Connect with us

Tech News

IT physical security: 8 readiness moves from Genetec

Published

on

Genetec_ Security-Operator-Review-Video-Wall

IT owns more than networks now. Buildings, cameras, access readers, and intercoms connect to the same fabric as apps and cloud. That’s why IT physical security needs a single plan. Genetec’s guidance lands at the right moment for a region racing toward smart cities, energy hubs, and mega events. Here are eight moves that raise readiness—without adding silos.

1) Tie security to business and IT strategy

Start with intent. Map risks, processes, and outcomes. Then select a unified platform that brings video, access control, ALPR, comms, forensics, and analytics under one console. Centralized operations improve collaboration across security, compliance, and IT. Better yet, the data stream—facility usage, incident patterns, dwell times—feeds safety improvements and smart resourcing.

2) Demand technical compatibility (and avoid lock-in)

Architect for choice. Favor open systems that talk to Active Directory, identity platforms, and your cloud. Open APIs let you add third-party tools and industry-specific apps. As needs change, you can extend the stack instead of ripping it out.

3) Put cybersecurity and compliance at the core

Treat physical security like any business-critical workload. Encrypt data in transit and at rest. Enforce granular roles, MFA, and least privilege. Keep full audit trails. Then align with recognized frameworks and certifications such as NIST CSF, ISO/IEC 27001, and SOC 2. Ask vendors to share their vulnerability management and disclosure practices. Transparency builds trust.

4) Specify reliability and performance up front

Downtime breaks safety. Therefore, write high-availability, SLA targets, and disaster-recovery requirements into the contract. Test failover. Size the system for growth in cameras, doors, and analytics. If you plan to add sites next year, design for that today.

5) Model total cost—and prove ROI

Go beyond license price. Include implementation, maintenance, storage, and training. Then quantify value: faster investigations, fewer truck rolls, less shrink, and leaner staffing through automation. A choice-driven path—cloud where it fits, on-prem where it pays—usually wins on both cost and control.

6) Check vendor depth and support

You will live with this partner. Review references across industries, roadmap cadence, and security track record. Next, probe support: 24/7 assistance, customer portal, documented playbooks, and named contacts for critical incidents. Continuous software updates should ship on a predictable rhythm.

7) Plan rollout and adoption like a product

Technology only works when people use it. Build an implementation plan with phases, pilots, and success metrics. Train operators and IT admins with hands-on sessions. Share quick-reference guides. Capture feedback, tune policies, and celebrate early wins. Adoption drives outcomes.

8) Test, measure, and iterate

Run a risk assessment before full deployment. Pilot in a live but low-risk area. Validate performance, compatibility, and usability. Measure mean time to detect, mean time to respond, and investigation speed. Then adjust. Repeat after each site or feature wave.

What convergence looks like in practice

In a unified design, a single identity follows the user from badge to browser. Threat intel informs both firewall policy and door rules. Camera analytics trigger IT tickets and SOC alerts. Meanwhile, operators rely on one console that blends physical events and cyber signals. As a result, investigations compress from hours to minutes—and audits become easier.

How to get started this quarter

First, pick two sites for a pilot and define three business outcomes. Second, align cyber and physical runbooks so alerts flow to the same queue. Third, harden the basics: MFA, encryption, patching, and role hygiene. Finally, brief leaders on ROI and risk reduction, not just feature lists.

Bottom line

The perimeter now includes people, places, and packets. By unifying platforms, setting clear standards, and planning adoption, IT leaders turn IT physical security into a force multiplier. The payoff shows up fast: fewer blind spots, quicker response, and stronger compliance—across every site you protect.

Check out our previous post, RDI paradigm shifts: how governments can adapt

Tech News

TRENDS IN AI COMPLIANCE INFLUENCING HOW GCC COMPANIES OPERATE

Published

on

Across the GCC, national growth strategies, with Saudi Arabia’s Vision 2030, the UAE’s National AI Strategy 2031, and Qatar’s national roadmap, place AI at the centre of economic diversification. McKinsey estimates AI adoption at roughly 84% across GCC organisations, with a potential $320 billion economic impact for the Middle East by 2030. As deployment accelerates, regulatory compliance is a defining factor separating ambition from sustainable scale. Shaffra, an AI research and applications company building autonomous AI teams for enterprises and governments, sees six clear shifts reshaping how companies operate.

1. Regulation is accelerating adoption in high-stakes sectors

Government entities, financial services, telecom, aviation, and large semi-government organisations are moving fastest. These sectors operate at scale, face strict efficiency mandates, and function under constant regulatory oversight. Healthcare and energy are advancing more cautiously due to safety and data sensitivity. In many cases, the more regulated the industry, the faster AI deployment progresses. However, rapid scaling also exposes governance weaknesses, particularly where documentation, ownership, and oversight mechanisms are underdeveloped.

2. Compliance is prerequisite for scale

Over the past year, 88% of Middle East CEOs have reported generative AI uptake. Today, organisations increasingly require audit trails, explainability, clear data lineage and residency controls, defined performance thresholds, and enforceable human oversight mechanisms. With one in four Middle East consumers citing privacy as a primary concern, compliance is being treated as a post-deployment validation exercise; it is a structural requirement for scaling AI responsibly.

3. Sovereign AI and data residency are shaping architecture

AI governance in the GCC is being influenced less by standalone AI laws and more by data protection and cybersecurity frameworks. The UAE’s federal data protection law, Saudi Arabia’s PDPL under SDAIA, and Oman’s PDPL reinforce lawful processing and cross-border controls. In highly regulated sectors such as banking, healthcare, energy, and telecommunications, data residency and local control over models are strategic imperatives. Sovereign AI is evolving from a policy ambition into an operational requirement affecting infrastructure, vendor selection, and system design.

4. Human accountability is being reasserted

When organisations deploy AI without defining who owns the decision, when human escalation is required, and what the system is permitted or restricted from doing, they create either over-reliance or under-utilisation. Without clearly defined ownership and documented review controls, accountability weakens and regulatory exposure increases.

For instance, DIFC reinforces responsible AI use in personal data processing. High-impact decisions involving legal standing, fraud, employment, healthcare guidance, or public sector determinations that affect citizens need to involve human oversight, while AI handles speed, consistency, and automation of repetitive tasks. High-impact decisions should involve accountable human oversight.

5. Governance maturity slows deployment activity

Many organisations are AI-active but still developing governance maturity. Common governance gaps are structural rather than technical. Multiple pilots often run in parallel, tool adoption is fragmented, and accountability is split across IT, legal, risk, and business functions. Growing enterprises often lack a central AI governance owner, a comprehensive use-case inventory, consistent vendor and model risk assessment, and formal escalation protocols. Policies may exist at the board level, yet it is not consistently embedded into day-to-day operations. Addressing this gap requires governance to be built into workflows from the outset.

6. Continuous auditing is discipline

Studies indicate that a majority of ML models degrade over time, through model drift, hidden bias, or misuse vulnerabilities. Initial audits frequently reveal undocumented use cases, weak access segmentation, insufficient logging, and unclear review protocols. Effective governance requires compliance with international and local data residency rules, structured risk tiering, data lineage validation, access controls, bias testing, performance benchmarking, and defined incident response procedures. High-impact systems warrant quarterly reviews supported by continuous monitoring, while lower-risk applications still require periodic reassessment. Governance is increasingly measured through evidence rather than policy statements. Boards are asking for dashboards, logs, and audit artefacts — not policy PDFs.

Governance is being considered as part of AI infrastructure. Compliance frameworks are evolving into operational architecture embedded within systems, workflows, and accountability models. The organisations that will lead in the GCC are those that design governance at the same time they design capability, ensuring AI scales with discipline rather than risk.

Continue Reading

Tech News

PNY ANNOUNCES STRATEGIC PARTNERSHIP WITH F5 TO ACCELERATE THE ADOPTION OF SECURE, HIGH-PERFORMANCE INFRASTRUCTURE IN EMEA

Published

on

PNY Technologies, a leading distributor of technology solutions and long-standing NVIDIA partner, today announced a partnership with F5, the global leader in delivering and securing

This agreement aims to strengthen access for enterprises across the EMEA region to advanced solutions designed to optimise, secure, and accelerate applications and IT infrastructures.

As AI adoption continues to accelerate, performance, data flow management, and application security are becoming critical priorities. Through this partnership, the F5 Application Delivery and Security Platform (ADSP) will complement PNY’s AI Factory ecosystem by providing advanced capabilities for traffic management, application security, and performance optimisation across on-premises, cloud, and hybrid environments.

PNY will leverage its technical expertise, partner network, and logistics capabilities to facilitate the deployment of F5 ADSP solutions for enterprises, system integrators, and service providers throughout the region.

“Collaboration between PNY, a specialist distributor of NVIDIA AI Factory solutions across the EMEA region, and F5 represents a major step forward for AI-dedicated infrastructure,” said Laurent Chapoulaud, VP Marketing at PNY. “Together, we optimise GPU environments through accelerated data flows and enhanced application security. This synergy between infrastructure and intelligent traffic management enables the deployment of AI architectures that are high-performance, resilient, and scalable.”

“This partnership brings together complementary strengths that directly benefit our partners and customers,” said Nasser El Abdouli, Regional VP EMEA Channel Sales, F5. “PNY’s longstanding partnership with NVIDIA, combined with F5’s growing AI-focused application delivery and security offerings, allows us to help partners capably respond to the rapidly increasing demand for secure and scalable AI infrastructure across EMEA.”

Through this collaboration, PNY and F5 aim to support enterprises in their strategic initiatives related to hybrid multicloud, cybersecurity, and application performance optimisation, while simplifying access to next-generation technologies.

Continue Reading

Tech News

MIDDLE EAST CONFLICT DRIVING A SURGE IN SCAMS, DEEPFAKES, AND GOVERNMENT IMPERSONATION

Published

on

Cybercriminals don’t wait for the dust to settle. As conflict escalates across the Middle East, a parallel threat has emerged targeting ordinary people through their inboxes and social media feeds.

On 4 March, the UAE Ministry of Interior warned the public about fraudulent emails impersonating government emergency services, falsely claiming that residents must complete a mandatory registration form to receive state support or insurance coverage. The emails bore hallmarks of official government communications, making them convincingly deceptive. They are designed to exploit fear, urgency, and the instinct to comply with perceived authority. These messages are already circulating.

Alongside financial scams, verified fact-checkers have identified AI-generated and mislabelled footage circulating online as supposed evidence of attacks in the UAE. This includes video from Bahrain that was picked up by international media outlets and incorrectly broadcast as a Dubai drone strike. Fabricated videos of the Burj Khalifa collapsing, AI-generated missile strike imagery, and decade-old footage repackaged as current events have also circulated widely. In another example, a supposed “before and after” satellite image of Dubai showing smoke rising over the city was mislabelled — the image was actually from Sharjah, the neighbouring emirate. In many cases, the content spread faster than the corrections. Dubai Police have warned that sharing unverified information can carry criminal penalties under UAE law, including fines of no less than AED 200,000. Despite these warnings, the flow of misleading content has not slowed.

KnowBe4 warns patterns observed during previous conflicts and crises, including the war in Ukraine and the COVID-19 pandemic, the public should also expect charity and donation scams exploiting humanitarian concern, phishing emails disguised as embassy or government alerts, and deepfake imagery engineered to provoke fear or spread disinformation.

Dr. Martin Kraemer, CISO Advisor at KnowBe4 said, “Crises are the most reliable recruitment tool bad actors have. When people are frightened and searching for information, they are not necessarily looking for the truth. They are looking for confirmation of what they already fear. That is exactly what scammers and disinformation actors exploit. What we are seeing right now, fake government emergency emails, mislabelled footage, AI-generated imagery, is not random. It is targeted, and it is designed to exploit the gap between what people feel and what they know. The antidote is not panic. It is discipline: pause, question the source, and go directly to official channels before acting on anything. That’s precisely how governments and organizations are educating people to react in stressful situations.”

What the Public Can Do Right Now

KnowBe4 urges residents, travellers, and anyone following events in the region to apply the following principles:

  • Treat urgency as a warning sign. Any message that pressures you to act quickly, register now, donate immediately, confirm your details before midnight, is likely designed to stop you thinking clearly.
  • Verify before you share. Before forwarding footage or information, check whether it has been verified by a reputable news outlet or official source. Reverse image searches take seconds and can prevent significant harm.
  • Go directly to official sources. If you receive communications claiming to be from a government ministry, embassy, or emergency service, navigate directly to their official website rather than clicking any link in the message.
  • Question what you see. AI-generated imagery has reached a level of quality where video alone is no longer reliable evidence. Look for verification from multiple credible sources before drawing conclusions.
  • Report suspicious communications. In the UAE, suspected scam emails or messages should be reported to the relevant authorities. Do not engage with the sender.
Continue Reading

Trending

Copyright © 2023 | The Integrator