Connect with us

Features

A THRIVING SEGMENT

Published

on

Updated : October 20, 2014 04:59  pm,
By Editor

img29The Unified Threat Management (UTM) market is reckoned to be the largest and fastest growing security appliance segment in the region. Leading brands are keeping pace with what their partners and customers expect of them to stay on the growth path

The UTM and the NGFW appliances, have been successful product categories and continue to see healthy growth rates because they offer integrated security features in one box. MarketsandMarkets expects that the global unified threat management market is estimated to be $2584.6 million in 2014 and is expected to grow to $4445.7 million in 2019 at a CAGR (compound annual growth rate) of 11.5%.

With different manufacturers enhancing and fine tuning their product lines, these categories are likely to continue meeting the security needs of small, medium and large sized organizations. The outlook for growth in this segment is robust and the Unified Threat Management (UTM) market remains the largest and fastest growing security appliance segment in the region. According to reports from IDC, UTM appliances increased by 37.7% year on year, making up 45.3% of total market revenue. The Middle East and Africa (MEA) security appliances market will expand at a CAGR of 9.6 per cent over the next four years to total approximately $350 million in revenue.

“The region has shown great demand for security products, specifically the need for secure cloud access and deployments in conjunction with growth in mobility. This strong demand and growth in mobility has resulted in an increase in the Unified Threat Management (UTM) Market in the Middle East,” says Fabrizio.

Further, the BYOD acceleration and the heightened cyber threat scenario have coupled to increase demand for security solutions.

“The growing complexity and frequency of financially motivated cyber-attacks in the region are forcing organizations to raise their level of concern and look to invest in IT security, adds Fabrizio Croce, Regional Director, Southern Europe and Middle East.

Customers are looking for more functionality from their security appliances, while simultaneously searching for technologies that can help protect their organizations from new advanced threats.

Fabrizio comments, “When you combine our hardware, firmware and best-of-breed services, complemented with new management tools and capabilities, WatchGuard delivers unparalleled visibility, flexibility and security for today’s businesses. We’re proud to say that we have been named a Leader in Gartner’s 2014 Unified Threat Management (UTM) Magic Quadrant for the fifth consecutive year. With award-winning solutions like WatchGuard Dimension, and new best-of-breed services, such as APT Blocker and Data Loss Prevention (DLP), the report confirmed that WatchGuard continues to deliver innovative security solutions that help customers and partners secure networks around the world.”

Alain Penel, Regional Vice President – Middle East, Fortinet opines that what is one man’s NGFW is another man’s UTM. The confusion in the nomenclature is unnecessary he believes whereas the focus should be on capabilities.

Alain says, “Rather than focus on whether a device is classified as “UTM” or “NGFW” the real focus needs to be on capabilities of the device and the architecture of the network in question.  The FortiGate products that could be considered UTM have an extensive range of networking and security features including those specifically designed to handle mobility and BYOD concerns.  These products could be complemented by other Fortinet products such as FortiAuthenticator for strong 2 Factor Authentication.”

Sophos believes the UTM solutions market will move towards offering end to end propositions. Sophos is focusing on further combining different security aspects in one solution which currently are most often covered by non-integrated stand-alone solutions

Thomas Thoelke, Sales Director, Sophos NEEEMA says, “The UTM space will develop in a very interesting direction. We will see overall more end-to-end solutions, also covering BYOD concerns. The challenge for the vendor market will be how to integrate different solutions into one meaningful security package.”

The focus will be on solutions working in tandem to ensure security.

He elaborates, “We will see for example UTM and MDM solutions working together in the way, the one solution detects a policy violation, e.g. a Mobile phone is not compliant to the policies and this will trigger an action on the UTM, e.g. the phone will not be allowed to connect via WiFi to the corporate network. In the same way we will see endpoint and UTM coming together. So if there is an even triggered on the endpoint, e.g. Laptop, or if there is continuous suspicious behavior originating from that laptop, the UTM solution will be able to take action on that specific laptop, may it be taking it off the network or block the outgoing traffic or similar. In any case, higher security will be achieved by making the solutions work together.”

Fortinet has made several significant enhancements to functionalities offered by its products. Its UTM appliances now feature FortiOS 5.2, the latest version of the Fortinet’s security operating system, which underpins Fortinet’s products and Advanced Threat Protection Framework. The vendor has also introduced the FortiSandbox which provide enterprises with a powerful tool to help combat Advanced Persistent Threats (APTs).

Alan comments, “All FortiGate appliances share a common operating system, FortiOS.  A number of significant enhancements were introduced during the past year such as a cloud based sandboxing capability, client reputation, device based identity and end point control.”

It was the enhancements in UTM technology, as with many vendors, which led to the evolution of the Next Generation Firewall Technology. The NGFW appliance brings application level intelligence into play to keep out threats.

Shahnawaz Sheikh, Distribution Channel Director at Dell Software says, “Factoring that a firewall needs much more intelligence than just the threat protection, today’s Next Gen Firewall technology caters to being application aware by offering granular control of applications, recognizing them by their signatures. In turn, Businesses also need visibility of what’s been processed by the firewalls, hence the visualization play a key role in giving intelligence to IT on how to manage bandwidth and business policies over individual applications.  Further, they also at the same time help address the needs of remote users from authentication and deep scanning of remote connectivity.”

These enhancements help organizations to have full-fledged threat protection with granular application control and by providing visualization so that IT can delicately balance between business needs and user needs.  In a nutshell the enhancements offer comprehensive security of the customer’s network without compromising on the security, granularity of managing applications and bandwidth and visualization that can help IT managers of business owners to have multi-layered protection and control with minimal TCO.

Today, within corporate enterprise as well as networks of educational and other institutions as well SMB networks, UTMs are now an integral component of a comprehensive security implementation.

Shahnawaz says, “The enhanced UTM’s or the Next Generation Firewalls are an integral component of the comprehensive security implementation. While there could be few adjacent services when added can offer greater effectiveness and comprehensive security, the nucleus of it however starts with the Next Gen Firewall.”

The virtual play

Manufacturers are also offering software versions for virtualized and cloud computing environments. Therefore UTMs will continue to play a strategic role even in the transforming IT networks. Having said that the demand for physical appliances is still higher.

Thomas says that Sophos UTM has software and virtual versions and while the virtual installations are increasing steadily, the hardware based solutions are still doing more business.

Questions have arisen around security within virtualized environments and if they are as safe as physical environments or even perhaps safer. Fabrizio claims that WatchGuard virtualized solutions address the challenges that are faced by enterprises today, and how to tackle them successfully.

He elaborates, “Through our virtual appliances XTMv (Extendible Threat Management) and XCSv (Extensible Content Security) we offer virtual security deployment options for businesses of all sizes. This is important because virtual environments cannot depend on physical infrastructure alone for protection.”

Dell Software therefore while offering virtual versions of some of its standalone security appliances, does not as yet offer a virtual version of its NGFW.

Shahnawaz says, “As of today we have the software versions for virtualization and cloud computing environments of Secure Remote Access, Email Security, WAN Optimization etc., except Next Generation Firewalls.  The local region still has the high demand for appliance based firewall technology and we believe that we are addressing the regional customers meeting their expectations.”

Channel initiatives

Almost all the UTM vendors are channel focused in their go to market strategies. Training and boot camps feature prominently in their channel engagements.

Fortinet for instance holds quarterly pre-sales partner training sessions across the GCC region. The intensive technology training workshops provide partners with an in-depth understanding of the latest Fortinet products.

According to Maya Zakhour, Channel Director for the Middle East region at Fortinet, “Fortinet’s ‘Power to Learn’ workshops are an invaluable source of information for our partners across the region. We not only train partners on the latest products but also help them identify and understand customer requirements and grow their technical knowledge in the IT security and networking industry. These sessions are designed to help our partners understand our competitive edge and grow their business.”

Dell Software also has a predominant focus on channel training and sessions are held regularly. The channel initiatives are ongoing and a dedicated team of 4 – 5 are always keeping an eye on enablement and development activities in the interest of the business growth and expansion.

Shahnawaz says, “There have been numerous channel initiatives implemented by listening to what they expect from us. One of the most common and consistent requirement is training, we have delivered sales, technical and advance technical trainings consistently in all major markets in the last 12 months.  We see this as an ongoing activity that needs to be delivered every year in multiple cities across the region. Further, the other areas of channel enablement include ensuring that the channel complies with their partner program requirement and they have the needed access to the partner portal, avail the required demo pool, level-3 technical support and lead-gen benefits as part of the partnership.”

Sophos has a very clear channel strategy and does all business via the channel. The vendor has a comprehensive partner portal that partners can access for training and information, online certifications as well as customer leads.

Thomas says, “The channel program is detailed and includes different partner levels with different requirements and discount eligibility based on partner level. In addition, there are also free licenses available for the partner’s company use and this is valid for all Sophos product portfolio. The Sophos Partner Portal includes a lot of web based training materials with the first level sales and technical trainings that can be taken online, as well as the exam. As an extra we do deliver our lead management through the partner portal giving the partners, both distributors as well as reselling partners, the chance the benefit from all the corporate leads we are getting.”

WatchGuard is also 100% channel focused. This year the vendor is announcing its newly enhanced partner program, WatchGuardONE. The new program leverages a value-based model that places additional focus on reseller certification and training in addition to simply volume sales. WatchGuardONE brings game-changing value to the market for partners.

Fabrizio says, “We work with our partners and trust them to sell and support WatchGuard, while managing sales and implementing software and products. WatchGuard have never dealt with the service side of client relations, and allow partners to develop this area of business.”

WatchGuardONE delivers a variety of membership levels including Silver, Gold and Platinum. Discounts and rebates vary depending on the partner’s level of commitment and range from 30 to 46 percent. Key reseller benefits include a training and certification program for partners to expand their knowledge.

In sum, differentiation based on product features coupled with strong channel strategies and the right set of required services to meet customer expectations are what the top manufacturers are banking on. Getting all pieces of the jigsaw right when it comes to execution will determine each vendor’s pace of growth.

Continue Reading

Features

Establishing data sovereignty in a ‘datafied’ world

Published

on

data

By: Omar Akar, Regional Vice President for Middle East & Emerging Africa, Pure Storage

Data is the currency of the digital domain, and with every passing day, the world is getting increasingly ‘datafied’. Billions of gigabytes of digital data pertaining to citizens, businesses, governments, and institutions are generated, collected, and processed every day. Understandably, there are concerns about how we can protect personal data, business data, as well as sensitive data that has implications for national security.

Challenges associated with data sovereignty

It is possible that a company based in a certain country uses cloud infrastructure from a provider abroad, and that cloud provider also has customers in other countries and regions. If data collection, data storage, and data processing happen in different countries, it will be subject to the data sovereignty rules of all those countries. Many of the concerns surrounding data sovereignty pertain to ensuring data privacy and preventing data that’s stored abroad from violating the laws of that country. Many countries have therefore introduced new laws, or modified the existing ones, so that data is kept within the boundaries of the country where the individual or entity is based. However, verifying that data indeed exists only at permitted locations can be very difficult.

On the other hand, storing huge amounts of data at only a few locations can increase the risk of data loss and data theft through cyberattacks, which can have huge ramifications on the financial health and reputation of businesses.

Moreover, data sovereignty makes it complex to share data across international borders. This can increase cost and inefficiencies for any business that operates across multiple countries and requires flow of data between its offices. Such businesses must now establish infrastructure in local data centers to comply with data protection regulations in each country. Companies also need to keep in view the data sovereignty requirements of each country and international data sharing agreements while wanting to share data which can impact business operations.

Ways to ensure data sovereignty and elevate data performance

Although establishing data sovereignty is undoubtedly challenging, there are some best practices and approaches that can help in achieving it and elevating data performance. Organizations should conduct a comprehensive audit of their data, including where it is stored, processed, and shared. This is the first step in identifying potential data sovereignty risks and ensuring compliance with the relevant laws and regulations of the concerned countries. It is also necessary to adopt data protection measures — such as encryption, access controls, and monitoring — to prevent unauthorized access and use of data, whether it is in transit or at rest.

The company’s data protection policy should define protocols for handling and storing data as well as measures for protecting it. This policy should be regularly reviewed and updated to keep up with any changes in data protection laws and regulations. If an organization has a footprint spanning multiple regions, it is a good idea to take the strongest data sovereignty laws among them and implement it across all regions. Cloud providers can be of assistance in this regard.

Benefits of working with cloud service providers

Most cloud providers have data centers in multiple countries. Organizations should go for a provider whose data residency provisions are aligned with their own data sovereignty requirements. Today, leading cloud providers also offer other features, including data encryption, that can help in achieving data sovereignty. To take it one step further, companies must introduce strict data governance processes in the cloud. This will ensure regulatory compliance, risk assessment, and risk mitigation at all times.

Data sovereignty laws apply not only to data but also to data backups. It is therefore important to understand how your organization backs up information — whether it is done on-premises or using dedicated cloud services or public cloud services. Adopting cloud-ready solutions and leveraging the benefits of all-flash storage is one of the ways to future-proof your organization’s data storage infrastructure. Uncomplicating storage will help in reimagining data experiences and powering the digital future of the business.

Finally, it is important to view data sovereignty holistically, and not as the exclusive responsibility of any one individual or team. The need to comply with data regulations extends across the board, from businesses to suppliers to the end-users. From a business perspective, ensuring data sovereignty calls for robust governance, holistic risk management, and concerted efforts on the part of the IT security, legal department, procurement, risk managers, and auditors — under the guidance and supervision of the company’s Chief Information Officer. It is a good way to build digital trust in today’s business environment.

Continue Reading

Features

HOW FSI INCUMBENTS CAN STAY RELEVANT THROUGH THE GCC’S PAYMENTS EVOLUTION

Published

on

payment

By Luka Celic, Head of Payments Architecture – MENA, Endava

Banks and payment services providers (PSPs) have been the region’s engines of economic growth for as long as anyone can remember. It is therefore jarring to imagine that this dominance is now under threat. After all, venerable banks and credit card companies have elegantly embraced the Internet, mobile banking, and the cloud to deliver self service banking to millions of customers. But consumers, especially digital natives, have never been known for congratulating an industry for a job well done. Instead, with each convenience, their expectations only grow. The siege reality of the pandemic accelerated a shift in consumer behaviour, and Middle East banks and PSPs now face challenges on three fronts.

The first is FinTechs. from Saudi Arabia’s BNPL (buy now, pay later) pioneer Tamara and Qatar’s unbanked oriented platform cwallet, to online financial services, Klarna, tech startups have been able to tap into rapidly changing consumer markets. New companies find it easier to pivot. And like speed boats racing against aircraft carriers, they weaved effortlessly to fulfil a range of desires amid high smartphone connectivity rates and a range of other favourable market conditions. By one estimate from 2022, BNPL alone accounted for US$1.5 billion (or 4%) of the Middle East and Africa’s online retail market.

The second threat is open banking, which comes in many forms, but one example is the instant-payments platforms being introduced by central banks such as those in Saudi Arabia and the United Arab Emirates. To get a sense of how this could play out, we need only look to Europe, where players who once relied on payments through card schemes are now pivoting towards open banking enabled payments. Closer to home, Al Ansari Exchange recently announced its customers can now transfer money and settle bills via the recipient’s mobile number, enabled by the UAE’s Aani IPP.

And finally, comes big tech. To augment its e-wallet service, Apple has signed up to an open banking service in the UK. The open banking framework which banks enabled through their investments is being exploited by a Big Tech firm that has access to 34% of UK smartphone users. Unsurprisingly, this sparked a fierce antitrust complaint by UK’s banks. Other big names will surely follow as they continue to craft ways of offering the digital experiences that garnered them user loyalty in the first place.

THE BALANCE

Apple Wallet is aimed at blending payment methods, loyalty cards, and other services into a single experience. But such moves have raised regulators’ eyebrows regarding a lack of interoperability and the preservation of competitive markets. Hence, Apple’s open banking foray — a gesture to calm the nerves of a finance market that fears having to compete with a company armed with countless millions of user transactions from which to draw insights. The massive user bases of tech giants will give any FSI CEO goosebumps. How does a traditional bank lure an Apple user? Open banking initiatives open the door to greater competition and innovation, both of which are good for consumers. But the only way to ensure both is by building an ecosystem that balances innovation with regulatory oversight.

FROM INCUMBENT TO INNOVATOR

Yes, smaller businesses have freedom of movement that larger incumbents do not. But that does not mean that there are no paths for banks and PSPs. There are, in fact, several strategies that larger FSI companies can employ to capitalise on the open banking revolution.

The first of these is collaborating to create ecosystems that provide users with frictionless experiences. Established FSIs already have access to a wealth of information about their customers and must now consider how to integrate data sources to create highly streamlined and frictionless workflows. A customer applying for a loan could then see their details auto populated, and credit history already accounted — all without the hassle of lengthy phone calls, application forms, or submission requests. In an age when instant is everything, it’s easy to see why the former approach could foster loyalty, while the latter would only serve to drive customers towards more capable competitors.

Card companies and issuer banks could also work with acquirers to smooth out the rough landscape that has arisen from the advent of digital payments. Acquirers traditionally acted on behalf of the merchants that accepted payment methods to recoup funds from the PSP through the issuing bank. This system has served the industry well, but with more payment methods emerging, acquirers have branched out into mobile wallets, QR codes, and gateway services. Gradually the relevance of established players has dwindled as their lack of representation at the critical checkpoint has diminished their significance. Incumbents must work to turn back the tide by recognising that acceptance and acceptance ownership are becoming increasingly important for maintaining market relevance.

Another strategy is diversification. Veteran FSIs may feel like they’ve lost ground to nimble start-ups and Neo Banks, but history shows value in patience — established FSI players now benefit from the investments of early innovators, and double down on payments innovations which have already shown the most promise. Moreover, if they diversify their portfolios through acquisitions, innovations, and partnerships, they can secure their future. Mastercard presents an excellent example with their US$200m investment into MTM payments. This single move has given the company access to MTM’s 290 million strong subscriber base, allowing these customers to become familiar with Mastercard products before getting entrenched with mobile wallet alternatives.

WHO’S ON TOP?

If we look at the rise of BNPL services, we see an origin story with — at least — major supporting roles for large card providers. But open banking has sidelined them in just a few years. BlackBerry was a stock market darling just five years before it sought a buyer. Traditional FSI players must innovate; they must collaborate with emerging disruptors; they must diversify. They can survive and thrive if they do these things — after all, they already have much of the infrastructure, and experience required for success. Middle East banks and PSPs have the existing user bases, so they have the scale to get out in front in the era of open banking. All they lack is the kind of compelling use cases that will entice the banking public. PSPs and their issuers could offer embedded payments, for example. The right services at the right time will be warmly received by consumers, no matter the scale of the offering institution, so there is every reason to believe that incumbents will come out on top against FinTech and Big Tech.

Continue Reading

Features

SEC paves way to approve spot ethereum ETFs

Published

on

ETF

By Simon Peters, Crypto Analyst at eToro

Ethereum spot ETFs took a significant step forward to being available to US investors last week with approval of the 19b-4 applications, allowing US exchanges (namely Cboe BZX, NYSE Arca and Nasdaq) to list and trade ethereum spot ETFs.

On the back of this, ethereum has been one of the best performing cryptoassets this week, gaining 19%.

According to a recent survey by eToro with retail investors in the UAE, over 74% respondents agreed that the prospect of an ethereum ETF will significantly influence their decision to increase, decrease or maintain their current ethereum allocation.
Focus now turns to the S-1 registration statements from the ETF issuers, as these still need to be approved by the SEC before the ethereum spot ETFs can actually launch and investors can buy them.

As to when the S-1s will be approved we have to wait and see. It could be weeks or months unfortunately.

Nevertheless, with the 19b-4s out of the way, it could be an opportunity now for savvy crypto investors to buy ethereum in anticipation of the S-1s being approved, frontrunning the ETFs going live and the billions of dollars potentially flowing into these.

We’ve seen what happened when the bitcoin spot ETFs went live, with the bitcoin price going to a new all-time high in the months after. Could the same happen with ethereum? The all-time high for ethereum is $4870, set back in 2021. We’re currently at $3650, about 35% away.

We’re also going into a macroeconomic climate with potentially looser financial conditions, i.e. interest rate cuts and a slowdown of quantitative tightening, conditions where risk assets such as crypto tend to perform well price-wise.

Continue Reading

Trending

Please enable JavaScript in your browser to complete this form.

Copyright © 2023 | The Integrator