Tech Interviews
On the Upswing
By Editor
The buzz around the audacious BlackBerry Passport perhaps illustrates the best the renewed interest behind this mobile pioneer. We caught up with Nader Henein, Regional Director MEA for BlackBerry to shed light on these developments
BlackBerry is in the middle of a renaissance. What is behind this momentum?
Our business is growing exceptionally well. After John Chen, our new CEO, took over last year, we’ve refocused on our core domain which is the enterprise and our enterprise customers. We’ve focused on devices that bring more productivity into the businesses and we’ve been rewarded. A lot of businesses that walked away at some point are welcoming us back. We are launching BES 12, which is our new version of the enterprise server and that is going to bring dozens of additional features for the enterprise focused on getting work done securely, speedily and getting more efficiency out of your day. This has been our core from the very beginning when our co-founders started the business. It brought down the complexity of having secured mail to the simplicity of being able to send and receive an SMS. Right now we are going back to those same lines like government, banking, finance, Insurance, MNCs etc.
How are you making sure that partners are part of this revival?
We’ve seen a lot of partners approaching us telling us they would like to resell and distribute our solutions. We are setting up partners in Africa in countries like Nigeria and Kenya to add to the resellers we already have as well more partners in the Middle East and Africa to be able to cover for the amount of demand we are seeing. In the UAE, our partners include EMS and Axiom while across Africa we have partners such as Dimension Data etc. as well as Ingram Micro as one of our biggest partners globally. This speaks of our commitment and ability to deliver.
This region is very important for BlackBerry-you can see in our product launches. Whenever we do, we launch simultaneously with Dubai as the regional hub with other places such as London and Canada.
Discuss the overall enterprise mobile management market and BlackBerry’s position in it
We are by far the largest enterprise mobility management solutions provider in the market. We have massive deployments all over the world. One customer for instance is the US Department of Defence with over 600,000 devices managed by the Blackberry enterprise server, testament to our scalability and security. Today we have over 100,000 deployments today of the BlackBerry enterprise solutions. That number is larger than the next three competitors combined.
But we are not stopping there. Whenever we speak to customers, we ask the question, “How does the road map look like?” “This is your current product today, but how does your product look like in six months?” This is because only a company that is dedicated to mobility will show you depth in that a roadmap. Unlike us, mobility is not our major competitor’s core focus.
Discuss how your device business, epitomized by the new passport, ties to the overall enterprise mobile management solutions
Within BlackBerry we have multiple Silos. One silo is the device business, the other one is the enterprise mobility management, another one is the solutions business such as BBM with the last one being QNX, the operating system that BlackBerry 10 runs on. QNX is deployed in many other places such as BMW and Porsche cars, GE medical equipment, etc.
So when you deploy a BlackBerry device inside an enterprise and you manage it through a BlackBerry enterprise server, the experience the user gets is second to none. If you look at other solutions and how they manage iOS, Android or Windows devices, it’s like making them do something they are not built to do. However, for us because everything is built under one roof and you get the native experience to everything. All the mails, contacts, address, book, notes, tasks etc., are all in the same place whereas with other solutions you have to keep switching from work to the personal. With BlackBerry for instance, you see all the appointments for the day, both work and personal on the calendar in one interface. The new BlackBerry Passport fits in perfectly with our overall enterprise strategy.
User Experience is of course central to any mobility function. Is UX a major consideration for BlackBerry and its devices?
The beauty of the enterprise solution is that it allows you to, from one interface, pull applications from various app stores and push them to the device and it’s all very simple. You install our solutions and to our server allows you to mobilize all the applications internally and then offer those applications selectively to either all enterprise users or to some of them within groups.
However, our enterprise mobile management solutions are not just available on BlackBerry with support for iOS and Android devices with upcoming BES 12 supporting Windows Mobile as well. Our strategy is to always support all the major operating systems which give you 98% market coverage.
BlackBerry devices are also popular consumer device. How does the company leverage enterprise-grade solutions to build a stronger consumer base?
The most important thing for most people is security; and we do security properly. On the enterprise side we have built military-grade security into the device and the consumer ends up benefitting from those as well. What is called security in the enterprise is referred to as privacy on the consumer end. Both are equally important for us. This can be seen in the way we design our solutions. BBM for instance is not based on your phone number or email but on a unique number or BB ID such that if you want to connect with somebody, it’s an opt-in proposition. Other messaging solutions scan your contact numbers and then connect you with people that you may not necessarily want to connect with. All the information on our devices is also secured with features such as parental controls built in. We also have solutions such as BlackBerry Protect so you can track the device and wipe it clean remotely from a web browser.
What is BlackBerry’s own road map for the next year?
Over the next one year, I see us expanding the current base that we have by driving more depth into existing customers by getting them to mobilize more than their mails. The Middle East region is still in its early stages for mobility adoption. Initially customers adopt mobility to get mails, tasks, notes, calendar and other basis on their device. The second stage is starting to mobilize applications such as CRM. After that, you start looking at small groups and mobilizing their requirements within the enterprise. We consequently want to start moving the traditional mobility to those mature phases.
Cover Story
Catalyst Business Partners at the Forefront of Digital Transformation
In an exclusive interview, Jay Kalra, Chief Technology Officer at Catalyst Business Partners, shares insights into how the company is transforming businesses with cutting-edge cloud solutions and AI technologies. From integrating ERP, HCM, and CRM systems to offering Oracle Cloud Infrastructure (OCI) for enhanced scalability and security, Catalyst provides a comprehensive approach to driving innovation. The discussion covers their unique cloud migration strategies, smart automation integration, and advanced cybersecurity measures, along with exciting developments in AI, machine learning, and advanced analytics.
How does Catalyst integrate ERP, HCM, and CRM into an organization’s framework?
Everyone has a different reason for choosing or adopting any of these technologies. For me, it’s about having information at my fingertips. These functionalities can significantly enhance an organisation’s existing framework by streamlining processes, improving data flow, and providing better decision-making capabilities. They also help with data unification, process standardisation, sales and marketing alignment, customer and employee data integration, scalability, compliance, and interoperability. With the recent advancements in AI and ML, business users can get deep insights from these systems.
Can you provide insights into Catalyst Cloud’s infrastructure and key benefits compared to other cloud services?
Our offerings are tailored to the client’s requirements. While some may opt for the Public Cloud, others prefer Cloud @customer or a local/ regional Data Center. Our team members review the requirements, assess, discuss, and finalise the offering. Our preferred cloud is Oracle Cloud Infrastructure, or OCI, in short.
OCI is Oracle’s comprehensive cloud platform, offering various computing, storage, networking, and database management services. It is designed for enterprise workloads and provides high performance, security, and scalability for businesses of all sizes. Generative AI is embedded across the entire technology stack to provide immediate business value, and customers can use AI capabilities provided by OCI for their applications and solutions.
OCI also offers hybrid cloud capabilities, allowing businesses to connect their on-premise infrastructure to Oracle Cloud via services like Oracle Cloud at Customer, which provides a dedicated region within a customer’s data center.
It supports multi-cloud architectures, where businesses can integrate Oracle Cloud with other public cloud services, such as Microsoft Azure, through partnerships and interoperability solutions like Oracle-Azure Interconnect, Oracle-AWS Interconnect, and Oracle-Google Interconnect.
How are you incorporating smart machines and automation into your service offerings?
Since early 2008, we have been helping our customers in their IoT (Internet of Things) and workflow automation journey. With the recent advancement of AI and Gen AI, customers are taking workflow automation to the next level.
Many ready-to-use connected devices (LoRa, BLE, WiFi, and others) are available and can be incorporated for various smart use cases. Sometimes, a custom solution may be required, and our team can build such solutions. Because our team understands smart devices and ERPs, we can combine smart devices with an enterprise resource planning (ERP) system to create a highly integrated, data-driven ecosystem that further enhances automation, real-time monitoring, and operational efficiency. This approach allows customers to gain a competitive edge through real-time, data-driven decision-making.
How do you ensure seamless integration and optimisation of Oracle applications within your client’s IT environments?
Seamless integration and optimisation of Oracle applications within a client’s IT environment requires a comprehensive strategy encompassing planning, execution, and continuous improvement. It all starts with careful listening, understanding the business needs and current IT landscape, a thorough compatibility check, integration scope & architecture, data migration, cloud vs on-premise, testing and validation, security, use of pre-built connectors as much as possible, incorporating industry standard best practices, avoiding customisations, and most importantly training of end users, IT teams, and a structured change management process.
How does Catalyst protect businesses against emerging cybersecurity threats?
Protecting businesses against emerging threats requires a comprehensive, multi-layered approach that combines technical, procedural, and strategic measures. Our goal is to achieve a near Zero trust architecture. If the customer already uses cybersecurity solutions, we will do an assessment followed by recommendations. We use different methods to define the landscape using various Cyber Posture solutions that provide us with data based on risk-scoring models, leading to advanced monitoring and detection tools.
One must use proactive defense mechanisms with AI & ML, solid incident response, and automation. Regular audits, penetration testing, and training are other important factors to stay on top of new threats.
How does the company assist organisations in navigating the complexities of cloud migration, and what cloud platforms do you specialise in?
Migrating to the cloud can be a complex, multi-faceted process, but with careful planning and execution, organisations can navigate this shift smoothly.
Understand your scalability, cost-efficiency, performance, security, and innovation needs. One must evaluate their current infrastructure, any challenges, future expansion plans, and workloads, as while some may be cloud-ready, others may require additional planning & modifications.
Choose the suitable model-
Public Cloud: Great for scalability and flexibility.
Private Cloud: Best for security-sensitive industries.
Hybrid Cloud: Balances flexibility with security.
Multi-Cloud: Leveraging multiple cloud providers for redundancy and flexibility.
Once you have the above data, we compare the cloud providers, their pros and cons, pricing, migration strategy, data strategy, security, compliance, AI capabilities, backup, and fine print.
We help our customers from start to finish; our custom offerings include any part of the cloud journey, including post-go-live support, training, and managed services. While our teams are trained on all major cloud providers, we prefer Oracle Cloud Infrastructure.
What distinguishes your managed services from those of other providers, particularly in terms of proactive monitoring and issue resolution?
Proactive monitoring and issue resolutions are the critical differentiators. We use solutions with AL & ML with unified, centralised Dashboards, Reports, and Actionable Insights. We provide tailored SLAs to ensure our clients can select what’s most relevant to their requirements. All the options are provided with on-demand scalability and multi-environment support, dedicated account management, knowledge transfer, and continuous improvement.
What innovations or new services is Catalyst planning to introduce in the near future, particularly in AI, machine learning, or advanced analytics?
We are developing solutions using custom AI models, Generative AI for creative content, AI-powered data augmentation, and workflow automation, as well as providing best-of-the-breed solutions and services using a broad partner channel.
Some of these partners work on AI-driven predictive analytics, advanced AI-based cybersecurity, healthcare diagnostics, employee training & coaching, talent recruitment, video analytics, and conversational bots.
We are excited about the future and looking forward to helping our new and existing customers.
Tech Interviews
Strengthening Cyber Defenses in the UAE
In an interview with Integrator Media, Naji Salama, CEO at IT Max Global discusses the UAE’s strategic investment in data security, which is set to reach $1.8 billion in 2024, a significant 15% increase from the previous year. The discussion highlights the critical drivers of this growth, including heightened cyber threat awareness, evolving regulatory frameworks, and the ongoing digital transformation across industries. She also sheds light on the substantial financial impact of cybercrime in the region, revealing losses estimated at $1.4 billion annually. Naji delves into prevalent fraudulent schemes targeting financial document handlers and emphasize the importance of integrating AI and machine learning to mitigate cyber risks.
With data security being a global issue and concern, what do you think is the value of UAE spending on data security in 2024 and how does this compare from last year (2023)?
There is a much stronger focus on data security spending here in the UAE. Projections show the UAE will reach around US$1.8 Billion dedicated to data security in 2024. That is a significant jump, with a growth rate of about 15% compared to last year.
There are a few key drivers behind this increase. First, there’s a heightened awareness of cyber threats. Businesses are more aware than ever of the potential damage cyberattacks can cause. Regulatory requirements are also playing a role,with stricter data protection laws coming into effect. And finally, don’t forget the ongoing digital transformation across many sectors. As companies move more of their operations online, the need for robust data security becomes even more critical.
The increase in data security spending reflects a strong commitment from UAE Government and businesses to safeguarding their digital assets. It is a positive trend, and it shows that companies are taking the cyber threat seriously.
What is the value of cybercrime losses suffered by companies in the UAE every year?
Unfortunately, it is difficult to pinpoint an exact figure. There are so many factors at play, and many cyber incidents go unreported. However, based on industry reports, estimates suggest cybercrime losses could be in the billions of dirhams annually. One recent estimate we’ve seen is US$1.4 billion. This highlights the importance of robust cybersecurity measures.
What are the most prominent fraudulent schemes targeting UAE employees dealing with financial documents?
In the UAE, we find that employees dealing with financial documents are increasingly targeted by sophisticated phishing and Business Email Compromise (BEC) schemes. Phishing is a deceptive practice where attackers impersonate legitimate entities. Business Email Compromise (BEC) is when cybercriminals fake (spoof) an email’s sender address to pose as executives or trusted partners, instructing employees to transfer funds or share confidential data. One recent case we have had to deal with was for a large enterprise where cybercriminals posing as the CEO had managed to get someone in finance to wire north of 500,000 AEDs to their account. We’ve also noticed that ransomware attacks have become more prevalent, where malicious actors encrypt crucial financial documents and demand a ransom for their release. On top of the robust security countermeasures provided to our customers, we also provide interactive security training for personnels. We believe that educating employees about these schemes is essential in mitigating these risks.
What are the best directions of data insurance services in UAE 2024?
Data insurance is certainly evolving rapidly, and we are seeing some exciting developments here in the UAE. One of the key areas I see is a move towards more comprehensive coverage. In the past, data insurance might have just focused on data breach notification. But today’s businesses need protection from a wider range of threats. We’re talking ransomware attacks, business disruptions due to cyber incidents, and even privacy violations. The best data insurance products will offer that broader shield.
Integration with cybersecurity solutions is a critical trend in data insurance. Direct links between data insurance and security infrastructures can offer discounts for strong security or bundled services, boosting cybersecurity resilience. With the rise of cloud computing, data insurance must adapt to address unique cloud security challenges. As the market matures, expect more standardized policies, increasing transparency and consistency. These trends make data insurance more valuable and relevant.
How are AI and machine learning technologies integrated into the tech companies’ environment to reduce cybercrime?
AI and machine learning are becoming game-changers in cybersecurity. For example, these technologies allow the security experts at IT Max to analyze vast amounts of data – such as security, hardware or network logs – in real-time, helping to identify suspicious activity and potential breaches much faster. They can also be used to develop adaptive security systems that can learn and adjust to new threats as they emerge. Additionally, AI can automate many routine security tasks, freeing up IT teams to focus on strategic initiatives and incident response.
In short, I would say AI has allowed companies and security providers like IT Max mount much more proactive and adaptive defenses against cybercrime.
What are the most significant weaknesses of enterprises and companies causing increased cyberattacks?
There are a few key areas. One is unpatched vulnerabilities. If companies do not keep their software and systems updated with the latest security patches, they are leaving gaping holes for attackers to exploit. This is why “patch management” is one of our core managed security services, where we handle this on behalf of our clients as seamlessly as can be. Another big issue is weak password management. Employees often reuse weak passwords across multiple accounts, making them easy targets for brute-force attacks and/or leaks over the dark web or other channels used by malicious actors.
Some companies, more often the smaller ones or the ones without a dedicated cybersecurity team, simply don’t have adequate security measures in the first place. This could mean lacking firewalls, intrusion detection systems, or other essential security controls. That’s why it is crucial for such entities to partner with a managed security provider such as IT Max.
Larger enterprises face unique threats, with numerous entry points for attackers. Inadequate segmentation in complex IT infrastructures enables lateral movement within networks. The biggest challenge is a lack of awareness, as data breaches often stem from human error or exploitation. Untrained employees can fall prey to malicious links or inadvertently share sensitive information, highlighting the necessity of investing in cybersecurity education.
Spotlight
Celebrating Emirati Women’s Day with Maryam A Hassani
On the special occasion of Emirati Women’s Day, Integrator Media had an exclusive interview with Maryam A Hassani, Co-founder & CEO at Zealous.
How did you start your career in technology? What was your journey like at the beginning, and how has it evolved over time?
After graduating from NYU Abu Dhabi, I started my career as a strategy consultant at one of the big four firms. My gravitation toward innovation and startup projects provided me with the opportunity to lead the Special Olympics Innovation Challenge and play a key role in the MBRIF Accelerator Program.
Over the years, I’ve supported more than 45 diverse companies in localizing and establishing themselves in the MENA region. I’ve always been passionate about the emerging tech ecosystem in MENA, from designing startup programs to supporting the localization of startups, and now, being a startup founder myself.
I’m driven by the mission to solve today’s most pressing challenges with technology. I believe that leveling the playing field in software development through AI will unlock substantial opportunities for entrepreneurs with similar goals.
Was there a specific challenge you faced early in your career that you’d like to share with our readers?
From the start of my founder journey, I knew I wanted to build a product leveraging emerging technologies, but as a non-tech founder, my ability to build and experiment was limited.
Initially, I explored working with regional software development firms, but any experienced founder knows that’s not the best approach. These firms are focused on delivering products ready for the market, but building a new venture is a journey of learning and iteration. You need to start with an MVP that addresses a significant problem and test it in the market. What I really needed was a technical co-founder with the expertise and the same level of commitment to the mission as I had.
Can you tell us a bit about your team at Zealous and the story behind the creation of Zealous?
My co-founder and I met at a leading international tech event, where we bonded over our shared passion for making professional networking intentional, easy, and meaningful in emerging tech scenes.
The mission of Zealous has always been to answer the question, “How can we leverage AI to help people?” Initially, it was about making it easier to connect with like-minded entrepreneurs in emerging tech markets. Today, we have two products in the market that are free to use:
- Zealous Social App for professionals to find, meet, and stay connected with connections on the go.
- Zaia AI Event Assistant for professionals to get personalized, real-time suggestions on how to collaborate with the connections they make at events.
As a bootstrapped company, our journey led us to develop an in-house AI code generation and testing framework, Zealous TenX, to help us meet the demands of building and iterating our software products in the most time- and cost-effective way. Using it ourselves, we quickly realized we were onto something significant with this framework.
Now, our focus is on supporting software developers and companies in developing products faster, reducing overhead costs, and maintaining quality code as they scale. We are still very much serving the emerging tech space, just from a different angle and addressing a more pressing problem in the market.
What initiatives has Zealous implemented to support the advancement of women in technology?
We are passionate about helping people connect better, especially in emerging markets in the Middle East. Women globally are roughly 25-30% less likely to network effectively and meet the right people.
I dedicate time to mentoring and supporting university entrepreneurship programs to encourage young women and aspiring founders to pursue their ideas. I also make an effort to demystify what it really means to build a startup. I wish someone had done this for me sooner. I share my learnings as a female Arab founder and my findings from the emerging tech space, with the hope that they can learn and be better off as a result.
How is Zealous leveraging AI to help women expand their networks? Additionally, what other functionalities and features does Zealous offer?
Both female and male entrepreneurs can benefit from Zealous’ professional networking products by connecting with others in the space. Creating intentional and meaningful connections today is challenging; at events with potentially thousands of attendees, it’s difficult to remember every face and every business card. We simplify this process, enabling event networkers to scan business cards or LinkedIn QR codes instantly and automatically save details such as where they met, the person’s role, their organization, and the intentions for the meeting.
Women generally need to know more about an individual before they feel confident reaching out or engaging in conversation. Our products take that into account. Although our products are not exclusively for women, the user experience and intention-based features are optimized to suit cultural and social norms.
Moreover, knowing that women founders don’t get as much capital investment (female-founded startup investments dropped by 64% in MENA in 2023), our code generation product helps them get a foot in the market with lower overhead costs.
What advice would you give to young Emirati women aspiring to careers in technology?
I would advise other women on their tech founder journey to focus on identifying a worthy problem to solve first, rather than starting with company setup.
The journey of any tech startup founder is challenging, from finding a problem worth solving to developing a viable solution for a large enough market that customers will pay to use. Given the time and resource intensity, I strongly recommend finding a problem that intrigues you and that you want to explore deeply.
Unfortunately, raising VC funding as a female founder is especially difficult, so be mindful of monthly spending and subscriptions. Also, make use of the support available, such as programs and incentives in the UAE that help reduce startup costs.
-
Tech News3 months ago
Denodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
Tech Interviews7 months ago
Navigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News7 months ago
Brighton College Abu Dhabi and Brighton College Al Ain Donate 954 IT Devices in Support of ‘Donate Your Own Device’ Campaign
-
Features4 months ago
Security in the Cloud Age: Combating Risks with Hybrid Cloud Solutions
-
Tech Features4 months ago
The Middle East to Lead with Next-generation Mission Critical Communication Advancement
-
Automotive7 months ago
Al-Futtaim Automotive Builds On 23-Year Legacy of Trust & Leadership in UAE’s Pre-Owned Car Market to Sell Over 25,000 Used Vehicles in 2023
-
Tech News10 months ago
Senet enters MENA’s Competitive Gaming Scene with ‘skill-to-earn’ Platform
-
Tech Features8 months ago
How Telecommunications Providers Can Best Tackle DDoS Attacks