Connect with us

Uncategorized

KEEPING A STEADY PACE

Published

on

Updated : December 30, 2013 00:38  am,
By R. Narayan
With UTMs firmly established a growth segment and security a top priority for IT decision makers, manufacturers are focusing on meeting rising expectations of functionalities

 The rising number of cyber security threats keep driving demand for security solutions despite overall budgetary pressures. Keeping pace, manufacturers have been bringing to market appliances that incorporate enhanced features to tackle specialized threat prevention, distributed denial of service protection, and application control among other myriad threats.

“The market data seems to indicate that demand is starting to increase again after a long winter nap. We believe that some of this if not most of the increase in demand stems from the fact that Cyberwar and Espionage are prevalent in many CSO and CIO’s minds. Our lab data seems to indicate that botnet based attacks are on the rise along with increasingly more complex malware and viruses that are aimed at spyware and similar access obtaining methods,” says Michael Goedeker, Director Pre Sales ESG, CEEMEA at Sophos.

UTM products that consolidate multiple security technologies into a single network device have been one of the strongest growth segments in security, since these devices enable less TCO and feature centralized management and deeper integration between complementary security technologies.  According to IDC, the Unified Threat Management (UTM) segment saw the largest year-over-year revenue increase at 29.2% and accounted for 39.4% of security appliance revenue in 3Q13 as multi-function appliances continue to drive growth in the overall market

Manufacturers are challenged to remain innovative as customers seek to adopt new technologies such as cloud computing, virtualization, and mobile devices. To keep up with a fast evolving security landscape in the region WatchGuard recently launched WatchGuard Dimension, a business intelligence and visibility solution.

Corey Nachreiner, Director of Security Strategy at Watchguard explains, “UTMs will log a lot of data as well as a lot of security events happening in the network. A lot of administrators were therefore suffering from a deluge of logs-they have a lot of network appliances that tell them a lot but are not able to get a lot of business intelligence out of all this information. Dimension is thus a zero install cloud-ready solution which is sold as a virtual platform so that a customer can run it in their own private virtualization network or in a public cloud and then point all WatchGuard appliances to it. All the log data will thus go to Dimension with users getting a visibility control switch.”

Dimension, Corey adds, will also allow users to see things like all the biggest trends happening in your network, what programs your users are using, the different domains they are going to, the biggest security events by region and by user among other features. “It’s a very useful visibility tool that is very easy to install as it’s already pre-packaged for you,” he adds.

With virtualization taking hold, WatchGuard’s virtual strategy is taking shape. The Fireware XTM V and XCS V, WatchGuard’s UTM and email and messaging security products respectively now have virtual versions that work on Hyper V and VMWare. “Many customers are adopting cloud services driven entirely by virtualization in the back-end so it helps secure their cloud environment by offering a virtual version of our UTM platform,” said Corey.

Earlier in the year, Sophos had announced the availability of Sophos UTM Connected, which introduces expanded UTM managed endpoint protection with unique Web in Endpoint functionality, broader wireless coverage for large scale wireless deployments and higher performance networking. The introduction of Web in Endpoint functionality lets Sophos UTM go a stage further and make security layers communicate and combine to deliver more effective protection. This approach simplifies user experience and delivers a higher level of overall protection on which customers can rely.

Michael says, “Web helps to minimize attacks that seek to reroute unsuspecting users to infected websites that then install malware. Web blocks this and adds another layer of security (in an  easy way) to all customers that use our UTM products. Customers and partners alike love how we add important security layers in an easy way that just works.

Shahnawaz Sheikh, Regional Director at Dell Sonicwall says that the introduction of Next Generation Firewalls with Generation 6 appliances offered double the power and performance from its previous generation. As lower-midsize companies grow to become upper-midsize and enterprise size, their security needs will get more complex, and they will outgrow their UTM appliances and deploy enterprise network security platforms, such as next-generation firewalls and SWGs (secure web gateways).

He adds, “Today’s security needs are more precisely addressed by Next Generation Firewalls that can delicately balance between the business needs and user needs.  The concept of Next Generation Firewall is an extension of UTM technology where it offers all the functionality of UTM from the perspective of threat protection and offers additional benefits like managing applications granularly and getting the visibility of traffic to better manage the security of the network by proactively monitoring the suspicious traffic.”

“Secondly considering the current trends of mobility, cloud computing and consolidation, the demand for BYOD is also the need of the hour for many organizations.  Historically Email Security was offered on an appliance, as a software and virtual appliance, this year the launch of cloud based Email security offering has given multiple options to our customers who can choose between the premises deployed solutions from the likes of hardware, software or virtual appliance to cloud based solution that eliminates the need for local deployment and management taking away all the pain of hiring the needed expertise and capex based investment,” adds Sheikh.

Over the year, cyberoam enhanced its UTM product line offerings to meet the new-age risks that come with always on apps and usage of high speed internet on a plethora of devices that users bring into networks. Cyberoam launched its NG series UTM appliances and virtual UTMs in ealier part of this year to protect physical and virtual network environments. These solutions provide feature of next generation Firewalls including advanced Application Controls, granular Layer 8 identity-based controls, Web Application Firewall, Advanced Threat Protection, Flexi-Ports with flexible I/O slots complemented with ease of management.

“Cyberoam realizes that network security needs vary with the size of organizations and the industry they belong to. Cyberoam offers future-ready security to SOHO/ROBO, SMEs and Enterprises with its NG Series network security appliances, available as Next-Generation Firewalls and UTMs. Available as hardware and virtual security appliances, they offer next-generation security features to help organizations secure their networks against emerging security risks. Cyberoam Next-Generation Firewalls (NGFW) with Layer 8 Identity-based technology offer actionable intelligence and controls to enterprises that allow complete security controls over L2-L8 for their future-ready security,” says Ravinder Janotra , Regional Sales Manager – Middle East Cyberoam Technologies.

The SMB story

The threat perception from a cyber attack is always real for Businesses and individuals. SMB customers can be as vulnerable as enterprises but a sizeable minority at least of this segment may not always take proactive security measures. They have a need to be provided easy to install and use IT security solutions and are therefore a strong focus for the UTM manufacturers. Further, SMBs may also need to look at deploying the higher grade next generation firewalls than traditional UTMs since they bring application classification and control as an integral feature and will be able to see and filter the rising web application traffic in the age of thriving social media.

However, According to the Risk of an Uncertain Security Strategy study conducted by Ponemon Institute, many small and midsize businesses (SMBs) are potentially putting their organizations at risk because of uncertainty about the state of their security and threats faced from cyber attacks. The senior management is failing to prioritize cyber security, which is preventing them from establishing a strong IT security posture. The research, sponsored by Sophos, also identified that the more senior the position of the decision maker in the business, the more uncertainty there was surrounding the seriousness of the potential threat.

Michael says, “SMBs are being attacked more and are the target of spyware attacks that seek to steal company technology, secrets or interesting data. Other spam and social engineering attacks are targeting more and more SMB’s so that the symbiotic relationship between the company, partners and the end customers is very important. As attacks and their complexity increase, SMB’s need partners or when done by the customer themselves, a solution that is easy to manage, setup and rollout. Users expect transparency in regards to higher security and minimal disruptions in everyday tasks. This means that new solutions need to be implemented that are easy for the user so that acceptance is increased.”

Michael adds “Our solutions are made to be easy, work and get you protected with minimal setup and rollout times. We also make sure that it is easy to manage and use our solutions.”

Like all other regions, businesses in Middle East are highly aware of threat landscape and have evolved to see security as an issue related to business survival says Ravinder. It occupies top slot in their list of priorities. In fact according to IDC the Middle East IT security and appliance market is anticipated to grow at CAGR of more than 34% between 2010 and 2013.

Ravinder says, “Security awareness and sensitivity amongst SMBs has been increasing and they are willing to invest in security. SMBs can look at security solutions like UTM appliances, Next-Generation Firewalls offering integrated security over single platform to protect their networks which helps them reduce OpEx and CapEx in comparison with use of multiple point network security solutions.”

SMB organizations now have enough possible choices when it comes to choosing solutions that are enterprise class and scalable, opines Shahnawaz.

Dell Sonicwall’s Shahnawaz adds, “In my opinion the SMB segment is well served from a technology perspective as most technologies cater to SMB needs; even the new technologies targeted towards enterprise customers, in a matter of time gets available for SMB customers. BYOD is one of such good examples.  Most SMB customers understand the importance of securing their assets from Internet threats and hence they look for security systems that can enable their businesses and offer business continuity during crises.”

Looking ahead

According to industry reports, customers are rapidly adopting the Next Gen Firewalls given the need for granular application intelligence and visualization.

“There is an ongoing approach to educate the customers about the benefits of the next best technology to what they invested few years ago and the growing demand for BYOD solutions keeps our focus on products and services that are needed by masses,” comments Shahnawaz.

As scenarios become more challenging, customers will need quick to deploy solutions and some will look for those arrangements from a new breed of Managed service providers. Cloud versions will find more adoption but shipments of appliances will also rise. Replacement of UTM by cloud options will remain at less than 5% through 2016 according to Gartner however, by then, most UTM devices will leverage cloud-assisted security and management features.

Michael says, “Proactive and intelligent systems that are easy to configure, manage and rollout will be key (and needed) in every security strategy to decrease disruptions and daily business. Partners continue to be a very important key to the successful security strategy and implementation of customers. MSP’s (Managed Security Providers) will become more important to SMB customers as attacks continue to increase in both complexity and damage to business by disruptions. MSPs will help smaller customers with no security staff budget to increase security posture and additional consulting and design help going forward.”

The security market is headed steadily towards high growth curve.  Businesses in MEA will choose to invest wisely and enough invest in IT Security driven by dynamic cyber threat landscape and regulatory compliance needs. UTMs and Next generation Firewalls will therefore continue to be one of the focus areas of customers looking to invest in security solutions.

Continue Reading

Uncategorized

CORE42 SHOWCASES THEIR LATEST INNOVATION AT GITEX GLOBAL 2025

Published

on

Professional headshot of smiling businessman wearing round glasses and dark suit against white background

Exclusive Interview with Mohammed Retmi, Vice President: Sovereign Public Cloud, Core42

How has GITEX been for Core42 this year? And, what are you showcasing at the event?

GITEX has been an incredible experience so far. The energy across the halls has been amazing, and the level of engagement with our customers, partners, and industry peers has been very strong. It is always a great platform for collaboration, and this year we can clearly feel how much interest there is in the work we are doing at Core42 and within the broader G42 ecosystem. We are taking centre stage within the G42 District in AI Hall 6, where we are highlighting our role as the digital infrastructure arm of the G42 ecosystem. G42’s Intelligence Grid vision is redefining how nations can build AI-native societies by connecting infrastructure, intelligence, and innovation within one cohesive framework. Together with our sister companies, we are bringing this vision to life and showing how it translates into tangible outcomes that strengthen the UAE’s AI leadership and set new benchmarks for secure, globally competitive digital infrastructure.

A major highlight of our showcase is the Core42 AI Cloud, a high-performance, scalable, and sovereign platform that brings every leading accelerator together under one roof. It provides a unified environment for all training, fine-tuning, and inference needs. We have recently introduced self-service capabilities within the AI Cloud that allow users to access NVIDIA accelerated compute resources within minutes, offering new levels of flexibility, speed, and accessibility for large-scale AI development.

We are also showcasing our Sovereign Public Cloud, which delivers full compliance and control for regulated sectors, our Signature Private Cloud, which is currently in Customer Preview, and our Compass generative AI platform. Our Signature Private Cloud now supports more than fifty public and private entities across the UAE, which is a major milestone for us. We are proud to be the first mover in this space and happy to be celebrating that achievement at GITEX, where we can show the real impact it is creating for our customers and for the wider ecosystem.

From your perspective, how is the digital landscape evolving, and what trends are you seeing take shape?


The digital landscape is evolving at an incredible pace, and much of that acceleration is being driven by AI. It is transforming how organizations operate, how they serve customers, and how they manage data. At Core42, we see our role as helping governments and enterprises adopt these technologies safely, responsibly, and at scale through infrastructure that is sovereign by design.

I oversee the Sovereign Public Cloud offering at Core42, which is built on Microsoft Azure and governed by Core42 Insight, our compliance and governance platform. This combination provides the scalability and flexibility of a hyperscale cloud while ensuring that all data execution, residency, and control remain fully sovereign. Customers can benefit from the performance and innovation of a global platform while operating within a framework that meets national data protection standards and regulatory requirements. It allows public and regulated entities to modernize with confidence, knowing that compliance and trust are built in from the start.

How does Core42 ensure responsible and ethical use of AI within sovereign environments?

Sovereignty is at the core of everything we do at Core42. Our mission is to give customers complete control over their data, their operations, and their technology environments. Data sovereignty means that all information stays within national borders and cannot be accessed by any external entity or foreign jurisdiction.

We also enable operational and technological sovereignty, which means our customers can run and scale their systems independently, securely, and in full alignment with local regulations. These principles are embedded across our Private Cloud and AI Cloud portfolios, where compliance and governance are built into the architecture from day one.

Responsible AI is an essential part of this approach. Through our platforms, we enable organizations to use AI within a clear, regulated, and ethical framework that aligns with national policies and international best practices. Our goal is to make sure AI adoption creates value while maintaining transparency, fairness, and trust at every level.

How is the Sovereign Public Cloud transforming the experience for your customers?

What we see is a real shift in how customers think about cloud adoption. In the past, many organizations were cautious because of data residency and compliance concerns. With the Sovereign Public Cloud, those barriers are being removed. Our customers can now benefit from all the flexibility, scalability, and performance of a global cloud environment while maintaining complete control of their data within UAE borders.

This has opened up new opportunities for innovation. Government entities, financial institutions, healthcare providers, and other regulated sectors are now able to modernize their operations with confidence, knowing that sovereignty, security, and compliance are built in from the start.

Looking ahead, how do you see cloud innovation evolving in the region?

The Middle East is moving fast toward a cloud-first, AI-native future. The focus is to adopt technology and build sovereign ecosystems that reflect local values, laws, and priorities. At Core42, our goal is to continue expanding the capabilities of the Sovereign Public Cloud, integrating more AI services, and enhancing data and workload portability across hybrid environments. We believe the future belongs to organizations that can combine global innovation with local trust, and that is exactly what we are helping our customers achieve.

Continue Reading

Hospitality

MICHELIN-STARRED KONJIKI HOTOTOGISU INTRODUCES TWO NEW SIGNATURE RAMEN

Published

on

Bowl of ramen noodle soup with sliced pork, green onions, bamboo shoots, and shredded white radish in savory broth

The famed Tokyo ramen atelier Konjiki Hototogisu, led by Chef Yamamoto, is excited to introduce two brand-new signature ramen in Dubai, Duck Shoyu Ramen and Chicken Edamame Wonton Ramen. These additions mark a new chapter in the brand’s journey of blending Japanese craftsmanship with Dubai’s evolving dining scene.

Handpicked by Chef Yamamoto-san following strong guest demand, the two new ramen dishes continue the brand’s commitment to authentic, artfully balanced flavours.

The Duck Shoyu Ramen presents a deeply layered broth made with duck and Japanese dashi, complemented by mushroom fig sauce and truffle pistachio sauce, and finished with tender duck chashu. It showcases the chef’s meticulous attention to flavour and texture, offering a bowl that feels indulgent yet refined. In contrast, the Chicken Edamame Wonton Ramen brings a gentler harmony of flavours, combining a cloudy chicken and scallop broth with basil paste, edamame and rolled chicken chashu. Light yet satisfying, it offers a comforting warmth that highlights Konjiki’s ability to create depth even in simplicity.

Chef Yamamoto-san recently visited Dubai to mark the official opening of the new Palm Jumeirah Mall branch, located on Level 1, a milestone moment for the Michelin-recognised ramen house as it continues to expand Tokyo’s celebrated ramen culture across the UAE. The new restaurant builds on the success of Konjiki Hototogisu’s Mall of the Emirates branch, which has earned the Michelin Bib Gourmand in both 2024 and 2025.

The Palm Jumeirah Mall location reflects Konjiki’s dedication to precision and authenticity, translated into a welcoming setting that mirrors the artistry of every bowl. Guests can expect a dining experience rooted in Japanese culinary philosophy while embracing Dubai’s growing appetite for quality and creativity in gastronomy.

Continue Reading

Uncategorized

HID SHOWCASES THEIR LATEST INNOVATION AT GITEX GLOBAL 2025

Published

on

HID Global exhibition booth at trade show featuring RFID Intelligence and ID card printing solutions, with attendees in business attire viewing displays and a video presentation

Exclusive Interview with Steve Swenson – Senior Director, Product and Marketing, Secure Issuance, HID FARGO

What are the key innovations HID is showcasing this year at GITEX Global, and how do they reflect the company’s vision for a better, more secure, and connected digital ecosystem?

Okay, sure, great question. So here at the show today, we’re showcasing a line of HID FARGO printers. FARGO is a strong and storied brand for HID in the desktop issuance space. We are specifically showing our full line of retransfer and DTC printers. One printer in particular that we’re showcasing is our new HDP5000e, which is a refresh of a long and storied product for the Fargo brand.

The HDP5000e has a number of important updates to strengthen overall performance, improve output and processing power, and reinforce reliability ensuring the product can stand up to the rigor of our customers’ needs. It also includes usability enhancements to streamline the issuance and card creation process, and strong end-to-end security with AES encryption and resin scramble technology to protect leftover data after cards are created.

We’re also talking about our HID FARGO Connect technology, which is a cloud-based software that allows organizations with complex issuance processes to remotely manage devices, create credentials from one location, and print them at another. This is particularly important for enterprise and healthcare customers with distributed operations.

It’s an exciting time for the HID FARGO business. We’re doing a lot to strengthen the product line and build on our reputation. You mentioned how this connects to HID’s broader vision when we look at issuance processes, they can be quite complex. Customers want high quality visual credentials with secure encoding and durability. Our strategy with the HID FARGO line is to create robust end-to-end solutions that streamline issuance and help organizations operate efficiently.

HID serves a wide range of sectors—from finance to hospitality to transportation. How do you tailor your solutions to meet the unique identity and access management needs of such diverse industries?

Great question. One of the most fundamental things we do as a business is to study and understand the different needs of those sectors. We create a range of solutions—high-end retransfer printers for speed, quality, and resolution, and DTC products for lighter applications. All of our products are modular, allowing customers to configure them according to their specific issuance and organizational requirements.

We complement that with high-quality consumables such as ribbons, overlaminates, and visual security features, as well as software for both desktop and cloud-based issuance. Another key part of our approach is our partner network. HID FARGO doesn’t sell directly to end customers because we understand that every customer has unique needs. Our partners work closely with end users to understand their requirements and collaborate with HID to deliver custom solutions. This combination of modular products, software, and local expertise ensures each customer gets exactly what they need.

In sectors such as hospitality and retail, convenience is key. How is HID leveraging digital identity, mobile access, and cloud-based issuance to create smoother and more secure guest experiences?

Great question. Going back to understanding the end user, we study every aspect of the issuance process. Creating an ID credential can be complex, so we focus on making it simple from setup to configuration. The HID FARGO business invests in strong out-of-box experiences, easy instructions, and partner support to help customers get up and running quickly.

For card design and creation, we provide intuitive software solutions, whether on premise or cloud based. For customers managing large fleets of printers, our cloud solutions allow them to monitor device status, print to multiple locations, and design credentials centrally. We also invest heavily in technical support both directly and through our partners to minimize downtime and quickly resolve any issues.

The Middle East is witnessing diverse growth in digital infrastructure and smart technologies. What is HID’s priority for its 2025 vision and beyond?

It goes back to what we just discussed bringing all these components together to help organizations create secure, durable, and visually robust credentials efficiently. Organizations don’t exist to create credentials, but they all need them to manage access and identity.

Our goal is to take the power of HID’s technology and turn it into simple, easy to understand, and customizable solutions for each user, supported by a strong partner network that provides a complete solution. If we can do that, we’re truly harnessing the full power of HID to meet the most important issuance needs of our customers.

Continue Reading

Trending

Copyright © 2023 | The Integrator