Tech Interviews
SECOND TO NONE
By Editor
The company that revolutionized the mobile scanning industry is ready for its own encore after recent acquisition by giant Canon. Nicolas Moies-Delval, Corporate Marketing Director at IRIS discusses how this future continues to evolve
IRIS was acquired last year by Canon. Discuss the integration and effect on IRIS’s business model
IRIS is now part of the Canon Group after being bought out one and a half years ago. We are fully integrated with Canon even though we continue to keep the name and the brand IRIS which is important to us in the market. Our product line, mobile scanners is complementary with their solutions-they have bigger and wider scanners while we are more into the mobile segment. We’ve been known for our quality products, only enhanced now that we are part of Canon. As might be expected, the quality process is very strict. We go through a very strict quality control process today for both software and hardware.
Discuss briefly some of the key products and solutions on showcase here at GITEX
Our main announcements are on three products: the IRIScan Pro3 Wi-Fi is a very unique product in the market because it is the only multiple sheet scanner that’s truly mobile in the market today. There are multiple sheet-fed scanners out there, but the IRIScan Pro 3Wi-Fi is the only one that is truly portable. It is battery powered via a lithium battery so you can charge it via USB or into the wall plug. You can scan your products, up to eight pages, and once that is done you can send that via Wi-Fi to any device. We are pushing mobility one step further as we position ourselves as the mobile scanning company that can connect to any single device available in the market. This can be an iPhone, iPad, or Android devices. Further, we have developed a dedicated iOS app with OCR integrated.
From a software perspective, discuss briefly what features customers are getting out of the box
IRIS was created 27 years ago as a software company specialized in OCR; that really is the DNA of our company. With each scanner we provide a powerful software suite that allows users to capture all the information from documents and turn them into editable text allowing him to sort them and share them with colleagues. Our goal is to turn that precious piece of paper into digitized information.
We also have other software bundled including ReadIRIS which is the corporate and higher version of our OCR software so you can capture all the information from the document and then turn that information into a Word document if you want to edit it or PDF is you want to share. The PDF is indexed meaning that all the text contents from the PDF has been recognized and separated from the images. So when you want to a desktop search and you remember a keyword and type it, the document gets retrieved. We also have a unique solution called the IRIS Compressor which is our key compression technology. If you scan a 10MB document with multiple pages, with this technology you will be able to generate a hyper compressed PDF that is up to 20 times smaller than the original documents. Storage is precious so this allows you to save on costs and easier sharing of documents with heavy visuals.
The other software is Card IRIS, a business card recognition software. There’s a dedicated slot within the scanner that allows you to scan business cards and once you get back to the office, the business card will automatically be imported to the software. This software recognizes all the fields captured and put into their respective fields such as names, email, phone no. etc. Once this is done, you can export the contacts to Outlook or CRM software. The third software is IRIS File which acts as a document management system that allows you to deal with those captured documents by saving them in a safe electronic environment where they can be retrieved and sorted.
What’s different then with IRIS Scanners with so many other competing brands in the market?
The scanner is completely portable with a lithium rechargeable battery. You just need to charge for not more than two hours after which you can spend the whole day scanning without recharging it. There’s a dedicated slot for scanning business cards as well as credit cards and identity cards. You can insert up to eight pages at the same time at the feeder and scan them in one batch. That is something that is very unique for a mobile scanner. The scanning speed is eight pages per minute with a scanning resolution of either 300 or 600 dpi. You can scan JPEG or PDF directly, colour or black and white. The unique feature is that your can connect your scanner via Wi-Fi to external devices such as a laptop and also to an Android or iOS smartphones and tablets. We have developed two iOS and Android apps that allows you to connect your device to your scanner and do OCR directly on your mobile device and that’s really key.
Is there a flagship product performing particularly well in the Middle East market
The Middle East market is very important for IRIS and that is why we have been coming to GITEX for the last 11 years now for our consumer products as well as our Pro solutions. The business card reader is popular in the Middle East and is still selling as well as our new products such as the IRIS Scan Pro Wi-Fi. We are answering real customer demand for such products especially for Small to medium sized businesses. They were looking for an out of the box scanner with powerful software that you can just get on the shelf. The problem with previous scanners and the software that comes with it is that you need expertise to install it and configure it. With this, it’s just out of the box and basically plug & play.
The major improvement from previous editions is that you had to have 3G/4G connections to do OCR. When travelling the carrier charges can be a hindrance. In addition, you do not need to be connected to the internet to do the OCR part. This is one of the gaps we are trying to fill now with an integrated and intuitive app that link with our scanners but also can be used as a standalone. So if you have an iPhone and you do not want to buy the scanner, you can still use it by taking a picture of a document. Having said that, it’s better when you are using a mobile scanner with more functionality. The investment is not much at around 229USD for both the hardware and the software
Cover Story
Catalyst Business Partners at the Forefront of Digital Transformation
In an exclusive interview, Jay Kalra, Chief Technology Officer at Catalyst Business Partners, shares insights into how the company is transforming businesses with cutting-edge cloud solutions and AI technologies. From integrating ERP, HCM, and CRM systems to offering Oracle Cloud Infrastructure (OCI) for enhanced scalability and security, Catalyst provides a comprehensive approach to driving innovation. The discussion covers their unique cloud migration strategies, smart automation integration, and advanced cybersecurity measures, along with exciting developments in AI, machine learning, and advanced analytics.
How does Catalyst integrate ERP, HCM, and CRM into an organization’s framework?
Everyone has a different reason for choosing or adopting any of these technologies. For me, it’s about having information at my fingertips. These functionalities can significantly enhance an organisation’s existing framework by streamlining processes, improving data flow, and providing better decision-making capabilities. They also help with data unification, process standardisation, sales and marketing alignment, customer and employee data integration, scalability, compliance, and interoperability. With the recent advancements in AI and ML, business users can get deep insights from these systems.
Can you provide insights into Catalyst Cloud’s infrastructure and key benefits compared to other cloud services?
Our offerings are tailored to the client’s requirements. While some may opt for the Public Cloud, others prefer Cloud @customer or a local/ regional Data Center. Our team members review the requirements, assess, discuss, and finalise the offering. Our preferred cloud is Oracle Cloud Infrastructure, or OCI, in short.
OCI is Oracle’s comprehensive cloud platform, offering various computing, storage, networking, and database management services. It is designed for enterprise workloads and provides high performance, security, and scalability for businesses of all sizes. Generative AI is embedded across the entire technology stack to provide immediate business value, and customers can use AI capabilities provided by OCI for their applications and solutions.
OCI also offers hybrid cloud capabilities, allowing businesses to connect their on-premise infrastructure to Oracle Cloud via services like Oracle Cloud at Customer, which provides a dedicated region within a customer’s data center.
It supports multi-cloud architectures, where businesses can integrate Oracle Cloud with other public cloud services, such as Microsoft Azure, through partnerships and interoperability solutions like Oracle-Azure Interconnect, Oracle-AWS Interconnect, and Oracle-Google Interconnect.
How are you incorporating smart machines and automation into your service offerings?
Since early 2008, we have been helping our customers in their IoT (Internet of Things) and workflow automation journey. With the recent advancement of AI and Gen AI, customers are taking workflow automation to the next level.
Many ready-to-use connected devices (LoRa, BLE, WiFi, and others) are available and can be incorporated for various smart use cases. Sometimes, a custom solution may be required, and our team can build such solutions. Because our team understands smart devices and ERPs, we can combine smart devices with an enterprise resource planning (ERP) system to create a highly integrated, data-driven ecosystem that further enhances automation, real-time monitoring, and operational efficiency. This approach allows customers to gain a competitive edge through real-time, data-driven decision-making.
How do you ensure seamless integration and optimisation of Oracle applications within your client’s IT environments?
Seamless integration and optimisation of Oracle applications within a client’s IT environment requires a comprehensive strategy encompassing planning, execution, and continuous improvement. It all starts with careful listening, understanding the business needs and current IT landscape, a thorough compatibility check, integration scope & architecture, data migration, cloud vs on-premise, testing and validation, security, use of pre-built connectors as much as possible, incorporating industry standard best practices, avoiding customisations, and most importantly training of end users, IT teams, and a structured change management process.
How does Catalyst protect businesses against emerging cybersecurity threats?
Protecting businesses against emerging threats requires a comprehensive, multi-layered approach that combines technical, procedural, and strategic measures. Our goal is to achieve a near Zero trust architecture. If the customer already uses cybersecurity solutions, we will do an assessment followed by recommendations. We use different methods to define the landscape using various Cyber Posture solutions that provide us with data based on risk-scoring models, leading to advanced monitoring and detection tools.
One must use proactive defense mechanisms with AI & ML, solid incident response, and automation. Regular audits, penetration testing, and training are other important factors to stay on top of new threats.
How does the company assist organisations in navigating the complexities of cloud migration, and what cloud platforms do you specialise in?
Migrating to the cloud can be a complex, multi-faceted process, but with careful planning and execution, organisations can navigate this shift smoothly.
Understand your scalability, cost-efficiency, performance, security, and innovation needs. One must evaluate their current infrastructure, any challenges, future expansion plans, and workloads, as while some may be cloud-ready, others may require additional planning & modifications.
Choose the suitable model-
Public Cloud: Great for scalability and flexibility.
Private Cloud: Best for security-sensitive industries.
Hybrid Cloud: Balances flexibility with security.
Multi-Cloud: Leveraging multiple cloud providers for redundancy and flexibility.
Once you have the above data, we compare the cloud providers, their pros and cons, pricing, migration strategy, data strategy, security, compliance, AI capabilities, backup, and fine print.
We help our customers from start to finish; our custom offerings include any part of the cloud journey, including post-go-live support, training, and managed services. While our teams are trained on all major cloud providers, we prefer Oracle Cloud Infrastructure.
What distinguishes your managed services from those of other providers, particularly in terms of proactive monitoring and issue resolution?
Proactive monitoring and issue resolutions are the critical differentiators. We use solutions with AL & ML with unified, centralised Dashboards, Reports, and Actionable Insights. We provide tailored SLAs to ensure our clients can select what’s most relevant to their requirements. All the options are provided with on-demand scalability and multi-environment support, dedicated account management, knowledge transfer, and continuous improvement.
What innovations or new services is Catalyst planning to introduce in the near future, particularly in AI, machine learning, or advanced analytics?
We are developing solutions using custom AI models, Generative AI for creative content, AI-powered data augmentation, and workflow automation, as well as providing best-of-the-breed solutions and services using a broad partner channel.
Some of these partners work on AI-driven predictive analytics, advanced AI-based cybersecurity, healthcare diagnostics, employee training & coaching, talent recruitment, video analytics, and conversational bots.
We are excited about the future and looking forward to helping our new and existing customers.
Tech Interviews
Strengthening Cyber Defenses in the UAE
In an interview with Integrator Media, Naji Salama, CEO at IT Max Global discusses the UAE’s strategic investment in data security, which is set to reach $1.8 billion in 2024, a significant 15% increase from the previous year. The discussion highlights the critical drivers of this growth, including heightened cyber threat awareness, evolving regulatory frameworks, and the ongoing digital transformation across industries. She also sheds light on the substantial financial impact of cybercrime in the region, revealing losses estimated at $1.4 billion annually. Naji delves into prevalent fraudulent schemes targeting financial document handlers and emphasize the importance of integrating AI and machine learning to mitigate cyber risks.
With data security being a global issue and concern, what do you think is the value of UAE spending on data security in 2024 and how does this compare from last year (2023)?
There is a much stronger focus on data security spending here in the UAE. Projections show the UAE will reach around US$1.8 Billion dedicated to data security in 2024. That is a significant jump, with a growth rate of about 15% compared to last year.
There are a few key drivers behind this increase. First, there’s a heightened awareness of cyber threats. Businesses are more aware than ever of the potential damage cyberattacks can cause. Regulatory requirements are also playing a role,with stricter data protection laws coming into effect. And finally, don’t forget the ongoing digital transformation across many sectors. As companies move more of their operations online, the need for robust data security becomes even more critical.
The increase in data security spending reflects a strong commitment from UAE Government and businesses to safeguarding their digital assets. It is a positive trend, and it shows that companies are taking the cyber threat seriously.
What is the value of cybercrime losses suffered by companies in the UAE every year?
Unfortunately, it is difficult to pinpoint an exact figure. There are so many factors at play, and many cyber incidents go unreported. However, based on industry reports, estimates suggest cybercrime losses could be in the billions of dirhams annually. One recent estimate we’ve seen is US$1.4 billion. This highlights the importance of robust cybersecurity measures.
What are the most prominent fraudulent schemes targeting UAE employees dealing with financial documents?
In the UAE, we find that employees dealing with financial documents are increasingly targeted by sophisticated phishing and Business Email Compromise (BEC) schemes. Phishing is a deceptive practice where attackers impersonate legitimate entities. Business Email Compromise (BEC) is when cybercriminals fake (spoof) an email’s sender address to pose as executives or trusted partners, instructing employees to transfer funds or share confidential data. One recent case we have had to deal with was for a large enterprise where cybercriminals posing as the CEO had managed to get someone in finance to wire north of 500,000 AEDs to their account. We’ve also noticed that ransomware attacks have become more prevalent, where malicious actors encrypt crucial financial documents and demand a ransom for their release. On top of the robust security countermeasures provided to our customers, we also provide interactive security training for personnels. We believe that educating employees about these schemes is essential in mitigating these risks.
What are the best directions of data insurance services in UAE 2024?
Data insurance is certainly evolving rapidly, and we are seeing some exciting developments here in the UAE. One of the key areas I see is a move towards more comprehensive coverage. In the past, data insurance might have just focused on data breach notification. But today’s businesses need protection from a wider range of threats. We’re talking ransomware attacks, business disruptions due to cyber incidents, and even privacy violations. The best data insurance products will offer that broader shield.
Integration with cybersecurity solutions is a critical trend in data insurance. Direct links between data insurance and security infrastructures can offer discounts for strong security or bundled services, boosting cybersecurity resilience. With the rise of cloud computing, data insurance must adapt to address unique cloud security challenges. As the market matures, expect more standardized policies, increasing transparency and consistency. These trends make data insurance more valuable and relevant.
How are AI and machine learning technologies integrated into the tech companies’ environment to reduce cybercrime?
AI and machine learning are becoming game-changers in cybersecurity. For example, these technologies allow the security experts at IT Max to analyze vast amounts of data – such as security, hardware or network logs – in real-time, helping to identify suspicious activity and potential breaches much faster. They can also be used to develop adaptive security systems that can learn and adjust to new threats as they emerge. Additionally, AI can automate many routine security tasks, freeing up IT teams to focus on strategic initiatives and incident response.
In short, I would say AI has allowed companies and security providers like IT Max mount much more proactive and adaptive defenses against cybercrime.
What are the most significant weaknesses of enterprises and companies causing increased cyberattacks?
There are a few key areas. One is unpatched vulnerabilities. If companies do not keep their software and systems updated with the latest security patches, they are leaving gaping holes for attackers to exploit. This is why “patch management” is one of our core managed security services, where we handle this on behalf of our clients as seamlessly as can be. Another big issue is weak password management. Employees often reuse weak passwords across multiple accounts, making them easy targets for brute-force attacks and/or leaks over the dark web or other channels used by malicious actors.
Some companies, more often the smaller ones or the ones without a dedicated cybersecurity team, simply don’t have adequate security measures in the first place. This could mean lacking firewalls, intrusion detection systems, or other essential security controls. That’s why it is crucial for such entities to partner with a managed security provider such as IT Max.
Larger enterprises face unique threats, with numerous entry points for attackers. Inadequate segmentation in complex IT infrastructures enables lateral movement within networks. The biggest challenge is a lack of awareness, as data breaches often stem from human error or exploitation. Untrained employees can fall prey to malicious links or inadvertently share sensitive information, highlighting the necessity of investing in cybersecurity education.
Spotlight
Celebrating Emirati Women’s Day with Maryam A Hassani
On the special occasion of Emirati Women’s Day, Integrator Media had an exclusive interview with Maryam A Hassani, Co-founder & CEO at Zealous.
How did you start your career in technology? What was your journey like at the beginning, and how has it evolved over time?
After graduating from NYU Abu Dhabi, I started my career as a strategy consultant at one of the big four firms. My gravitation toward innovation and startup projects provided me with the opportunity to lead the Special Olympics Innovation Challenge and play a key role in the MBRIF Accelerator Program.
Over the years, I’ve supported more than 45 diverse companies in localizing and establishing themselves in the MENA region. I’ve always been passionate about the emerging tech ecosystem in MENA, from designing startup programs to supporting the localization of startups, and now, being a startup founder myself.
I’m driven by the mission to solve today’s most pressing challenges with technology. I believe that leveling the playing field in software development through AI will unlock substantial opportunities for entrepreneurs with similar goals.
Was there a specific challenge you faced early in your career that you’d like to share with our readers?
From the start of my founder journey, I knew I wanted to build a product leveraging emerging technologies, but as a non-tech founder, my ability to build and experiment was limited.
Initially, I explored working with regional software development firms, but any experienced founder knows that’s not the best approach. These firms are focused on delivering products ready for the market, but building a new venture is a journey of learning and iteration. You need to start with an MVP that addresses a significant problem and test it in the market. What I really needed was a technical co-founder with the expertise and the same level of commitment to the mission as I had.
Can you tell us a bit about your team at Zealous and the story behind the creation of Zealous?
My co-founder and I met at a leading international tech event, where we bonded over our shared passion for making professional networking intentional, easy, and meaningful in emerging tech scenes.
The mission of Zealous has always been to answer the question, “How can we leverage AI to help people?” Initially, it was about making it easier to connect with like-minded entrepreneurs in emerging tech markets. Today, we have two products in the market that are free to use:
- Zealous Social App for professionals to find, meet, and stay connected with connections on the go.
- Zaia AI Event Assistant for professionals to get personalized, real-time suggestions on how to collaborate with the connections they make at events.
As a bootstrapped company, our journey led us to develop an in-house AI code generation and testing framework, Zealous TenX, to help us meet the demands of building and iterating our software products in the most time- and cost-effective way. Using it ourselves, we quickly realized we were onto something significant with this framework.
Now, our focus is on supporting software developers and companies in developing products faster, reducing overhead costs, and maintaining quality code as they scale. We are still very much serving the emerging tech space, just from a different angle and addressing a more pressing problem in the market.
What initiatives has Zealous implemented to support the advancement of women in technology?
We are passionate about helping people connect better, especially in emerging markets in the Middle East. Women globally are roughly 25-30% less likely to network effectively and meet the right people.
I dedicate time to mentoring and supporting university entrepreneurship programs to encourage young women and aspiring founders to pursue their ideas. I also make an effort to demystify what it really means to build a startup. I wish someone had done this for me sooner. I share my learnings as a female Arab founder and my findings from the emerging tech space, with the hope that they can learn and be better off as a result.
How is Zealous leveraging AI to help women expand their networks? Additionally, what other functionalities and features does Zealous offer?
Both female and male entrepreneurs can benefit from Zealous’ professional networking products by connecting with others in the space. Creating intentional and meaningful connections today is challenging; at events with potentially thousands of attendees, it’s difficult to remember every face and every business card. We simplify this process, enabling event networkers to scan business cards or LinkedIn QR codes instantly and automatically save details such as where they met, the person’s role, their organization, and the intentions for the meeting.
Women generally need to know more about an individual before they feel confident reaching out or engaging in conversation. Our products take that into account. Although our products are not exclusively for women, the user experience and intention-based features are optimized to suit cultural and social norms.
Moreover, knowing that women founders don’t get as much capital investment (female-founded startup investments dropped by 64% in MENA in 2023), our code generation product helps them get a foot in the market with lower overhead costs.
What advice would you give to young Emirati women aspiring to careers in technology?
I would advise other women on their tech founder journey to focus on identifying a worthy problem to solve first, rather than starting with company setup.
The journey of any tech startup founder is challenging, from finding a problem worth solving to developing a viable solution for a large enough market that customers will pay to use. Given the time and resource intensity, I strongly recommend finding a problem that intrigues you and that you want to explore deeply.
Unfortunately, raising VC funding as a female founder is especially difficult, so be mindful of monthly spending and subscriptions. Also, make use of the support available, such as programs and incentives in the UAE that help reduce startup costs.
-
Tech News3 months ago
Denodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
Tech Interviews7 months ago
Navigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News7 months ago
Brighton College Abu Dhabi and Brighton College Al Ain Donate 954 IT Devices in Support of ‘Donate Your Own Device’ Campaign
-
Features5 months ago
Security in the Cloud Age: Combating Risks with Hybrid Cloud Solutions
-
Tech Features4 months ago
The Middle East to Lead with Next-generation Mission Critical Communication Advancement
-
Automotive8 months ago
Al-Futtaim Automotive Builds On 23-Year Legacy of Trust & Leadership in UAE’s Pre-Owned Car Market to Sell Over 25,000 Used Vehicles in 2023
-
Tech News10 months ago
Senet enters MENA’s Competitive Gaming Scene with ‘skill-to-earn’ Platform
-
Tech News9 months ago
Google Appoints Ziad Jammal as Google Cloud Country Manager in the United Arab Emirates