Cover Story
Genetec Highlights Top Data Privacy Practices for Physical Security Leaders
Genetec, a leading technology provider of unified security, public safety, operations, and business intelligence solutions, shared a comprehensive set of data protection best practices to help physical security leaders protect privacy, safeguard data, and enable trust without compromising security.
This initiative comes as a response to the escalating importance of data security in an increasingly interconnected digital landscape. By prioritizing privacy, organizations can effectively contribute to a safer digital and physical landscape for all.
“Organizations should never have to choose between data privacy and security. By equipping physical security professionals with these essential strategies, Genetec is spearheading a paradigm shift towards a more resilient and trustworthy security ecosystem. It is an ongoing process, and organizations should regularly update protocols, stay informed and continuously educate their teams on best practices”, said Firas Jadalla, Regional Director – Middle East, Turkey and Africa (META) Genetec.
Genetec recommends organizations ensure their security systems respect data privacy by:
1. Collecting and Storing Only What You Need:
A fundamental rule of data security is to collect and store only essential information. The potential impact of a security breach can be reduced by minimizing stored data. It’s important to regularly review and audit data and dispose of unnecessary information responsibly.
2. Limiting Access to Sensitive Data:
Enhancing data security involves restricting access to sensitive information. Genetec recommends implementing data-sharing best practices, such as removing personally identifiable information to safeguard individual privacy. Techniques for anonymizing personal information while retaining its utility include:
- Randomization (adding noise to numerical values such as an individual’s age or income),
- pseudonymization (such as replacing names with unique identifiers), tokenization (such as replacing credit card numbers with tokens that have no direct correlation to the original numbers),
- generalization (such as converting exact birthdates to age ranges),
- and data masking (showing only the first few digits of a phone number).
3. Ensuring Privacy without Compromising Evidence:
By making use of technologies such as KiwiVision™ Privacy Protector, organizations can automatically anonymize images of people, so they can continue to survey surveillance footage while respecting privacy. This technology also offers an additional layer of security that ensures only authorized users can “unlock” and view unmasked footage while maintaining an audit trail.
4. Being Transparent and Get User Consent:
Building trust through transparency and user consent is essential. It’s important to clearly communicate with users about the data collection process, promoting informed decisions. Organizations should also gain explicit consent before collecting and processing data.
5. Choosing a Reliable Data Storage Provider:
Organizations should select a data storage provider carefully, ensuring a clear understanding of data storage, handling, and sharing practices. If using third-party services, organizations should demand strong security measures and reliable data handling practices. Establish who “owns” any data stored in the cloud, and any rights/privileges associated with the use or disclosure of any information.
6. Establishing Strong Policies:
To ensure long-term data safety, Genetec recommends putting in place robust policies across the organization. Enforcing a transparent chain of custody through technology, such as a Digital Evidence Management System (DEMS), ensures accountability and traceability at every stage of the data lifecycle.
Cover Story
The World Order Has Changed! Has Your Technology Governance?

When did you last see geopolitical risk appear as a named line item in your technology governance framework?” This question — posed by Subrato Basu to technology leaders across industries and geographies, and echoed in the conversations Srijith KN has tracked across the CXO community — increasingly divides its audience into two groups. The gap between them is widening, and it reveals a deeper shift: geopolitics is no longer external to technology strategy. It is now one of its defining forces.
The first group — still the majority — treats geopolitical risk as someone else’s problem. It belongs, they assume, to risk officers, government affairs teams, or the audit committee. Technology is their domain; geopolitics is noise in the background. The second group has understood something that the first has not: the boundary between geopolitical risk and technology risk no longer meaningfully exists.

This article is written for both. For the first group, it is a wake-up call — offered in the hope that it arrives before an incident makes the argument more forcibly. For the second, it is an attempt to sharpen a framework and ground it in the operational realities that boards and CXOs are navigating right now. The central argument is this: geopolitical volatility has become a direct, structural input into enterprise technology strategy. Organizations that govern for it with the rigor applied to financial or regulatory risk will be measurably more resilient, more competitive, and more trusted than those that do not.
“Geopolitical volatility is no longer background noise for technology leaders. It is a direct input variable into technology strategy, and the boards that do not govern for it are operating with a critical blind spot.“
The Assumption That Built Our Governance Frameworks Is Broken
For most of the past two decades, a workable assumption underpinned how organisations sourced, deployed, and governed technology: that the global technology ecosystem was broadly open, commercially-driven, and largely apolitical. Hardware vendors competed on specification. Cloud providers competed on price and performance. Procurement teams evaluated suppliers on technical merit. Geopolitical considerations were, at most, a due diligence footnote.
That assumption has been systematically dismantled. The deliberate weaponisation of technology — through trade restrictions, regulatory controls extended beyond national borders, state-sponsored cyber operations, and the calculated use of supply chain access as an instrument of strategic leverage — has fundamentally altered the risk calculus for any enterprise that depends on globally sourced technology infrastructure. What was once a commercially neutral procurement decision is now, in many cases, a geopolitical exposure.
This is not a temporary disruption that will normalise once a particular set of tensions eases. It reflects a durable structural shift in how major powers compete, and in how that competition is increasingly waged through, and against, the technology layer of the global economy. For enterprises operating in markets defined by proximity to active geopolitical fault lines — whether those fault lines are geographic, commercial, or digital — the consequences are not theoretical. They are already reaching enterprise cloud contracts, hardware procurement pipelines, and security operations. From our respective vantage points — practitioner and editorial — the pattern is unambiguous.
“What was once a commercially neutral procurement decision is now, in many cases, a geopolitical exposure. Governance frameworks designed for a different era are systematically unfit for this one.“
Five Fault Lines Running Through the Enterprise Technology Stack
When we map the pathways through which geopolitical volatility translates into technology operational risk, five pressure points emerge with consistency across sectors and geographies. We offer them not as a comprehensive risk register — every organisation’s exposure profile will differ by market, sector, and architecture — but as a diagnostic lens for board and CXO discussion.
a) The Cloud Compliance Trap
The hyperscalers that power the majority of enterprise digital infrastructure operate under regulatory frameworks whose reach extends well beyond their home jurisdictions. Technology access controls and compliance obligations do not stop at national borders. Enterprises with commercial relationships, supply chain connections, or infrastructure footprints that intersect with restricted or conflict-adjacent jurisdictions can find themselves subject to service reviews, contract amendments, or capability restrictions — sometimes with limited notice, and often as a downstream consequence of their vendor’s own compliance posture rather than anything the enterprise has done directly.
The trap is that this exposure is rarely visible until it activates. It can emerge through indirect supply chain adjacency, shared infrastructure configurations, or compliance flags several steps removed from the enterprise’s own operations. CIOs who have mapped their cloud footprint against potential regulatory jurisdiction risk — proactively, not reactively — hold a material governance advantage. Understanding which workloads reside on infrastructure subject to extended regulatory reach is not optional hygiene. It is foundational governance.
b) The Cyber Threat Multiplier
A consistent and well-documented pattern has been established across multiple cycles of geopolitical escalation, recorded in threat intelligence reports published by recognised international cybersecurity research organisations and government security agencies: periods of elevated inter-state tension correlate with increased state-linked cyber activity targeting financial institutions, critical infrastructure, and government-adjacent enterprises in proximate markets. This is not the authors’ independent assertion. It is an observable, documented, and reproducible pattern in the publicly available record.
The structural implication for technology leaders is clear: the cyber threat environment in markets proximate to active geopolitical fault lines is durably more elevated than in geopolitically stable ones, and that elevation intensifies when political temperature rises. The attack surface has expanded materially through the convergence of information and operational technology, the proliferation of AI-integrated workflows, and the broad adoption of connected devices. CISOs who construct their security posture reactively, in response to incidents rather than in anticipation of structural threat conditions, have fundamentally misread the governance mandate their environment demands.
c) The Supply Chain Blind Spot
Most enterprises maintain reasonable visibility into their software supply chains. Very few have equivalent clarity on the geopolitical exposure embedded in their hardware supply chains. Semiconductors, networking equipment, and industrial technology components originate from supply chains subject to trade restrictions and regulatory controls that can translate, under escalatory conditions, into sudden procurement constraints, extended lead times, or mandatory certification requirements creating material operational bottlenecks.
The organizations most exposed are those in active digital transformation or major infrastructure refresh cycles that have never stress-tested their procurement pipeline against a scenario in which specific hardware categories become unexpectedly constrained. The board-level question is not whether this will happen. It is whether, if it did, the organization would have ninety days of operational runway or ninety hours.
d)The Vendor Dependency Risk
Multi-year enterprise software commitments — ERP platforms, data infrastructure, security tooling, AI platforms — are made on the assumption of uninterrupted service from vendors operating in predictable regulatory environments. The regulatory obligations carried by enterprise software vendors headquartered across major technology jurisdictions can, under specific and not implausible circumstances, translate into licence amendments, capability restrictions, or service reviews with limited contractual notice. This risk is amplified, and actively expanding, for software incorporating AI capabilities as those capabilities attract increasing regulatory attention across multiple jurisdictions simultaneously.
Boards approving these investments are, in our view, frequently not receiving the full picture of vendor jurisdiction exposure. Requiring legal and technology leadership to jointly assess this exposure before committing to multi-year agreements is not procedural excess. In the current environment, it is a core fiduciary responsibility.
e) The Talent Dimension
The talent dimension of geopolitical risk is consistently the least visible and the most underestimated. Technology-intensive organisations in dynamic markets draw on internationally mobile specialist talent pools. Sustained geopolitical instability affects those pools in ways that are difficult to predict and slow to reverse: senior professionals reconsider relocation decisions, acquisition pipelines for specialist roles — particularly cybersecurity engineering, AI architecture, and regulatory compliance — tighten, and workforce continuity in critical functions comes under pressure at precisely the moment when those functions matter most.
Resilience against this risk requires proactive investment in local talent pipelines, structured knowledge transfer protocols for critical technology functions, and a workforce continuity discipline that treats geopolitical scenarios as first-class planning variables — not as footnotes in the HR risk register.
“The technologies most exposed to geopolitical disruption are simultaneously the most powerful instruments available to build resilience against it.“
Cover Story
Inside Zoho’s UAE Data Centers!
Playing the Long Game in Cloud Infrastructure, Data Centers, Privacy, Cybersecurity, and Growth in the UAE
The Integrator had an interview with Shailesh Davey, Co-founder & CEO, Zoho, during the official launch of their newly opened data centers in the UAE.
Zoho is on an executing path; as they say, it is a disciplined, long-term regional strategy by deploying and right-sizing data centers in Saudi and the UAE, aligning with global trends in data sovereignty and privacy.
The UAE is a priority growth market fueled by regulatory and business-led digitization, supported by local teams and partners. Customers will see faster performance from local hosting, while flagship products Zoho CRM Plus and Zoho Books lead growth, with rapid regulatory feature alignments.
Zoho currently operates more than 18 data centers globally, with the UAE being the latest addition. From a regional perspective, does the Middle East require more data centers, or are the facilities in the UAE and Saudi Arabia sufficient to support Zoho’s growth plans?
We currently operate two data centers in Saudi Arabia, which primarily serve the Saudi market. In the UAE, we have now established two data centers—one in Dubai and another in Abu Dhabi. These facilities have been carefully right-sized based on our expected growth in the region.
We have been present in this market since 2009, so we have a clear understanding of customer adoption patterns, data usage behavior, and growth trajectories. Based on this data, we have ensured sufficient capacity for the next two to four and a half years. Every six months, our teams review capacity utilization and growth rates. If we see demand growing faster than anticipated, we simply expand further.
This approach isn’t new for us—we’ve been doing this consistently since 2006–2007.
Zoho is widely known for its capital discipline and strong stance on privacy. With increasing global rhetoric around cybersecurity, data sovereignty, and regulations—especially in markets like the UAE—do you believe governments are emphasizing certifications due to a trust deficit with large tech companies, or is this part of a broader global shift?
There are a few important factors at play here. First, some of the world’s largest technology companies have built their businesses by monetizing user data. This is openly acknowledged as part of their business model. While it may be legal, it understandably creates discomfort—especially for governments concerned about the data of their citizens, and for individuals who often accept terms and conditions without fully realizing what they are agreeing to.
Second, we are now living in a rapidly evolving geopolitical environment. The shift toward a multipolar world has accelerated significantly over the last couple of years. In this context, it is only practical for governments to introduce regulations that ensure clarity around where data resides, how it is handled, and whether companies are compliant with local laws.
From Zoho’s perspective, this has always aligned with our philosophy. Wherever we set up data centers, we comply fully with local regulations and data sovereignty requirements. Certifications and compliance are simply proof points of that commitment.
Zoho has seen strong growth in the UAE. Which flagship products are driving this momentum, and how does the establishment of local data centers translate into tangible benefits for businesses in terms of innovation and performance?
Let me start with the impact of the data centers. The most immediate and visible benefit is speed. Earlier, customer data was being served from the US, which meant latency due to the physical distance. With local data centers in the UAE, response times are significantly faster. This directly improves user experience, in addition to meeting security and compliance requirements.
In terms of products, our fastest-growing solution in the UAE is Zoho CRM Plus. For any business, sales is a critical function, and CRM Plus is a comprehensive, customer-facing suite that supports sales, marketing, customer support, service, and even project management.
The second major growth driver is Zoho Books, which is widely used by finance and accounting teams. With increasing regulatory requirements around accounting, compliance, and e-invoicing in the UAE, Zoho Books helps businesses stay compliant while maintaining accurate and transparent financial records.
Given the pace at which regulations are evolving, especially in areas like e-invoicing, our local presence allows us to respond very quickly. We see significant long-term potential for both CRM Plus and Zoho Books in this market.
One of Zoho’s recent consumer-focused initiatives Aaratai application has gained strong traction in India and has generated a lot of discussion. Do you see similar B2C-led innovations helping Zoho reach a wider audience in the UAE as well? Could we see such solutions being developed or localized for this market?
This has been an interesting experiment for us. What we’ve essentially done is take the technology we built for the B2B world, adapt it, and make it accessible to B2C users. That’s how this particular app was born, and it received strong tailwinds in the Indian market.
Interestingly, due to the large Indian diaspora in the UAE, adoption naturally extended here as well. Our immediate focus is to ensure that the product is reliable, feature-rich, and delivers long-term value to users.
Once we are confident that the model works at scale, we will look at expanding into other markets where there is strong synergy. Markets with a significant Indian diaspora are a natural starting point, and Europe is high on that list.
Automotive
Goodyear continues support for Team De Rooy in the 2025 Dakar Rally
Goodyear continues its partnership with Team De Rooy for the upcoming Dakar Rally 2025. As the official tire supplier, Goodyear will equip the Dutch team with its high-performance Goodyear OFFROAD tires and advanced Tire Pressure Monitoring System (TPMS), helping to ensure reliable performance throughout the rally’s demanding stages. This collaboration highlights Goodyear’s dedication to truck motorsport, combining innovation with proven durability on some of the world’s toughest terrains.
Dakar 2025: new challenges await
The 2025 Dakar Rally, running from January 3 to January 17, will cover nearly 8,000 kilometers, including over 5,000 kilometers of competitive stages, starting in Bisha and finishing in Shubaytah. This edition ramps up the difficulty, featuring an early 48-hour chrono stage that flows into the marathon stage, setting a challenging pace from the outset. In the second week, competitors will tackle the demanding dunes of the Empty Quarter, with over 45% of the course on separate tracks for different vehicle classes, enhancing safety while complicating navigation.
Goodyear OFFROAD tires and TPMS: performance in challenging conditions
Team De Rooy relies on Goodyear OFFROAD tires for their durability and reliable traction across different conditions. Designed to handle heat and challenging surfaces, these tires help reduce heat buildup at high speeds and provide consistent performance on sand, rocks, and steep slopes.
Goodyear’s TPMS offers real-time monitoring of tire pressure and temperature, helping the team make quick adjustments and avoid potential issues. This advanced system helps to minimize downtime and supports better strategic decisions—crucial for maintaining momentum during the rally.
A Legacy of motorsport excellence
Goodyear’s continued support of Team De Rooy highlights its long-standing commitment to truck motorsport. As the title sponsor of the Goodyear FIA European Truck Racing Championship (ETRC), Goodyear uses motorsport as a proving ground for tire technology advancements. The partnership with Team De Rooy reflects this commitment, driving innovation and performance in demanding environments.
Maciej Szymański, Marketing Director Commercial EMEA at Goodyear, commented:
“Our continued collaboration with Team De Rooy for Dakar 2025 underscores our commitment to supporting motorsport teams in extreme conditions. With Goodyear OFFROAD tires and TPMS, we aim to provide the reliability needed to tackle the rally’s challenges. We wish Team De Rooy all the best and look forward to another exciting competition at this iconic rally”.

-
News10 years ago
SENDQUICK (TALARIAX) INTRODUCES SQOOPE – THE BREAKTHROUGH IN MOBILE MESSAGING
-
Tech News2 years agoDenodo Bolsters Executive Team by Hiring Christophe Culine as its Chief Revenue Officer
-
VAR11 months agoMicrosoft Launches New Surface Copilot+ PCs for Business
-
Tech Interviews2 years agoNavigating the Cybersecurity Landscape in Hybrid Work Environments
-
Tech News8 months agoNothing Launches flagship Nothing Phone (3) and Headphone (1) in theme with the Iconic Museum of the Future in Dubai
-
Automotive1 year agoAGMC Launches the RIDDARA RD6 High Performance Fully Electric 4×4 Pickup
-
VAR2 years agoSamsung Galaxy Z Fold6 vs Google Pixel 9 Pro Fold: Clash Of The Folding Phenoms
-
Tech News2 years agoBrighton College Abu Dhabi and Brighton College Al Ain Donate 954 IT Devices in Support of ‘Donate Your Own Device’ Campaign


