling are tightly coupled to one vendor.
So the question is really about architecture and leverage. Enterprises that prioritise portability, standardization and open platforms will keep leverage. They can choose the right environment for each workload, based on performance, compliance, cost, and risk. Enterprises that ignore portability will find that “choice” exists on paper, but not in practice.
This is where digital sovereignty is often misunderstood. Sovereignty does not mean rejecting global technology. It means retaining the ability to make deliberate decisions about where workloads run and who controls the critical layers. Many leaders now talk about “glocal” strategies: using global innovation while maintaining local control and compliance where it matters.
At SUSE, our positioning has been consistent: open source supports sovereignty because it promotes transparency, portability and freedom from lock-in. That is not a slogan, it is a practical roadmap for keeping infrastructure choices in the hands of enterprises, not vendors.
If you had to offer one piece of advice to CIOs and policymakers in the UAE and Saudi Arabia navigating rapid digital transformation, what would it be?
My one piece of advice is this: treat sovereignty as an enabler of innovation, not a constraint, and build it into your operating model early.
For CIOs, that means starting with a clear map of your critical workloads and dependencies. Decide what must remain under national control, what can run on hyperscalers, what needs sovereign cloud options, and what requires special governance. Then standardize your foundations so you can enforce policy consistently. When sovereignty is engineered into the platform layer, transformation becomes faster, because you are not negotiating compliance from scratch every time you modernize an application.
For policymakers, it means continuing to create frameworks that encourage both innovation and trust. The UAE has taken a pragmatic approach in showing that openness and sovereignty do not have to conflict. When the policy environment supports clear requirements and predictable compliance expectations, enterprises can innovate with confidence.
And for both, there is a shared point: invest in skills and ecosystem capability. Sovereign outcomes are not delivered by policy alone, they are delivered by people, platforms, and partnerships. When you develop local talent, strengthen the partner ecosystem, and support enterprise-grade open source, you build resilience and long-term autonomy without slowing innovation.
Tech Interviews
SCALING PRACTICAL AI FOR RETAIL GROWTH IN THE GCC
Exclusive interview with Mark Turner, President EMEA, Rezolve Ai

What made Shoptalk Luxe Abu Dhabi a priority platform for Rezolve Ai this year?
For Rezolve Ai, Shoptalk Luxe Abu Dhabi brings together the right audience at the right moment. Luxury retailers in the region are no longer exploring ideas, they are making decisions and investing. It is a practical forum to exchange views with brands that are actively shaping their customer engagement and commerce strategies, and to have grounded conversations about what is working in real retail environments. Abu Dhabi also reflects how influential the region has become in global luxury thinking.
How is AI changing the way luxury retailers think about customer engagement today?
Luxury retailers are becoming far more intentional about how and when they engage customers. AI is helping them move away from broad personalisation toward more contextual, timely interactions that respect the brand experience. The focus is on supporting customers at key moments, whether online or in store, and ensuring engagement feels consistent and considered rather than automated or intrusive.
What distinguishes meaningful AI adoption in retail from short-term experimentation?
Retailers that see lasting value from AI are those that embed it into day-to-day operations rather than treating it as a standalone initiative. Meaningful adoption is driven by clear commercial goals, fast implementation, and solutions that work within existing systems and teams. Short-term experimentation tends to stall when it lacks ownership, scale, or a clear link to performance outcomes.
Why is the Middle East, and the UAE in particular, becoming increasingly important for luxury retail innovation?
The Middle East, and the UAE in particular, has created an environment where luxury retail innovation can move quickly. Consumers are digitally confident, infrastructure is strong, and there is a clear push at a national level to adopt advanced technologies. This combination allows retailers to implement and test new models at scale, which is why the region is increasingly influencing global luxury strategies.
Looking ahead, where do you see AI delivering the most value for luxury brands over the next few years?
The greatest value will come from AI that directly supports growth while reinforcing operational discipline. For luxury brands, that means more relevant engagement that improves conversion and loyalty, alongside better forecasting and inventory decisions that protect margins. The priority will be practical use of AI that enhances the customer experience without compromising brand integrity.
Tech Interviews
Sennheiser: Beyond Hardware, Toward Seamless Integration
Exclusive Interview with Fadi Costantine, Sales Manager – Business Communication, Middle East at Sennheiser

Sennheiser has leveraged its role in shaping professional audio to build strong hybrid communication products for use across business and education environments. We caught up with Fadi Costantine, Sales Manager – Business Communication, Middle East at Sennheiser, to discuss the brand’s presence at the show, its integrated product ecosystem, and the growing importance of software-driven audio solutions.
What are your most innovative products currently serving the business and education sectors?
Sennheiser operates across several business units, with Business Communication being one of our most important. This unit is entirely dedicated to the installation market, where many of our most dynamic and innovative solutions are positioned.
Professional audio is at the core of Sennheiser’s brand identity. Through our ownership of renowned brands such as Neumann and Merging Technologies, we have established ourselves as a global leader in audio communications. We leverage this expertise to develop advanced meeting and conferencing solutions that enhance business performance.
Crucially, our products are not designed to operate in isolation. They are engineered to work together as a unified ecosystem, enabling seamless communication across devices and platforms. This ecosystem approach allows system integrators and end users to design complete, end-to-end audio solutions tailored to a wide range of applications and project requirements.
Which industry verticals are currently driving demand for these solutions in the region?
While we are active across multiple verticals in the region, we have a clear strategic commitment to deliver innovative, scalable, and future‑ready audio solutions tailored specifically for the needs of higher education and the modern corporate environment.
In corporate environments, our microphone solutions are widely deployed in meeting rooms to support modern collaboration and video conferencing scenarios. In the education sector, our technologies are extensively used in lecture halls and hybrid learning environments, including classrooms and auditoriums designed to accommodate both in-person and remote participants.
A strong example is our ceiling microphone solutions. These are frequently used not only in traditional meeting rooms but also in lecture halls for audio capture, video conferencing, and recording. They are also ideal for voice-lift applications, enabling students to hear the lecturer clearly without the need for wearable microphones. This creates a more natural, seamless teaching experience while minimizing complexity for the user.
Software and integration are critical in these environments. How does Sennheiser support this alongside its hardware solutions?
Workflow optimization has always been central to our product strategy and will remain a key focus going forward.
Introducing a new era in AV Management, at ISE 2026, Sennheiser will officially launch DeviceHub, a secure, cloud-based platform designed for IT and AV managers, as well as system integrators. DeviceHub centralizes device visibility and remote management, streamlining workflows across enterprise, education, and corporate settings.
DeviceHub provides real-time insights, simplified setup, and unified control, supporting organizations in creating better spaces for communication, learning, and teamwork. Following a successful private beta, ISE marks the transition to public availability. Visitors can explore DeviceHub’s capabilities and speak directly with product experts about how it can transform their AV and IT operations.
-
News10 years ago
SENDQUICK (TALARIAX) INTRODUCES SQOOPE – THE BREAKTHROUGH IN MOBILE MESSAGING
-
Tech News2 years agoDenodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
VAR11 months agoMicrosoft Launches New Surface Copilot+ PCs for Business
-
Tech Interviews2 years agoNavigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News8 months agoNothing Launches flagship Nothing Phone (3) and Headphone (1) in theme with the Iconic Museum of the Future in Dubai
-
Automotive1 year agoAGMC Launches the RIDDARA RD6 High Performance Fully Electric 4×4 Pickup
-
VAR2 years agoSamsung Galaxy Z Fold6 vs Google Pixel 9 Pro Fold: Clash Of The Folding Phenoms
-
Trending5 months agoOPPO A6 Pro 5G Review: Reliable Daily Driver
Describe Gemalto’s operations in the regionWithout even knowing it, almost all of use Gemalto services on a daily basis, the company being a global leader in secure access solutions. Hsin Hau Hanna, VP, Global Marketing Communications discusses how Gemalto is helping secure our increasingly mobile future 
