SUPPLEMENT OF ENTERPRISE CHANNELS MEA

BUSINESS SEPTEMBER 2018

TRANSFORMATIONbiznesstransform.com THE CHANGE TO FUTURISTIC BUSINESS

CYBORGS CAN WE REBUILD THE HUMAN BEING Developments in bioengineering have opened the doors to overcome human limitations.

TRANSFORMING THE WORKPLACE

Andy Brocklehurst, Osama AlHaj-Issa, Mahmoud AlYahya, NEIL HARBISSON Cisco HPE Aruba Xerox and designer of artificial senses

Henrique Vale, Nokia David Warburton, F5 Networks Srinivasan CR, Tata Communications Morey Haber, BeyondTrust HOW TELECOS NEED WHY THE BITCOIN WHY BANKS NEED TO START IF YOUR APPLICATION IS TO MANAGE BIG DATA BLOCKCHAIN IS TOO LARGE CONSIDERING OUTSOURCED HACKED SO CAN YOUR REPOSITORIES TO BE HACKED SOCs BLOCKCHAIN Cloud Fundamentals. Delivered.

http://www.cloudquarks.com/ www.redingtonvalue.com CONTENTS SEPTEMBER 2018 6 40

OPINION Why banks need to start considering outsourced SOCs Srinivasan CR, Tata Communications

10

LIFESTYLE FEATURE OPINION HOW TECHNOLOGY IS REDEFINING Using mobile technologies to break the last-mile barrier THE MEANING OF HUMAN BEING Kushal Nahata, FarEye Neil Harbisson, Cyborg and designer of artificial senses.

12 14 16 Cloud Fundamentals.

INDUSTRY COMMENT INDUSTRY COMMENT INDUSTRY COMMENT Why service providers need to Why the Bitcoin blockchain is If your application is hacked Delivered. focus on agile processes too large to be hacked so can your blockchain Santiago Madruga, Red Hat David Warburton, F5 Networks Morey Haber, BeyondTrust

34 COVER FEATURE 44 MARKET OUTLOOK 54 INDUSTRY COMMENTS How workplace roles and Is transformation boosting the How organisations can use processes are transforming valuation of private equity gateways to bridge OT and IT Oliver Horn, Red Hat

biznesstransform.com 3 http://www.cloudquarks.com/ www.redingtonvalue.com

BUSINESS TRANSFORMATION EDITOR’S PREFACE THE CHANGE TO FUTURISTIC BUSINESS

Dear Readers,

MANAGING DIRECTOR Tushar Sahoo SUPPLEMENT OF ENTERPRISE CHANNELS MEA The challenge the industry faces today is [email protected] BUSINESS SEPTEMBER 2018 to make robots more human-like or into

TRANSFORMATIONbiznesstransform.com THE CHANGE TO FUTURISTIC BUSINESS EDITOR humanoids. When this happens and which Arun Shankar technology innovation cycles will make [email protected] CAN WE REBUILD THE HUMAN BEING the global society reach an inflexion point, Developments in bioengineering have opened the doors to overcome CEO human limitations. TRANSFORMING THE remains to be seen. The reverse challenge that Ronak Samantaray WORKPLACE is also happening is to rebuild human beings Andy Brocklehurst, Osama AlHaj-Issa, Mahmoud AlYahya, NEIL HARBISSON [email protected] Cisco HPE Aruba Xerox Cyborg and designer of artificial senses using bio-engineering and implants. GROUP SALES HEAD

Henrique Vale, Nokia David Warburton, F5 Networks Srinivasan CR, Tata Communications Morey Haber, BeyondTrust Richa S HOW TELECOS NEED WHY THE BITCOIN WHY BANKS NEED TO START IF YOUR APPLICATION IS TO MANAGE BIG DATA BLOCKCHAIN IS TOO LARGE CONSIDERING OUTSOURCED HACKED SO CAN YOUR REPOSITORIES TO BE HACKED SOCs BLOCKCHAIN [email protected] No more do such measures need to be seen as mere surgical procedures. There is now a growing interest in overcoming limitations of the human being and EVENTS EXECUTIVE the human form by technology devices and engineering forms to Shriya Nair increase the capabilities and enhance functioning to near normal levels. [email protected] Sophistication in product design is not far behind. SALES EXECUTIVE Krishna Thanki [email protected] In a CNN contributed article we look at three such human examples including Neil Harbisson, Amal Graafstra, and Viktoria Modesta. Says ONLINE SALES Mohamed Mubin Neil Harbisson, “I define what I do as neuro-hacking rather than [email protected] biohacking or body hacking because my ultimate aim is to change the BUSINESS DEVELOPMENT EXECUTIVE mind. This project is artistic in intent. Because art has no rules, laws or Susan Paul boundaries, I feel like there is a lot of freedom when you contextualise [email protected] a project in art.”

Large scale connectivity and mobility is a key driver for change in the SALES AND ADVERTISING workplace. Aruba’s global survey of 7,000 businesses indicates that Ronak Samantaray Ph: + 971 555 120 490 digital technologies enabling work from home and work outside office are becoming a de-facto standard of expectation from the current and PRODUCTION, CIRCULATION, SUBSCRIPTIONS [email protected] next generation of workers. The more digitally enabled is the workplace, the higher is the sense of wellbeing experienced by its workers, so indicates the survey.

According to the report, “Today’s workforce is not just driving consumerisation of IT, but also accelerating consumerisation of the UAE 223 DMC 9 Dubai Media City, Dubai workplace. These changing employee behaviors and expectations are PO Box 500653, Ph: +971 4 368 8523 shaping the way organisations think about the role of technology in USA the workplace.” 31 Foxtail Lan, Monmouth Junction NJ 08852, Ph: + 1 732 794 5918 Continuing further, in the Opinion section, our guest contributors include Henrique Vale at Nokia, Kushal Nahata at FarEye, and Srinivasan CR at Tata Communications. And in our Industry Comments section, Printed by the guest contributors include Morey Haber at BeyondTrust, David Al Ghurair Printing & Publishing LLC. Masafi Compound, Satwa, PO Box: 5613, Warburton at F5 Networks, and Santiago Madruga at Red Hat. Dubai, UAE Flip these pages to read their exciting insights on business Published by transformation as it unfolds here, now and today. Accent Infomedia MEA FZ-LLC 223 DMC 9 Dubai Media City, Dubai PO Box 500653, Ph: +971 4 368 8523

Arun Shankar A publication licensed by [email protected] International Media Production Zone, Dubai, UAE @Copyright 2018 Accent Infomedia. All rights reserved.

While the publishers have made every effort to ensure the accuracy of all information in this magazine, they will not be held responsible for any errors therein.

5 OPINION

WHY BANKS NEED TO START CONSIDERING OUTSOURCED SOCs Possible losses from cyberattacks are rising and security operation centres are an added layer of protection, explains Srinivasan CR at Tata Communications.

n early 2017, UK-based banks the industry as the way we bank operating under Lloyds, Halifax continues to evolve and leaders Iand Bank of Scotland were hit by must be armed with an agile a significant Distributed Denial of cybersecurity plan to move into Service attack over the course of the next generation of finance with 48 hours. More recently, a host of the confidence of their customers South Korean Banks were threatened behind them. by a damaging DDoS attack if they Traditionally, the banking did not pay the $315,000 bitcoin industry has been one of the ransom demand. Thankfully, banks main investors in security, and it SRINIVASAN CR are acutely aware of the criticality is likely this will continue to be Chief Digital Transformation of the data they handle, and in both the case as we navigate the new Officer, Tata Communications. cases the attacks were successfully threats landscape that the future of defended against. banking presents. Although DDoS attacks remain As open banking accelerates prevalent across a number of and the industry’s data becomes industries, the effectiveness of the more and more interconnected, the method relies on the organisation industry cannot afford to take risks paying up the ransom, which many with the data they hold on their organisations are refusing. Another customers. One leak could be the more worrying form of attack for first symptom that infects the whole banks is one that quietly siphons off industry with a sickness that could data across a period of time. These have wider-reaching effects. are often introduced in the form In order to combat this evolving of malware driven attacks, such as threat, the industry needs an banking Trojans. adaptive, 24x7 method of detection, An example of these kinds of defence and counter-attack. threats is an evolving malware Many organisations are looking to KEY TAKEAWAYS project called TrickBot which, while outsource their security services currently plaguing Latin America, in order to ensure they have • One of the main learnings of the 2008 has targeted banks in over 40 comprehensive, around the clock crisis was that the industry needed to countries across the globe. coverage. Investment in security be more responsible in its approach Attacks that lead to a systematic operation centres for example is on to risk. leakage of data over time do not the rise. • Although DDoS attacks remain have the immediate shock effect of One of the main learnings of the prevalent across industries, a swift attack, but they can be just 2008 crisis was that the industry their effectiveness relies on the as damaging, and serve to weaken needed to be more responsible in organisation paying up the ransom. the banks’ defences over time. An its approach to risk. By keeping • Many organisations are looking to additional layer of complexity to abreast of the latest security outsource their security services in this issue is that there will soon be threats, and investing in security order to ensure they have around the more and more channels in which applications that are able to adapt clock coverage. hackers can access the systems. to the future of banking, the • Investment in security operation Securing all the various channels industry will be able to avoid a centres is on the rise. will only get more difficult for similar crippling financial event.

6 biznesstransform.com

OPINION

HOW TELECOS NEED TO MANAGE THEIR BIG DATA REPOSITORIES Telecom service providers are the biggest aggregators of consumer data that is only growing and needs to be managed, explains Henrique Vale at Nokia.

ig Data and data analytics VERACITY technologies transform the The quality of data. Binformation into insights. They provide immense value for VALUE big organisations such as telecom Relevance of data. companies and large enterprises. Big Data captures, analyses and Telcom service providers have access helps in monetisation of huge to unprecedented amounts of data volume of information and including consumer profiles, device interaction data across multiple data, network data, usage patterns, HENRIQUE VALE touch points in real time. location data, apps downloaded. Head of Nokia One of the clear beneficiaries Telecom operators today are among Software MEA, Nokia. of Big Data and analytics are the the world’s biggest aggregators of telecom service providers. In the consumer data, and the volume of past, the data was comprised of data will only continue to grow in mainly call data records, then with the times to come. the proliferation of Internet, we In their Big Data journey, the saw a surge in event data records. following are some of the key Now we have a deluge of social points that telecom operators must media feeds and with the advent of keep in mind. Internet of Things, data volumes are How to validate and ensure that expected to grow exponentially. accurate data is being aggregated. Data assumes importance due to A data refinery solution, is its nature and requires advanced helping service providers validate processing capabilities as traditional the incoming data and helping application software cannot process eliminate errors, duplication. Data this. The differentiation or key refinery can take data inputs from characteristics of Big Data include varied sources including mobile following five V’s: networks, IMS, fixed networks, IP, KEY TAKEAWAYS broadband, cable, cloud. VOLUME It offers always-on, context aware • Telcom service providers have access The name Big Data itself is related data intelligence and is cloud ready to unprecedented amounts of data. to the size, which is enormous. with web-scale automation. More • Telecom operators are among the than 100 telecom service providers world’s biggest aggregators of VARIETY are using this solution and nearly consumer data. The heterogenous sources and huge 20% of world mobile data is passing • In addition to being meaningful, it is diversity of data type under the through this system. important that insights are available major category of structured and Many people say big data is better real-time. unstructured data. data, or data is the new oil, and so • The icing on the cake is real-time on and so forth. Big Data is the new actions on agile insights. VELOCITY soil. If nurtured properly with right • Machine learning based advanced The speed of generation of data and tool sets and solutions, Big Data can analytics helps in real-time access to it. yield benefits across industries. decisioning.

8 biznesstransform.com

OPINION

USING MOBILE TECHNOLOGIES TO BREAK THE LAST-MILE BARRIER Suitable mobile technologies like geo-location, track-and-trace, smart delivery, are required to bring down the cost and time of the last mile delivery.

oday’s customers are future-oriented solution helps in digitally connected, engaged generating automated reports on Tand influenced. In a quest cash reconciliation, updating the to provide superior customer task lists and the progress of the experience, the companies are jobs allotted after the run-sheet is incurring huge operational cost. generated. The cost of last-mile constitutes To reduce the delivery cycles 28%-32% of the total logistics costs and to cut down on the operational and these are usually borne by the expenses, companies have to give customer when he places the order customers the feasibility to tag KUSHAL NAHATA or at the time of delivery. themselves. Based on the geo- Co-founder and CEO, FarEye.. The growing popularity of coordinates, the routing can be done ecommerce has given rise to by optimising all the nodal points accommodate a new business model where the delivery personnel should which is tech-driven logistics. attend during the day. Logistics players today are adopting Integration with multiple unconventional solutions, smarter payment modules will give the analytics and advanced processes flexibility to the customer to pay to serve the digitally-empowered and finish the purchase. By using customer. With an eye on the multiple payment options like growing base of ever-demanding Cash-on-Delivery and Card-on- customers, enterprises today are Delivery, companies can reduce the adapting to tailor-made solutions to cancellation at the time of delivery. suit their expectations. According to a recent report To reduce the delivery time and released by PayPal, Cash-on- in order to enhance the customer Delivery in the Middle East is experience, enterprises must focus around 60%, while card payments KEY TAKEAWAYS on adopting the right mobility and online payments occupy solution that aids in running their 25% and 15% respectively. These • To reduce delivery cycles and to field operations seamlessly. For numbers have gone up from 15% cut down on operational expenses, example, last-mile deliveries in and 5% in 2012. companies have to give customers the region are time-consuming Customers expect convenience the feasibility to tag themselves. with the delivery cycle easily and speed which entices logistics • Logistics companies must adopt lasting for 6 to 7 days or more. firms to venture into the track-and-trace, last-mile delivery, The longer delivery window possibilities of the virtual world. integrated technology and smarter poses a challenge for the delivery Innovative last-leg solutions, help delivery management systems. personnel to carry the details of in improving connectivity to ensure, • The cost of last-mile constitutes each and every parcel delivery. speedy and affordable delivery. In 28%-32% of the total logistics costs With the help of mobility solution, order to ensure customer loyalty, and these are usually borne by the that functions in 2G networks or logistics companies must adopt customer. even offline mode, the delivery track-and-trace systems, efficient • Last-mile deliveries in the region personnel can save the information last-mile delivery methods, are time-consuming with delivery and update their managers in integrated technology and smarter cycle lasting 6 to 7 days or more. real-time. Adopting a flexible and delivery management systems.

10 biznesstransform.com Sophos @ GITEX 2018 Visit Sophos booth SR-D4 in Rashid Hall.

Intercept X for Server Unmatched Server Protection

Protect the critical applications and data at the core of your organization, with these essential protections: • Deep Learning Neural Network: Protects against never-before-seen malware • Anti-Exploit: Prevents an attacker from leveraging common hacking techniques • Server Lockdown: Provides application whitelisting with a single click

Get Free Trial www.sophos.com/server

Endpoint Security Software Best Encryption Best UTM Innovative Vendor Top Vendor Endpoint Vendor of the Year Vendor of the Year Vendor of the Year in Endpoint Security Security of the Year

For more information please contact: salesmea@sophos. com OPINION

WHY SERVICE PROVIDERS NEED TO FOCUS ON AGILE PROCESSES Communications service providers need to build flexible processes allowing for change while adopting cloud platforms explains Santiago Madruga at Red Hat.

ommunications service Once communications service providers across the world providers have these initial Care looking to claim their network function virtualisation position at the heart of the digital use cases up and running, they society, but they first need to need to turn their attention to become more agile and lean. how to scale these out, adapting There are many innovations and improving their operational that can help in this quest: processes and, in many cases, network function virtualisation, the way they think about their software defined networking, the operation altogether in order to SANTIAGO MADRUGA convergence of networks and IT, become more agile and lean. VP of Communications Service cloudification, DevOps, and more. Open source is a key change Providers Market, Red Hat EMEA. In most cases the required agent in this process. It brings technologies are now available the desired innovation, yet and ready for mission-critical is fundamentally different, environments. However, the in the way it is engineered, surrounding operational processes to other technologies - and and mindset are often in need of communication service providers a review. need to understand how can Communications service they avoid the risks and reap the providers are already benefits. modernising. Examples include Cloudification brings speed, the likes of Altice Group, which efficiently. Digital-native is building a holistic network businesses that are born in function virtualisation platform the cloud are more agile and with ambitious timelines for innovative, including many over- getting the majority of mobile the-top companies that now traffic running on it. Or Three UK, compete with communications which has developed a world- service providers for the value- first cloud-native core network, add services that drive margins designed to be massively scalable and customer loyalty. These so it can respond to subscribers’ companies can more freely service demands. experiment with new services without huge amounts of upfront investment or commitment, and they are not afraid to fail fast. And when a service does take off it can AGILITY AND EFFICIENCY DO NOT COME scale quickly and reliably. Most communications service FROM TECHNOLOGY INNOVATION ALONE, providers were not born directly BUT ALSO REQUIRE CHANGES IN PROCESS, in the cloud, but are fast adopting MINDSET AND CULTURE. it. They are making the move away from dedicated hardware, away from monolithic systems

12 biznesstransform.com roll-out, having the right skill sets on board is only half of the MUCH FASTER CHANGE IS POSSIBLE challenge; having those people WITHOUT JEOPARDISING OPERATIONS BUT work in the most efficient way is the other. REQUIRES A REVIEW OF ORGANISATIONS, Communications service PROCESSES AND MINDSET. providers have grown used to working in a certain way. Typically, they work on projects from beginning to end, ensuring that any new service with proprietary software running or application is absolutely on a specific piece of equipment. watertight before it is deployed. However, this is a change And rightly so. In the old that may take some time inflexible world this is completely for communications service necessary. The ability to revise providers, which typically have things on the fly is not an option. significant legacy systems that Cloudified environments may still not be fully paid off. But are different. They break the as their old systems come to the relationship between software end of their maintenance lifecycle, and hardware, and even between or as new initiatives are launched, different layers of software every new system is designed for architecture, enabling flexibility more modern architectures. and hybridity. Much faster change These are typically based is possible without jeopardising on open source, helping to reliability and operations, but avoid proprietary lock-in, and this also requires a review of perhaps more dangerous: the organisations, processes and customisation of open source mindset. code that deviates from standard Knowing this and doing this KEY TAKEAWAYS upstream communities. are two very different matters Agility and efficiency do not though. It is unrealistic to expect • Cloudified environments are come from technology innovation sweeping reform among the different and break the relationship alone, but also require changes communications service providers between software and hardware. in process, mindset and culture. community. It is more likely to • As old systems come to the end of Red Hat’s recent Open Source happen on a project by project maintenance lifecycle every new Culture Survey revealed that 91% basis, step by step. Building system is designed for modern of respondents across industries open cloud platforms to enable architectures. thought that technological virtualisation is a first step, and • Most communications service developments were changing the communications service providers providers were not born directly in way their organisation had to are well on the way with this. the cloud but are fast adopting it. operate in order to succeed. 81% The benefits of embracing • Communications service providers respondents agreed that having the next-generation wave are making the move away from an open organisational culture is of technologies is well monolithic systems running on a important to their company. documented, and just about every specific piece of equipment. However, only 67% of communications service provider • It is unrealistic to expect sweeping respondents said that their on the planet is looking at how it reform among the communications organisation has the resources can accelerate the transition. service providers community. necessary to build an open • Building open cloud platforms to culture, with 59% of them enable virtualisation is a first step. identifying legacy systems and • Most communications service outdated technology as a barrier providers were not born directly in to change. When it comes to the cloud, but are fast adopting it. human resourcing a technology

biznesstransform.com 13 OPINION

WHY THE BITCOIN BLOCKCHAIN IS TOO LARGE TO BE HACKED For the blockchain to be hacked, it means 51% of the miners would need to be compromised all at one point of time, writes David Warburton, at F5 Networks.

lockchain technologies their solution, along with the block present opportunities for itself, to the distributed ledger. Bdisruptive innovation. At this point, all transactions in However, they also present this block are locked in and since controversy, especially with each solution to the newest block regards to the security of is dependent on every block that cryptocurrencies like Bitcoin. has come before it, it creates a Released as open-source software long chain of trust in which every in 2009, Bitcoins are created as transaction can be proved to be a reward for a process known as valid. This prevents a user from DAVID WARBURTON mining and can be exchanged for spending the same Bitcoin twice; Senior Threat Research Evangelist EMEA, F5 Networks. other currencies, products, and it solves the double spend problem. services. Much has been discussed All blockchain miners are about its robustness, so, could effectively in a race with each the notion that a 51% attack on other. The first one to find the a blockchain could move from solution to the current block is the theoretical to possible? winner and gets awarded the prize Traditional money is created of some amount of Bitcoin. Since through central banks, but the mathematical problem for each Bitcoins are mined by Bitcoin block is cryptographically based, miners: network participants that each miner has, in theory, as good perform extra tasks. Specifically, a chance as any other miner to find their computers perform complex the solution. The only way to have mathematical operations in order a better chance of being the winner to find the solution for a block of is to control more miners. transactions. Once this problem In theory, the larger the has been solved, the miner submits distributed network of blockchain miners, the harder it is to create a majority share. For example, the rate at which an individual might discover the correct block hash is extremely low – around 12.5 FOR ORGANISED CRIMINALS WANTING Bitcoins per block. To increase TO CONTROL A BLOCKCHAIN THEY their earning potential, miners grow collective processing power WOULD NEED TO CONTROL OVER 50% in mining pools by partnering with OF ALL MINERS FOR A PARTICULAR others. BLOCKCHAIN. For organised criminals wanting to control a blockchain, possibly to submit their own fraudulent

14 biznesstransform.com OPINION

A COORDINATED ATTACK ON THE BITCOIN NETWORK WOULD REQUIRE OVER 1.2M MINERS TO ENSURE THEIR FRAUDULENT BLOCKS WERE ACCEPTED BY THE REST OF THE MINERS.

blocks which might allow them to However, this raises the bar double-spend, they would need to further in terms of what is control over 50% of all miners for required to run a significant a particular blockchain. Bitcoin mining pool because There are an estimated 2.4 it shifts the balance of power. million Bitcoin miners today and Depending on the currency you this increase in miners on the want to mine or attack, the initial network means 51% attacks on outlay would be higher, and the Bitcoin are practically impossible. attacker would need significantly Recalling this attack requires a fewer ASICs compared to GPUs. majority share in miners and a Today, attacks against coordinated attack on the Bitcoin cryptocurrencies are generally network would require over 1.2m against the users of the system miners to ensure their fraudulent and not the cryptography itself. blocks were accepted by the rest of Therefore, 51% attacks still seem the miners. unlikely. It is easier to steal any However, even if this were cryptocurrency by getting access possible, in order to ensure your to a user’s wallet private key or fraudulent block was permanently by attacking a cryptocurrency accepted by the blockchain, a exchange. KEY TAKEAWAYS series of consecutive bad blocks is Nevertheless, it is undeniable required before they are accepted that they are possible and we are • Attacks against cryptocurrencies by the rest of the Bitcoin network. starting to see more of them occur. are against the users of the system The likelihood is that before any For example, Shift and Krypton, and not the cryptography itself. attacker can create this scenario, both based on Ethereum, were • It is easier to steal cryptocurrency other miners on the network subject to a 51% attack in 2016 by getting access to a private key would have noticed this attack and and in May of 2018, Bitcoin Gold, or by attacking a cryptocurrency invalidated the fraudulent blocks. distinct from the more popular exchange. These attacks are still Bitcoin, was also subject to the • Shift and Krypton, both based on uncommon as it remains same attack. Ethereum, were subject to a 51% unfeasible, even for the big attack in 2016. players, to finance and operate the • Traditional money is created huge number of miners required through central banks, but Bitcoins to attack Bitcoin. It used to be are mined by Bitcoin miners. possible to mine for Bitcoin on • All blockchain miners are relatively inexpensive computer effectively in a race with each other. graphics cards. However, due to • Each miner has, in theory, as good the sheer number of miners on the a chance as any other miner to find network and the current pay-out the solution. of 12.5 bitcoin per block, specialist • There are an estimated 2.4 million chips known as ASICs are now the Bitcoin miners today. only affordable way to mine.

biznesstransform.com 15 INDUSTRY COMMENT

IF YOUR APPLICATION IS HACKED SO CAN YOUR BLOCKCHAIN The application that uses a blockchain technology needs to be secured as much as the blockchain itself explains Morey Haber at BeyondTrust using a checklist.

am simply amazed at all the buzz validated to be accepted as a ledger around Bitcoin, blockchain, and entry and propagated to other nodes. Icryptocurrency. However, the truth This is where security is so critical. is that blockchain has a limited place Entries into the blockchain ledger in business and needs to be secured need to be validated for fraudulent just like any other application, with activity, and more importantly, some twists. the hosts containing blockchain Blockchains are not a database implementations need to be secured replacement, nor will future against vulnerabilities and privileged applications that utilize them. They attacks that could compromise or are a multi-node distributed ledger tamper with blockchain insertions. MOREY HABER system that secures entries based on There is no concept of blockchain Chief Technology Officer, BeyondTrust. volume and verification. Natively, ledger modifications — this is key to blockchain can only process a protect the integrity of the data. Once limited number of transactions per an entry is accepted, it is permanent. second and cannot store complex Therefore, if you can attack the records or blobs—only ledger-style server, application, and ledger information that has a finite start processes, you can tamper with the date, like shipping information. blockchain. This is how some of the As such, historical records, recent cryptocurrency attacks have pictures, complex indexes, and other been occurring. large datasets are just not good for To cite a recent example, on blockchain technology. This is one of Monday, May 28th 2018, The the problems security teams need to Hacker News reported on a wicked understand. vulnerability within the EOS Think of a blockchain Blockchain Platform. While the implementation like an old school vulnerability is considered critical, peer to peer network technology and the method of exploitation fairly from Napster or BearShare. Each basic - a maliciously crafted file, the node contains a database of all ramifications are truly astounding. records and any new entries need After the vulnerable parser to propagate to all other nodes reads the file, it forces an exploit for validity. on the node which could then be While a peer-to-peer network leveraged against the supernode on queries its peers for entries, the EOS platform. The supernode is blockchain actually contains a responsible for collecting transaction duplicate of all entries compared to information and packing it into its peers. This means tampering with blocks. Once the threat actor owns one node does not invalidate the the supernode, they can modify or entire blockchain. As a consequence, create malicious blocks that would every entry has to be properly control the entire EOS network.

16 biznesstransform.com

INDUSTRY COMMENT

This includes everything the maintenance and security patches EOS Blockchain Platform has been to all systems in the environment— implemented to perform—from from firmware to web applications cryptocurrency, supply chain and everything in between. management, to identity storage. Let this sink in — the uncrackable 7. IDENTITY AND ACCESS MANAGEMENT blockchain as it is advertised, can be owned by the fundamental The predicable workflow technology designed to protect it - management of identities, roles, WASM files, smart contract and a and entitlements for all users that simple file upload. have access to resources of the So how do we secure blockchain system. implementations? We first start with cyber security basic hygiene: 8. PRIVILEGED ACCESS MANAGEMENT

1. ASSET INVENTORY The management of all privileged access into the blockchain Identifying and managing the environment—from operating lifecycle of all software, code, system to web applications applications, nodes, and operating including password management, system used in the blockchain. least privilege access, session management, keystroke logging, 2. CHANGE CONTROL and application to application key and password management. Ensuring changes to the operating New entries into the blockchain system, application, and resources should be secured with dynamic are documented and go through a privileges and only valid for formal change control process. one-time usage. This can be done with privileged password access 3. CONFIGURATION MANAGEMENT solutions and keys or passwords using an API. An insecure insertion The hardening and removal of path into the blockchain can lead to default settings that are a liability for devastating results. KEY TAKEAWAYS the operating system, application, or Reads from the blockchain network. should be secured in a similar • Blockchain has a limited place in fashion to ensure the retrieval is business and needs to be secured 4. VULNERABILITY MANAGEMENT not tampered with, like a man just like any other application. in the middle attack, before • Think of blockchains as just Ensuring that the operating system, processing by the application. another application for data application, web application, Since modifications and deletions storage, with limited capabilities and source code are reviewed of blockchain records are not and not very fast. for vulnerabilities and risks are permitted, all entries must be 100% • Blockchains are designed to prioritized accordingly. valid or the entire ledger model could be highly distributed and 100% be compromised. reliable. 5. LOG MANAGEMENT Think of blockchains as just • If your application or host can another application for data be tampered with, so can your Centrally managing and parsing storage. It has limited data storage blockchain. log files from all resources in capabilities, is not very fast, but is • The goal is to secure the the environment including designed to be highly distributed application and blockchain during transaction logs. and 100% reliable. If your their design and implementation so application or host can be tampered this can never occur. 6. PATCH MANAGEMENT with, so can your blockchain. The • Modifications and deletions goal — securing both during their of blockchain records are not Using a systematic and predictable design and implementation so this permitted. methodology for deploying can never occur.

18 biznesstransform.com Discover the Edge. Smart Solutions. Real Business.

Rittal solutions for the technology of the future. Edge computing enables enormous amounts of data to be processed directly at the place where they arise. Securely and in real time. Rittal prepares you and your IT infrastructure for new challenges - flexibly, economically, and globally.

Sheikh Rashid Hall Visit us at Stand SR-E2

For Enquiries: Rittal Middle East FZE Tel: +971-4-3416855 I Email: [email protected] I www.rittal.com/uae-en

GITEX 2018_EMEA_Trim:200mmx290mm, Bleed:210mmx300mm NEWS

ConsenSys to conduct three-day blockchain developer training, hackathon in Lebanon

a development Middle East Venture Partners and environment, Flat6Labs will be Silver Sponsors build and ArabNet and TechFugees decentralised as community partners are applications supporting this initiative with the with Ethereum aim to empower talent in Lebanon. smart contracts The website lebanonbootcamp. and integrate consensys.net is now live with the dApps applications closing on September with web 30. The 3-day training will be applications. held at Beirut Digital District on With October 17 followed by a 2-day onsenSys announced it will blockchain for social impact high hackathon. Prizes will be awarded be conducting a three-day on the ConsenSys agenda, 25 to the top 3 winners. Cblockchain developer training percent of the spaces available ConsenSys is a venture followed by a two-day hackathon will be provided for free to production studio and custom in Lebanon on 17 October 2018. refugees who are already adept at software development consultancy From the workings of blockchain programing. building decentralised applications, technology to its applications and Strategy& and Beirut Digital enterprise solutions, and developer features, participants will receive District have been brought on tools for blockchain ecosystems, in-depth training on how to create board as Platinum Sponsors. focused primarily on Ethereum.

Honeywell Process recognised for engagement, costing, risk sharing by Maire Tecnimont

oneywell Process Solutions the event in Milan, Italy representing around its Honeywell Connected has been named Best about €900 billion of revenue and Plant solutions, which is a suite HInstrumentation and almost four million workers. of applications that delivers Electrical Material Partner by Honeywell has had a long and higher levels of safety, reliability, global technology licensor and successful relationship with Maire efficiency and profitability. It engineering, procurement and Tecnimont, which encompasses is also a vendor Honeywell’s construction contractor Maire 50 operating companies and more Industrial Internet of Things Tecnimont Group. Honeywell than 8,500 professionals. Maire solution. was recognised for results across Tecnimont manages large turnkey (Left to right) Elio Petruncelli, six areas of its work with Maire EPC projects in more than 40 Purchasing Group Leader, Tecnimont, which included countries. Tecnimont; Ezio Pasqualon, Process early engagement, competitive Honeywell has collaborated Control and Automation Head Of total costing, risk sharing and with the group to deliver Department, Tecnimont; Paolo impeccable execution. numerous projects, providing Solzi, Global EPC Business Director, The award was presented to and implementing automation Honeywell Process Solutions; Paolo Honeywell at a ceremony during the controls, safety and cybersecurity Mondo, Group Procurement Vice SEENERGY event, dedicated to the solutions. It also has recently President, Maire Tecnimont Group; group’s supply chain. More than 70 started to develop innovative Pierroberto Folgiero, CEO, Maire CEOs of partner companies attended business models with the group Tecnimont Group.

20 biznesstransform.com NEWS

appliances require massive Pure Storage launches new throughput for mainstream, file- based workloads and cloud-native, data hub to boost AI solutions object-based applications. and eliminate storage silos TRUE SCALE-OUT DESIGN The power of data lake is its native, scale-out architecture, which allows batch jobs to scale limitlessly as software -- not the user -- manages resiliency and performance.

MULTI-DIMENSIONAL PERFORMANCE Data is unpredictable and can arrive at any speed – therefore, organisations need a platform that can process any data type with any access pattern.

MASSIVELY PARALLEL Within the computing industry, there has been a drastic shift from serial to parallel technologies, built to mimic the human brain, and MATT BURR, GM of FlashBlade, Pure Storage storage must keep pace. “Organisational data silos are ure Storage, introduced a most important features of these a universal pain point across data hub, the company’s four silos and unifies them into a every industry. Businesses need Pvision to modernise storage single platform. to realise value from data even architecture for unstructured, A data hub must have four key when it is out of sight and out of data-intensive workloads. Built on characteristics: mind, which is impossible without Pure Storage FlashBlade, Pure’s insight into the full picture,” said data hub is designed to be data HIGH-THROUGHPUT FOR BOTH FILE AND Matt Burr, GM of FlashBlade, Pure centric and enable organisations OBJECT STORAGE Storage. “With a data hub, we have to effectively utilise today’s most Backup and data warehouse created a central storage system critical currency – data. that satisfies current and future To innovate and survive in application requirements with a a business environment that modern platform designed to work is increasingly data-driven, KEY TAKEAWAYS on customers’ behalf.” organisations must design “For decades, the storage infrastructure with data in mind • Pure’s data hub is designed industry has been a laggard. Not and have complete, real-time to be data centric and enable only has storage failed to keep up access to that data. Today’s organisations to utilise data. with advances in networking and mainstream solutions were • Mainstream solutions were compute, it has become a roadblock designed for the world of disk designed for the world of disk to innovation,” said Ritu Jyoti, and have historically helped and have historically created Program Vice President, Systems create silos of data. A data hub silos of data. Infrastructure Research Portfolio is designed to deliver, share and • A data hub is designed to at IDC. “In the era of AI and real- unify data to ultimately unlock deliver, share and unify data to time analytics, roadblocks have unprecedented value. unlock value. the potential to disrupt Fortune Today, organisations rely on • Organisations rely on four 500 companies within a short span four inherently siloed analytics siloed analytics solutions: data of time. It is time for a paradigm solutions: data warehouse, data warehouse, data lake, streaming shift for storage -- a new dynamic lake, streaming analytics and AI analytics and AI clusters. architecture, purpose-built for clusters. A data hub integrates the modern challenges.”

biznesstransform.com 21 NEWS

Mobility MEA to boost corporate mobility as approved Android zero-touch partner

obility MEA, a systems integrator, enterprise Mmanaged mobility service provider and a GEMA alliance partner, is now the first approved Android zero-touch enrollment partner for the MEA region. The company will serve to accelerate automated deployments, reducing dependency on internal IT support, simplifying setup and management of Android mobile devices; and making time-consuming device configuration a thing of the past through processes that create better user experiences. ZOFF KHAN, Co-founder and CEO of Mobility MEA. Zero-touch enrollment, which supports OEMs, carriers and mobile workforce, ensuring staff Enterprise Mobility Solutions companies, eliminates the need is productive while also securing locally at all stages of MMS Consult, for users to configure their the devices and data. With the Deploy, Manage, and Assist. GEMA Android devices while ensuring proliferation of smartphones around International is a world-wide corporate policies are in place. the world, millions of devices are mobility enabling partner that With this enrollment, companies being deployed by companies which helps hundreds of mobile device can configure the devices they are required to be managed in an companies to develop and operate purchase and have them shipped efficient and smooth manner. mobile business solutions with with management and settings pre- Mobility MEA represents Global simplicity and flexibility. configured, ready for immediate use Enterprise Mobility Alliance across Mobility MEA offers global by the employees. Support for end- the licensed territories to execute mobility services through in- users is also easy, as they can just country experts with local language sign in and get access to their work and local insight to ideally support apps and data. the global mobile workforce, Since a majority of smartphones KEY TAKEAWAYS while guaranteeing centralised are based on the Android governance, auditing and reporting. platform, zero-touch enrollment • Accelerates automated Mobility MEA provides fully makes Android rollouts more deployments, reducing scalable, worldwide mobility seamless and secure, allowing dependency on internal IT solutions to global enterprises IT to deploy corporate-owned support, simplifying setup. everywhere, keeping the mobile devices in bulk without having to • Make time-consuming device workforce reliably connected, manually setup each device. It is a configuration a thing of the past serviced and up-to-date with 24x7 streamlined process for Androids • Supports OEMs, carriers, help desk support, tailored device set up especially for enterprise companies, eliminates the deployments and break fix support. management offering efficient need for users to configure Mobility MEA offers enterprises, deployment, and making large scale their Android devices ensuring governments, and carriers fully roll outs fast, easy and secure for corporate policies are in place. agnostic support through EMM organisations and employees. • Set up for enterprise partnerships which include As workforce mobility is fast management offering BlackBerry, MobileIron, Airwatch, becoming an integral part of deployment, large scale roll SOTI and Nationsky as well as business, it is highly important outs, easy and secure. additional mobility solutions such for an organisation to manage its as secure voice and omnichannel.

22 biznesstransform.com Visit us at Gitex 2018 Dubai World Trade Centre Hall 6, C6-01 NEWS

of the Saudi Arabia’s Vision 2030 Dell EMC introduces analytics, and the National Transformation Programme in addition to the focus cloud at Saudi Arabia’s Princess of the national curriculum and training on innovation in advanced Nourah University technologies and entrepreneurship. A recent study by Dell Technologies titled Realising 2030: A Divided Vision of the Future highlighted the lack of workforce readiness as the leading barrier in the Middle East to becoming a successful digital business in 2030, further emphasising the need for skill development among existing employees and future generations. The explosion of data further fuels the requirement for individuals to build expertise in niche and specialised fields as digital environments continue to evolve. Catering to the vision of driving workforce readiness through n alignment with the Saudi Vision Sciences is embedding a variety academic solutions, Dell EMC 2030 to promote a knowledge- of certifications and technical actively engages with academic I based economy, Princess Nourah trainings into its curriculum for thought leaders and business bint Abdulrahman University, the three bachelor degrees, Computer partners to foster research largest university for women in Science, Information Systems and partnerships and unique programs the world, partners with national Information Technology. including foundational IT courses. and international organisations to As a member of Dell EMC’s These courses cover information provide distinguished degrees and External Research and Academic storage and management, cloud certificates for Saudi female students Alliance Programme, the college has infrastructure and services, data and graduates. PNU partnered with successfully trained and certified science and big data analytics, and Dublin City University to launch the 57 female data science and big data data protection and management. first Masters in Computing degree analytics students this semester The programme also provides free with specialisation in Data Analytics with an additional 103 students e-learning technology courses to in Saudi Arabia. certified in Cloud Infrastructure. institutions. With the vision of providing a The leading university also Mohammed Amin, Senior Vice comprehensive learning programme successfully introduced VMware President and Regional Manager, for women and recognising Install, Configure and Manage Middle East, Turkey and Africa, the requirement for new skills course as an elective training course Dell EMC, said “The unrelenting with the influx of technological for senior students. pace of digital transformation in developments, the College of Advancements in education of the marketplace is creating new Computer and Information the future workforce are at the core challenges for all of us where organisations as well as individuals are increasingly realising that KEY TAKEAWAYS investing in workforce readiness and the development of new skills is key • Advancements in education are at the core of the Saudi Arabia’s Vision to future success and competitive 2030 and the National Transformation Programme. differentiation. Dell EMC recognises • A study by Dell Technologies highlighted lack of workforce readiness successful digital transformation as the leading barrier in the Middle East to becoming a successful requires more than technology and digital business in 2030. therefore we are helping leading • The explosion of data fuels the requirement for individuals to build universities develop the critical talent expertise in niche and specialised fields. required for the future and ultimately fuel digital progress.”

24 biznesstransform.com NEWS

President and Prime Minister of Drones complete 10,000 km the UAE and Ruler of Dubai called on all Dubai Government entities across Middle East and Africa to embrace disruptive innovation as a fundamental mantra of their for Dubai based Falcon Eye operations and to seek ways to incorporate its methodologies in all aspects of their work when launching Dubai 10X initiative. The proliferation of drone technologies in the region is also dependent on the various legislations and regulations that support them. Airspace regulators are conscious of the growth of drone technology and are looking for a balance between public safety and economic efficiency. The progress of drone legislation and regulation in the region is underway. The drone traffic control center will soon serve as a centralised authority to manage drone traffic and ensure regulations are followed. Following dynamic drone market expansion insurance alcon Eye, Dubai based drone- According to the statement companies will be able to soon powered solutions company, released by the Dubai Future unlock new market potential. F is celebrating 10,000 flights Foundation several months ago, “Drones are becoming an across the Middle East and Africa His Highness Sheikh Mohammed instrumental technology for many based projects. The company bin Rashid Al Maktoum, Vice industries such as oil and gas, revealed its ambitious plans to utilities, telecom, construction, double its operations in the next transportation, city infrastructure few years with the market promise developments, agriculture, of reaching the value of $1.5bn by KEY TAKEAWAYS archeology, safety and security 2022 only in the GCC according to as well as photography and the latest report. • The proliferation of drone videography. Drone technology After covering the area of nearly technologies in the region is quickly growing beyond its 34,000 kilometers since company’s is dependent on various original military applications and operational inception in 2014, legislations and regulations is making a very big impact on the Falcon Eye Drones are convinced that support them. commercial sector”, says Rabih that organisations that will adopt • Airspace regulators are Bou Rashid, Managing Director of drone applications within their conscious of the growth Falcon Eye Drones. operations will play a central role of drone technology and Rabih added: “In order to in the development of the regional are looking for a balance harvest the full potential smart drone industry. between public safety and city developments represent, it is While the Middle East rapidly economic efficiency. important for all the industries grows and innovates, drones will • Following dynamic that make an impact on this play an instrumental role in the drone market expansion transformation, to become cost- development of multiple projects insurance companies will effective, agile and disruptive. Civil that are expected to be delivered be able to soon unlock new drones will help this region to excel in record times. Drones will not market potential. by introducing drone applications only support timely infrastructure • The progress of drone to collect valuable data, make developments but will allow citizens legislation and regulation in measured decisions, capitalise to experience their unlimited the region is underway. on data automation and imaging potential and benefits. capabilities.”

biznesstransform.com 25 ANALYSIS

Bank Muscat and SAS recognised for Best Data Analytics initiative in the Middle East

and Africa at SAS, said, “Today, customer experience is taking center stage and price is no longer the only determining competitive advantage of an organisation. Bank Muscat and SAS, both believe that the key to ensuring customer satisfaction is capitalising on data and analytics. Our strategic partnership is built on the approach of delivering data-driven customer intelligence that can optimise marketing efforts and result in authentic customer engagement.” Bank Muscat is a financial services provider in Oman with a ank Muscat, the flagship conversion, and enhanced real time presence in Corporate Banking, financial services provider access to customer data, enabling Retail Banking, Investment B in the Sultanate of Oman, personalised product offering for Banking, Islamic Banking, and SAS have been awarded for higher cross-sell. Treasury, Private Banking and Best Data Analytics Initiative, It also allowed the analytics Asset Management. The Bank Application or Programme in the system to act immediately on data has the largest network of 149 Middle East for 2018 at The Asian such as customer transactions, branches, 645 ATMs and CDMs, Banker Middle East and Africa eChannel activity, and branch to and more than 18,000 PoS Awards Programme. generate relevant cross-sell offers terminals. The international Bank Muscat engaged SAS to for the sales team. Transactional operations include Riyadh, Kuwait, implement customer relationship data was also used to generate Dubai, Singapore and Iran. management, channel integration trigger-based events and alerts for their growing business for other business teams to act demands. The bank integrated accordingly. KEY TAKEAWAYS multiple customer data touch Commenting on their win, points with the SAS Marketing Abdullah Tamman Al Mashani, • Bank Muscat engaged SAS Automation analytics engine to DGM – Institutional Sales and to implement CRM channel analyse the customer behavior Product Development, Bank integration for growing in cross-sell offers, digital offers Muscat, said, “We are proud to business demands. and promotions. This involves be recognised among the banking • The bank integrated multichannel integration, including fraternity for our innovation- customer touch points using mobile banking, internet banking, driven strategic initiatives. Our SAS Marketing Automation automated teller machine, cash commitment to customers is key to to analyse cross-sell offers deposit machine, SMS and emails. providing industry-leading services and promotions. Bank Muscat’s implementation and setting new benchmarks in • Includes mobile banking, of the system allowed for greater banking excellence, in line with Internet banking, ATM, cash customer scalability. The increase our vision and values. We chose deposit, SMS, emails. in customer reach through scalable SAS as our trusted partner on our • Increase in customer reach solution implementation is journey to offer innovative services through scalable solution helping the bank to increase the and products to our customers and implementation is helping cross-sell revenue. In addition, stakeholders.” the bank increase cross-sell the project improved operational Abed Hamandi, Regional Director revenue. efficiencies, increased lead Professional Services, Middle East

26 biznesstransform.com

ANALYSIS

expansion and offer unmatched Emirates Transport initiates services to our customers; we will be able to establish a huge competitive business transformation advantage.” “We selected Oracle to support leveraging Oracle Cloud suite our transformation into a service focused company and to help establish Emirates Transport as the preferred transportation and logistics partner for the UAE’s public and private sector. This is our first step towards implementing a more elaborate digital transformation roadmap which in due course will also explore the implementation of next gen technologies like Artificial Intelligence and Internet of Things to help us drive long term growth”, added Tawakul. “With more than a three-decade experience in the UAE, Emirates Transport is a true market leader mirates Transport, one of procurement processes and allowing and a key enabler for the country’s the largest transport and the management to make data driven economic progress. Emirates E logistics services companies investment and business decisions. Transport is now embarking on its in the Middle East, will implement The Emirates Transport next growth phase and its decision Oracle Cloud Applications to drive a management team will also be able to select Oracle to support its major digital transformation across to run simulations for new services digital transformation initiative all its core business operations. and programmes to ensure an will help the organisation achieve The initiative will help Emirates exceptional customer experience its strategic business objectives”, Transport introduce innovative and high employee engagement. said Arun Khehar, Senior Vice offerings that create new revenue “The UAE’s transportation sector President, Business Applications, streams, deliver exceptional is experiencing sustained growth ECEMEA, Oracle. customer service and drive on the back of promising economic Emirates Transport is a federal operational efficiency. activities across infrastructure government corporation, with With Oracle Cloud Applications, development, government financial and administration the Emirates Transport leadership investment and private sector independence. Despite its team will be able to take advantage expansion”, said Faryal Tawakul, prominence in the school transport of a complete and fully integrated Executive Rirector of Support sector, Emirates Transport has suite of applications to increase Services at Emirates Transport. witnessed huge investment growth business agility and reduce costs. “These changes have created and diversification in its services The new cloud applications will significant growth opportunities for during its 37-year history. provide Emirates Transport with Emirates Transport and by using the ET continues to witness a steady full financial control, simplifying latest cloud technologies to drive growth, making it the largest federal corporation in the United Arab Emirates, particularly in terms of KEY TAKEAWAYS the number of its human resources, which currently stands at more • Emirates Transport will implement Oracle Cloud Applications to drive than 24,000 employees. In addition, a major transformation across its core business operations. the Corporation boosts a large • The initiative will help create new revenue streams, customer service fleet, numbering more than 25,000 and operational efficiency. vehicles, and a vast infrastructure • With Oracle Cloud, Emirates Transport will take advantage of a suite with its headquarter in Umm Al to increase business agility and reduce costs. Ramool, Dubai, as well as 43 work sites throughout the UAE.

28 biznesstransform.com WE HELP YOU BUILD A DATA-CENTRIC STRATEGY

We’re in a new world: data is now a strategic asset, and enterprises will need data-centric strategies to succeed and thrive. So it’s time to re-think IT infrastructure from the bottom-up.

Visit Pure Storage at Gitex 2018: Booth A7-10 Hall 7

purestorage.com ANALYSIS

Smart police station to be developed at Majid Al Futtaim’s community Tilal Al Ghaf

ubai Police and Majid Al Futtaim, signed Da Memorandum of Understanding to collaborate in areas that empower, deliver and promote an efficient, seamless, safe and impactful city experience for residents. Under this agreement, a Smart Police Station will be developed at the company’s flagship new Dubai Community, Tilal Al Ghaf, as part of its innovative Smart Districts plan. The MOU was signed by Major General Muhammad Saeed Al Marri, Assistant Commandant for Community Happiness and Equipment at Dubai Police, and 24-hour access to police services in agreement demonstrates Majid Al Hawazen Esber, Chief Executive a neighbourhood setting, where the Futtaim’s commitment to Dubai’s Officer of Communities at Majid construction of a conventional police Smart Cities vision by providing Al Futtaim, Properties at a signing station would not be possible.” residents at Tilal Al Ghaf with the ceremony held in Dubai. “The smart police stations will highest standards of community Major General Muhammad Saeed offer innovative, high-quality living. The Smart Police Station is in Al Marri, Assistant Commandant services, including 27 criminal, traffic line with the community’s innovative for Community Happiness and and community services as well as 360-degree plan to promote Equipment in Dubai Police, said: 33 allied services that will operate happiness and public safety by using “Smart Police Stations are part of our without any human intervention,” smart technology. Offering services vision to support happiness in Dubai, Maj Gen Al Marri added. locally, close to people’s homes, also improving access to police services Hawazen Esber, CEO of reduces the need to travel, which for members of the public. It will Communities at Majid Al Futtaim, will support sustainability within the provide members of the public with Properties, commented: “This community.” Dubai Police opened the first Smart Police Station in 2017, in line with its Smart Plan to provide completely KEY TAKEAWAYS virtual access for the public to police services by 2030. • Dubai Police opened the first Smart Police Station in 2017 in line Tilal Al Ghaf is Majid Al Futtaim’s with its Smart Plan to provide completely virtual access for the new flagship mixed-use community public. in Dubai that will be home to • The Smart Police Station is in line with the community’s 360-degree more than 20,000 residents once plan to promote happiness and public safety by using smart complete. The community spans technology. over three million square metres • Offering services locally, close to people’s homes, also reduces at the intersection of Hessa Street the need to travel, which will support sustainability within the and Sheikh Zayed Bin Hamdan Al community. Nahyan Street. The phased project • Smart police stations will offer services including 27 criminal, will include more than 6,500 freehold traffic, and community services as well as 33 allied services that will homes, ranging from apartments, operate without human intervention. townhouses and bungalows, through to substantial luxury villas.

30 biznesstransform.com ANALYSIS

Oman Arab Bank invests in Trend Micro to secure digital transformation into cloud

rend Micro, a global vendor in cybersecurity solutions, Tannounced that Oman Arab Bank, has selected Trend Micro to secure its digital universe. In their next step towards endpoint segmentation on the network, Oman Arab Bank has selected Trend Micro for its DR security because they wanted to have that same comfort level, and ensure best security practices. Oman Arab Bank faces stealthy targeted attacks, custom designed to penetrate standard defences, and poised to monetise Fabio Picoli, Regional Director GCC, Trend Micro; Rashad Al-Musafir, Acting CEO, Oman Arab Bank; Mustafa Surour, Oman Arab Bank. intellectual property and customer information, or to encrypt essential data for ransom. Oman Arab Bank’s security by integrating DLP representative offices, and over 148 evolving IT infrastructure needed functionality directly into the ATMs across the Sultanate. an instinctive security solution Trend Micro solutions and “Investing in the best security for that was forward-looking, easily management consoles. With a our IT infrastructure is of supreme scalable, and capable of meeting lightweight plug-in, providing important to us, as we continue to the constant security demands. increased visibility and control of expand our business. We needed a Trend Micro Deep Security sensitive data, while preventing security solution that was flexible was enlisted for datacentre data loss via USB, email, SaaS enough to integrate into our server protection. The solution applications, web, mobile devices, existing landscape, and had the delivers security capabilities and cloud storage. ability to help us evolve, whilst for physical, virtual, and cloud The DLP plug-in required no protecting our digital platforms. servers in a single integrated extra hardware or software, and In Trend Micro we have found the platform. Its single dashboard it leverages built-in regional and ideal security partner,” commented allows continuous monitoring of industry-specific templates to Mustafa Surour, Oman Arab Bank. multiple controls across physical, simplify deployment. Integrated virtual, and cloud environments. DLP allows Oman Arab Bank And, centralised management deploy data security for a fraction with vulnerability shielding of the cost and time of traditional KEY TAKEAWAYS abilities saved Oman Arab Bank enterprise DLP solutions. • Trend Micro Deep Security considerable time and resources. Trend Micro Deep Discovery, was enlisted for datacentre For Oman Arab Bank, Tipping Advanced Threat Protection gives server protection. Point, has been instrumental in the power to detect, analyse, • The solution delivers security getting signatures on a daily basis. and respond to today’s stealthy capabilities for physical, This solution is dynamic enough to ransomware, its variants, virtual, and cloud servers in a catch those vulnerabilities and the including WannaCry, and targeted single integrated platform. solution itself works on an online attacks in real time. • Its dashboard allows module the GOI interface allows Established in 1984, Oman Arab continuous monitoring of for easy to use. Bank SAOC is one of the largest multiple controls across Trend Micro Integrated DLP banks in the Sultanate of Oman. physical, virtual, and cloud helped the bank minimises the Currently Oman Arab Bank operates environments. complexity and cost of data more than 65 branches and

biznesstransform.com 31 RESEARCH

Consumerisation of IT driving IoT adoption in Saudi Arabia, UAE, Linksys survey

inksys, announced that there is rapid Subscribing to TV services is still big in adoption of IoT in the Middle East the Middle East and the study highlights L with a growing number of people about 25.5% of Middle East respondents investing in smart devices for their home, using their smart TVs for subscription- according to latest study by Linksys on based TV services. Of this figure, 52.1% use consumer Wi-Fi usage trends. it to download TV series and movies, and The possibilities of IoT in the home 31.4% use it to live-stream sport events. are endless, from smart lighting and thermostats to smart fridges to machine VOICE ASSISTANTS learning devices. Linksys’ study shows there is growing use of voice assistants and TV The use of chatbots and virtual signals that are primarily Internet based. assistants, commonly called voice assistants, is rapidly increasing. The use SMART TVS of voice assistants such as Amazon Echo, Amazon Alexa, and Google Home is on According to the Linksys study, 85.4% of the rise, with 35.7% ownership amongst respondents from the Middle East own at respondents. least one smart TV, out of which 27.9% Other smart devices that have reached respondents own multiple smart TVs. UAE the 40% adoption barrier include ranks above Saudi Arabia in the adoption connected security cameras and smart of smart TVs, with 86.6% and 84.2% lighting, with 39.3% and 39.6% of Middle respondents respectively. East respondents owning such devices Watching TV through the Internet is very respectively. While the use of smart popular in the Middle East, with Internet- doorbells is very popular – they are based entertainment being the primary owned by almost half of the Middle East source of TV for 22.3% of respondents. This respondents 46.5% –thermostats by Nest is widely seen in the UAE, among 26.8% of and Netatmo lag behind, with only 24.6% respondents, and 17.8% seen in Saudi Arabia. of respondents owning such devices.

32 biznesstransform.com RESEARCH

NUMBERS BY COUNTRY: UAE • Most likely 24% of all to be classified as smart home adopters • Most likely of all to own a smart or connected TV 87%, and smart plugs 43% • Most likely of all to consider purchasing a smart or connected TV 88%, and smart plugs 64%

SAUDI ARABIA • Most likely 38% of all to be classified as extreme smart home adopters • Most likely of all to own smart doorbells 48%, smart lighting 42%, smart switches 41%, connected security cameras 40%, voice assistants 38%, and smart thermostats 27% • Most likely of all to consider purchasing smart lighting 68%, connected security cameras 67%, smart doorbells 63%, Amanulla Khan, Managing Director Linksys Middle East, Turkey and Africa. smart switches 63%, voice assistants 62%, and smart thermostats 47% Phyn, a smart water management system Living in the digital age, the Internet is that protects your home from leaks by increasing a part of our daily lives and learning from your usage, and Whirlpool’s a new normal for all. Linksys’ study smart kitchen range, which automatically forecasts that 58.5% of respondents who preheats the oven and cooks dishes based do not own any smart home devices are on recipes. keen to adopt IoT in their homes, with These innovations will accelerate the UAE at 55% and Saudi Arabia at 62%. number of IoT devices in the home and Adoption of smart lighting was higher, also the need for up-to-speed Wi-Fi. at 58%, and 52% of respondents are Whoever wants a smart home needs to be considering investing in this by 2020. The smart and futureproof his or her home Middle East will see a steady adoption of network too.” voice assistants such as Amazon Echo and Vanson Bourne conducted this research Google Home, with 28.5% of respondents on behalf of Linksys part of Belkin considering such a purchase by 2019. International. The results are based on a “The number of people using smart web-based survey of 8,000 consumers. devices in the home is increasing rapidly, Respondents were interviewed in May and which means there is also a growing need June 2018; they came from the UK 2,000, to upgrade to bigger, faster home Wi-Fi the Netherlands 2,000, Germany 2,000, systems,” says Amanulla Khan, Managing France 1,000, the United Arab Emirates Director Linksys Middle East, Turkey and 500 and Kingdom Saudi Arabia 500. Africa. “People may not realise that even In order to qualify for the survey, if they only stream Netflix on a smart TV, respondents needed to meet the following it affects the overall Wi-Fi experience screening criteria: for others in the household by using • They had to be between 18 and 64 years bandwith.” old Khan explains: “While we are now • They had to have some form of decision- talking smart lighting and voice assistants, making responsibility in their household in the next couple of years we will move for purchasing new technology to even smarter connected devices in the • They had to use either a Wi-Fi router or home driven by Artificial Intelligence a Wi-Fi router or modem combo device and machine learning. Solutions include at home COVER FEATURE TRANSFORMING THE WORKPLACE NO LONGER A CHOICE Digitally transforming the workplace is no longer a choice for organisations and increasingly will be a key factor for future employee productivity and retention, indicates a global Aruba HPE survey.

oday’s business world is More digitally-driven workplaces will not always act in accordance increasingly being driven not only foster productivity, but with their level of knowledge by digitally savvy, digitally employee wellbeing, motivation and about cyber threats, and that more demanding employees at all job satisfaction. The organisations advanced behavioral security tools Tlevels, called Digital Revolutionaries. that capitalise on implementing a may be required. The expectation is that employers digitally-enabled workplace will gain The goal for every organisation will not just provide computing a competitive edge. The advantages must be to maximise productivity and communications tools and a of deploying new workplace without compromising security dumb physical workspace, but a technology go beyond helping in any way. This requires inter- digitally-powered workplace that employees finish tasks quicker, group cooperation throughout IT, is increasingly smart, interactive, but also make the process more and greater focus on end-user personalised and automated. collaborative and enjoyable. experiences as well as system Workplace technology is no longer There is a need for companies to capabilities. simply a plug-in enablement tool empower their IT leaders with the A total of 7,000 employees were to help people do their work; it budget and authority to invest in interviewed in April and May is a defining set of adaptive and new technologies, develop cyber 2018. The respondents were from interactive experiences that help awareness and best practices, organisations of all sizes, across both shape the identity of a company’s and provide employees with the public and private sectors, but with a culture. workplace and tools that they focus on the industrial, government, Companies need to embrace increasingly demand. retail, healthcare, education, this new reality, not just because The companies that thrive as finance, and IT, technology, it is what their current and future digital workplaces will be those telecommunications sectors. employees want, but because that start to see technology less Interviews were conducted both there are advantages in doing so. as a series of tools and more as online and via telephone using As employers battle to recruit and fundamental ambient infrastructure. a rigorous multi-level screening retain the best talent, technology will And to do that, they have to start process to ensure that only increasingly become a core area of seeing the role and purpose of their suitable candidates were given competitive advantage. IT departments in a new light too. the opportunity to participate. Today’s workforce is not just At the same time, companies must Respondents were interviewed in the driving consumerisation of IT, but not lose sight of the security threats UK, Germany, France, Netherlands, also accelerating consumerisation inherent in being a more connected Spain, UAE, US, Singapore, Japan, of the workplace. These changing organisation. The relatively lax Australia, India, Brazil, Mexico, employee behaviors and expectations attitude of employees towards cyber China and South Korea. are shaping the way organisations security is exposed by surveys, Two groups, Revolutionary and think about the role of technology in presenting one of the most pressing Laggard, were identified in the study the workplace. challenges. It suggests that people by those that reported having a

34 biznesstransform.com COVER FEATURE

completely digital workplace, where of work is diversifying. Today’s advanced consumer technologies, new technologies are in widespread digital workplace is moving beyond such as home automation products, use throughout the organisation, a traditional office environment become a feature of most employees’ against those who said technology with technology bolted on, to one in personal lives, they will expect the was in limited use or not used at all. which the entire infrastructure and same benefits in their place of work. Aruba’s findings suggest that the physical space are designed around, Aruba’s study revealed not problem is as much about human and optimised through, digital tools. only high adoption of standard failures as it is digital workplace People are looking for a digitally- technologies, from Wi-Fi supplied design. The key trends appear below. powered working environment that by 82% of organisations surveyed makes everything – from controlling to cyber security 67% and cloud THE DIGITAL WORKPLACE office climate to booking a meeting applications 43%, but traction with a room – more efficient. As ever more new generation of technologies. Workplace technology is no Blurring the lines between longer just about the tools that a facilities- and IT- managed company provides, but the entire functions, these IoT-driven working environment it creates. Workplace technologies automate temperature Organisations and workplaces that controls and lighting 24%, voice- fail to get ahead of the curve on technology has the activated and wireless conference the new generation of workplace opportunity to be room AV technology 23%, and technologies will limit employee bespoke corporate mobile apps 23% results and lose their competitive the leading force for offering location-based information. advantage. The consumerisation of technology As organisations increasingly wellbeing at work. is reflected by a clear appetite from communicate and do business employees for a workplace that is through digital channels, the nature digital by default. Almost two-thirds

biznesstransform.com 35 COVER FEATURE

employees who reported their working The companies that thrive as digital environments lack digital tools. workplaces will be those that start to Workplace technology is often associated with efficiency and productivity, but that see technology less as a series of tools is just one level of benefits unlocked by and more as fundamental ambient implementing a digital workplace. Aruba discovered that there are significant personal infrastructure. satisfaction and wellbeing advantages for Digital Revolutionaries as a result of working in more digitally-enabled workplaces. When implemented correctly, Aruba’s research reveals the significant dividend of employees in Aruba’s study 64% said that that well-designed and well-implemented they thought their organisation risked falling technology can deliver for today’s behind if new workplace technology wasn’t companies, by not only helping people to do integrated. their jobs better, but to be happier and more In addition, 71% said they think the fulfilled at work. workplace of the future should be fully Technology does not have to limit or automated, with 72% stating that the undermine the role of people; in fact, workplace should become a completely it can support and enhance it. Recent interactive environment that automatically advances in technology provide a catalyst updates and adjusts itself, while 61% called for organisations to jump-start a more for virtual and augmented reality to play a productive relationship between people and stronger role. technology in the workplace and elsewhere. Workplace technology has the opportunity ADOPTERS AND LAGGARDS to be the leading force for wellbeing at work. The study found that 80% of all workers As workplace technology becomes more say personal wellbeing and job satisfaction prevalent, the modern workplace is dividing is important to them; addressing this need into those who are seizing the benefits should already be one of the most pressing of digital technologies and those who are concerns for any organisation. falling behind. Attitudes toward technology Given the premium that most employers in the workplace and its adoption vary now place on employee wellbeing and job among employees and across different satisfaction in a highly competitive labor organisations. market, the need to invest in creating the In Aruba’s study, they identified two connected, digitally-enabled workplaces that distinct groups within today’s workforce: can enable those things becomes essential. The Digital Revolutionaries, employees that work in fully-enabled digital workplaces AUTOMATING THE WORKPLACE where new workplace technologies are in widespread use; and the Digital Laggards, Automation, enhanced with machine learning, has the opportunity to significantly improve workplace productivity and enable employees to expand into more strategic roles. Aruba’s research found that there was almost a unanimous belief among all employees 93%, both Revolutionaries and Laggards, that increased use of digital technology will lead to improvements in the workplace. A large number of respondents believe that the future workplace will be more efficient 56% and more collaborative 52% and create a more appealing work environment 47%, while a majority 57% said they would be happy to share more personal data in return

36 biznesstransform.com COVER FEATURE

for more personalised tools and experiences. This general optimism towards technology and the workplace it can create extends to the topic of automation. Almost three quarters 71% of respondents said they would welcome a fully automated workplace, so that working conditions such as light and temperature could be adjusted in real time to individual preferences. Similarly, 72% thought all office equipment such as the height of desks should be automatically adjustable, and 71% say that biometric data should replace passwords. Considering the repetitive, uninteresting, manual or semi-automated tasks in many of today’s organisational workflows, it is not difficult to see why Digital Revolutionaries envision automation as an opportunity to learn new skills and move into more strategic roles. Automation can also play a significant role in balancing the need for productive employee experiences and risk-taking, by proactively combatting unknown security threats as they appear. Approaches such as User and Entity Behavior Analytics can scan continuously for threats or risks on an individual profile basis, detecting anomalies in the network and taking preventative action before the risk spreads, and before human IT teams become aware. potential impact of a company data breach, while 77% said they consider cyber security SECURING THE WORKPLACE to be very or extremely important. The gap between thought and action on A more connected workplace is inherently cyber issues becomes even more apparent more vulnerable to cyber- attacks, a risk that when you consider that just 53% said they is compounded by the behavior of employees. use the cyber security software provided to Although the digital workplace brings them by their employer. clear benefits to both companies and their Given the significant cost that comes with employees, it also introduces new challenges. any kind of cyber security breach, companies A more connected organisation that runs need to address the problem of employees on digital platforms and applications is also who are lax in their everyday security more open to security breaches. behavior than their stated attitudes would As companies invest in greater digital and suggest. connected physical infrastructures, they It is not enough for organisations to invest must also do more to ensure compliance in secure networks and cyber software; they around information security and data also need to acknowledge the risks posed by privacy. Employers need to understand human error, and to understand the irony the mindset of the employees who are that it may be the more digitally inclined driving change towards more technological employee who poses a greater risk than the workplaces. one who knows and cares less about the Aruba’s research found that the approach cyber threat. of employees can be problematic for employers who are looking to limit their cyber security liability. These behaviors Excerpted from the Aruba HPE report: The Right occurred despite the fact that 92% of Technologies Unlock the Potential of the Digital employees said they are aware of the Workplace.

biznesstransform.com 37 COVER FEATURE HOW WORKPLACE ROLES AND PROCESSES ARE TRANSFORMING Workplace job roles, asset usage, processes, are all being transformed by digital technologies according to Mahmoud AlYahya at Xerox, Osama AlHaj-Issa at HPE Aruba and Andy Brocklehurst at Cisco. By Arun Shankar

hile cloud, mobility, social collaboration role of a policy specialist, also referred to as cloud technologies are boosting the emergence of access security broker. the digital workplace, the key underlying This is someone who decides who in the company pain point that continues forward is - can access which cloud resources. This is a new kind of Wmeeting misery. The reason for this according to Andy job role generated by the multi-cloud environment that Brocklehurst, Collaboration leader for Cisco in EMEAR, organisations are now living in. is that, “The way in which people work is not intuitive. Another challenge for the workplace is the huge This creates a challenge. It is complex, so they go and difference in speeds between the ability to access or seek another way in which to do things, they go and reach the right information internally versus the speed add another application.” at which technology is progressing externally. In order to Since people work in ways that best suit them, boost internal collaboration around information sharing they keep adopting new ways and new solutions to within an organisation, it is imperative to reduce the do things. In essence, what people want to do in the hierarchal structure of an organisation, in other words workplace can be captured by one, two, or three kinds flatten the structure. of applications, built around workflow and processes, Using the power of teams built on specialist knowledge and this represents a simplification of sorts. rather than on other norms of organisational position, “What is the fundamental issue that business is helps to boost creative thinking and innovation. Such facing and it is meeting misery. Meetings start late, types of team structures reduce go to market times, technical issues, no thread or common flow to it, and encourage creative and out of the box thinking, and help it stifles decision making,” explains Brocklehurst. workers to think about: How will I not make myself a As organisations implement new systems like virtual bottleneck and sharing is caring. meeting rooms, to boost remote working and home Brocklehurst points out, by default organisations are working, the best way to make it a success is to make built using a command and control structure, and need it as simple as possible to use. to move to a matrix type structure. Workers will attempt to get to know an application one to two times before they give up. “The best remote EARLY ADOPTERS control is no control only voice, where the meeting is already ready, and you take the meeting with you,” says According to Osama AlHaj-Issa, Regional Channel Brocklehurst. Director, Middle East, Turkey and Africa at HPE Aruba, The growing volumes of data generated within Aruba is a core component of any regional digital businesses either unstructured or structured data transformation initiative, and is usually a preferred is creating a challenge of management. One such platform for early adopters. “If you look at different job role to manage data is the analytics specialist. customers that we deal with, some of them are more The growing proliferation of cloud applications and advanced on the digital transformation journey platforms within a digital organisation is creating a and some are more conservative. We are with the

38 biznesstransform.com COVER FEATURE

taking a hard look at where they are today, their processes now and in the future, before they even begin this journey. As an end to end vendor, Xerox enables this with its customers by starting with an assessment, designing the solution, implementing the solution, and then managing the solution. Says Mahmoud AlYahya, Head of Production Technology Business, Xerox Middle East Operations, “A lot of companies unfortunately miss out that step. They want to jump into digitisation (Left to right) Mahmoud AlYahya, Head of Production Technology Business, before understanding where they are right Xerox Middle East Operations; Osama AlHaj-Issa, Regional Channel now and what are the opportunities that Director, Middle East, Turkey and Africa at HPE Aruba; Andy Brocklehurst, they have to digitise. Going through the Collaboration leader, Cisco EMEAR. step of assessment and assessing what are the areas and processes that could be transformed from document intense area more advanced pioneers than with the to paperless areas is absolutely key. That conservatives. Our solutions are playing in is something that we help with massively an area of future strategy and if you look in terms of understanding their processes at some of the biggest organisations in the their workflows.” region, our customers are pioneering in Is this an established professional digital transformation.” practice within Xerox? “It is not a formal For the early adopters of transformation process, it is the way business is done in the region, transforming the workplace in Xerox, and it is now like a common means a lot for them. Such organisations practice. We all speak the same language in want to have an open environment with the organisation,” explains AlYahya. smart meeting rooms, mobile workers, For Xerox, digital transformation in the mobile printing, easily locatable workers. workplace is a four-step process. It starts Since digital transformation also involves with organisational assessment, followed by changing the people and processes of an design of a solution, then implementation, organisation, the way people think and and finally management of the solution. plan, not all organisations are ready for Xerox follows the same practice for its such changes. managed print services and for any other Cloud and security are very important customer facing services as well. components of this journey. “These are Xerox’s vision for the digital workplace is objectives of organisations that are going to develop solutions that makes life easier through the journey of digital transformation for its workers, while enabling businesses to and we are making this happen for them,” reduce cost and increase efficiency. Another says AlHaj-Issa. part of the vision is to recognise a document AlHaj-Issa explains that Aruba is in all its digital formats as a normal usually not more than 5% to 10% of an standard. To assist remote working and work organisation’s digital strategy. “But these from home, another part of the Xerox vision are very important, and you cannot do a is mobile printing. transformation plan without having the right “One of the things we are enabling our components of security, mobility, workplace, clients to do is to be more mobile. Being able machine learning, intelligent edge. These to print from anywhere, anytime using our are all part of a digital transformation, but it solutions is one of the keys. Making work takes processes, people, and applications.” simple sounds like a very bold headline, but it is a bit more challenging than it sounds,” PAPERLESS OFFICE reflects AlYahya.

Organisations that begin their digital transformation journey need to start by

biznesstransform.com 39 FEATURE / LIFESTYLE

HOW TECHNOLOGY IS REDEFINING THE MEANING OF HUMAN BEING Recent developments are triggering a wave of interest in how human beings can be rebuilt presenting Neil Harbisson, Amal Graafstra, and Viktoria Modesta.

rom tribal piercings to the meant color, I was diagnosed with figurative tattoos of prehistory, achromatopsia, or complete color- humans have been modifying blindness, as a child. their bodies for millennia. But Using technology, I co-created an Fadvances in prosthetics, implants and antenna, that I have implanted to this day bioengineering are allowing us to alter which allows me to perceive colors. The ourselves in new and unprecedented antenna senses color frequencies, which ways not only to beautify or overcome reach me as different audible vibrations. deficiencies, but to enhance and exceed It was chaotic at first because, as an our current capabilities. artificial sense, it took longer for my brain All three defy categorisation and eschew to process. I could not tell the colors apart, the widely-used term body-hacker. But and it took me many months and a lot of whatever the title: bio-hackers, neuro- memorisation to actually understand and hackers, futurists or otherwise, this ever- name the colors. growing community is challenging the But slowly, after many months, the very notion of what it means to be human. process became automatic. My brain began to transform sensory input into NEIL HARBISSON perception. My sense of what is beautiful Cyborg and designer of artificial senses has changed too. Now, experiences that I normally would not have found Neil Harbisson is the world’s first legally stimulating like walking down a recognised cyborg. He has an antenna supermarket aisle are. In an aisle, there implanted in his skull which transposes are lots of different vibrations of colors colors into audible vibrations. Since 2010, that, to me, are very flattering. Harbisson has run , an This project is artistic in intent. Because online platform dedicated to researching art has no rules, laws or boundaries, I feel and developing artificial senses, like there is a lot of freedom when you promoting and defending contextualise a project in art. It allows me cyborg rights. to think freely about what I want and how I define what I do as neuro-hacking I want it. In this case, I am not trying to rather than biohacking or bodyhacking solve a problem, I am trying to explore because my ultimate aim is to change alternate realities and solve my curiosity the mind. But, in order to do so, I have to towards color. change my body. The purpose of the Cyborg Foundation, During my studies at art college, I which I co-founded in 2010, is to became interested in sensing things create senses and organs that are not that I could not otherwise sense, which traditionally human. Whereas the medical

40 biznesstransform.com FEATURE / LIFESTYLE

field usually focuses on creating recreating pre-existing senses and body parts, the foundation focuses on innovating new ones. For example, my fellow co-founder, , has implanted seismic sensors in her feet so that whenever there is an earthquake in the world or a moonquake on the Moon, she feels it in her body. Another artist, Manel Muñoz, has biometric ears that can perceive changes in weather. And then there is Kai Landre, who is developing a sensor that allows him to feel cosmic rays. By adding these new senses, we can reveal realities that already exist in nature, but that the human body or brain cannot yet perceive. The teams working on these projects all come from different backgrounds. There are artists, designers, doctors, computer scientists, multiple fields collaborating to create new senses. Most people think these creations are not necessary for us to function. That is because for thousands of years we, as a species, have been changing the planet rather than our bodies in order to survive. But I think that is the wrong approach. People might say they do not need more senses, but at night they turn on the lights. But if humans actually had night vision, we would not have to create artificial light. Instead of using air conditioning when it is hot, or heaters when it is cold, could not we just adjust the temperature of our bodies? We should look to designing and changing ourselves.

AMAL GRAAFSTRA Invisible bio-hacker

Since 2005, Amal Graafstra has had multiple chips, RFID tags and even a magnet implanted into his hands, arms and upper body. He is the founder of Dangerous Things, a bio-hacking firm, and VivoKey, a digital identity platform aiming to make secure implants accessible to everyday consumers. I have always been fascinated by technology. When I started doing IT for a medical clinic, I began to see the healthcare system’s inner workings how doctors are just mechanics, and in terms of how we diagnose, treat and fix it, the body is just a machine. This experience removed the mystique of medicine. It also eroded the idea that the skin was some sort of sacred barrier. Even though chip implants are safer than ear piercings, people tend to have an – ick - reaction to them, while tooth fillings and breast implants are totally acceptable. The difference has nothing to do with the device or implant procedure, it is applications that drive adoption.

For thousands of years we as a

I define what I do as neuro-hacking species have been changing the rather than biohacking or bodyhacking planet rather than our bodies in because my ultimate aim is to change the mind. But, in order to do so, I have order to survive. to change my body.

biznesstransform.com 41 FEATURE / LIFESTYLE

Bio-hacking is an umbrella term digitally expand our minds, we will begin meaning anything from DNA hacking to transcending the human condition. bionics to simple lifestyle changes. The term hack has a negative connotation, VIKTORIA MODESTA but it is powerful when you understand Bionic pop artist that it really means an unconventional Futurist approach or solution. All good, efficient hacks become mundane they are no Viktoria Modesta is a bionic artist whose longer a hack, they are just how things work explores the intersection of art, are done. science, music, technology and design. If an implant is designed well in other She is a fellow at MIT Media Lab and has words, it is frictionless, management-less performed at museums, festivals, fashion and you give it as much thought as you do weeks and the London Paralympic Games. your kidneys.in other words, none at all, then Her work, which includes the viral hit it is part of you. It is not a tool that you have Prototype, challenges our notions of picked up like a smartphone, it is actually ability and identity. changing your capabilities as a human. That When I underwent a voluntary leg is philosophically, fundamentally and, as amputation at the age of 20, I was shocked I am sure we are destined to see, legally to learn that doctors felt it was more different from any tool. acceptable for me to be in constant pain and for my whole body to suffer, than it was to have my damaged leg removed and replaced with an artificial one. That process When we are literally able to digitally highlighted an unhealthy obsession with expand our minds we will begin how we value the biological body. We identify with our bodies as what transcending the human condition. defines who we are. But going through the decision to amputate gave me a deeper sense of self. It made me curious about how we can transcend this rigid view, to approach the body in a creative way and Fear of technology is rampant. The fact take more care with the things we create. that my augmentations are internal they My main motivation has always been are not visible definitely helps in terms of about raising the bar on standards and my daily interactions. I do not typically expectations, which I have always found have to worry about stigma or prejudice offensively low for women, especially those from the un-augmented. The typical with disabilities. As a kid, adults looked at visual cues that would normally betray me as if I was destined for nothing, which the fact I am different are just not there. I found really puzzling. I felt strong and Most bio-hackers can choose to disclose imaginative, and I never identified with their augmentations or decide to keep that image of being incapable. them private. My view of prosthetics has undergone I think a synaptic brain-computer an evolution. At one point, I saw it as a interface is kind of the holy grail. Imagine form of salvation, and a form of feminism, we had synthetic synapses that could dock to be able to take charge of my body and exchange neurotransmitter molecules and choose what my leg looks like. After with organic synapses. We could pay a my first few prosthetics, it became all digital neural service to fire up a hundred about how they can be an art form and a billion extra neurons to think through statement of expression and fashion. problems, then shut them down once Most of the artificial art limbs I own we’re done. It would intellectually free us, result from a collaboration with the as a species, from the confines of biology. Alternative Limb Project. Crystal, a The constant struggle to enhance prosthetic encrusted with Swarovski our capabilities is the very definition of crystals, was created for the Paralympic humanity. When we are literally able to Games’ closing ceremony.

42 biznesstransform.com FEATURE / LIFESTYLE

Spike, a black lacquered, geometric the power of thought, or robotic attire prosthetic; and Light which contains that responds to the environment, we are LEDs, both featured in my viral music heading for a neuro-connected, expressive video Prototype. By working with tech- future where technology will be an facing artists and designers, I am now intimate extension of our selves. developing many conceptual projects We are all interfacing with technology. fusing prosthetics, fashion, musical It might be for different purposes like instruments and emerging technologies. medicine, lifestyle, art or simply a Nowadays it seems that the prosthetics manifesto, but this segregation is just one space is changing from a basic medical of those human illusions. industry to a consumer one, and it is being It does not matter whether you identify infiltrated by designers and engineers as a cyborg or transhumanist, or if you from other fields. are an amputee, gamer, or older person Medical assistive devices are becoming kitted out with medical tech inside your more like any other aesthetic and body. Technologically advanced human technological features found in our bodies are the future, and the future is KEY TAKEAWAY lives. From the things I have seen in already here. For me, fusing my body THE PURPOSE OF THE development, it may be increasingly with technology feels like a philosophical CYBORG FOUNDATION common to have internal sensors that can exploration of humanity. It is art. IS TO CREATE SENSES project data from inside the body, uniting AND ORGANS THAT ARE all forms of tech wearables. NOT TRADITIONALLY Whether it is clothing that monitors Content courtesy CNN Style. Photography by Lars HUMAN. your health, bionic limbs controlled by Norgaard. Images courtesy of Neil Harbisson.

biznesstransform.com 43 MARKET OUTLOOK

IS TRANSFORMATION BOOSTING THE VALUATION OF PRIVATE EQUITY A survey by PwC throws up pros and cons in a real-life manner on whether digital transformation is boosting the valuation of private equity in the region.

44 biznesstransform.com MARKET OUTLOOK

s a region, the Middle East has customers can inform everything from embraced the digital revolution. product design to customer interaction Now more than ever before, PwC and marketing. are seeing an increased comfort Ain going digital unsurprisingly given the THE SURVEY region’s young demographics and good quality infrastructure. Certainly, at a PwC Middle East surveyed a number of consumer level there is a high level of leading private equity firms in the region technology adoption: Bahrain, Kuwait and to find out what digitisation means to them the UAE are among the most penetrated and how it is impacting their investment countries in the world with a mobile decisions. The survey focuses on the subscriber rate of over 90%. private equity life cycle from the time of Although, with that said, most Middle investment, holding period right through Eastern companies are still in the process to exit and highlights the maturity of of adoption stage in comparison to the digital developments facing the region. West when it comes to digitisation. At the initial investment stage, private What do we mean by digitisation? We equity houses usually focus on two main mean transforming analogue and manual areas when they are thinking about processes, functions and tasks into digital going digital: throughout a company. Digitisation • PE houses identify and plan how the encompasses digitising product and potential impact of digital will have on service offerings as well as expanding the the companies they are investing in, business model and customer access by whether this be the threat of disruptive offering disruptive digital solutions. competition or the opportunity for new At a corporate level, digital has disrupted sales and service provision almost every industry sector, and will • PE houses assess the extent of digitisation continue to do so. As the digital landscape within a company, and how digital can be evolves, there is a pressing need for used to optimise cost and revenues. private equity houses in the Middle East to keep up with these rapid changes, or Such things can fundamentally change a risk being left behind. The private equity company’s business model, and therefore investment horizon means that the digital the digital investment of portfolio transformation of a portfolio company is companies should be at the forefront of being assessed and planned even before management and board thinking. private equity houses even think about PwC survey shows that private equity investing in any new company. houses believe that going digital is a Digitising a company does not need necessity. It features heavily in the to be expensive, and digital can create investment decision process and value value throughout the private equity creation plans of all the private equity holding period: new customers can be firms surveyed in the Middle East region. found online; costs can be optimised Notably, 80% of private equity houses through more efficient purchasing and said that digitisation is critical for making operational management; cash flow can their companies future ready. be improved and the wealth of data now These findings are even stronger than being generated by connected devices and in Europe, where digitisation is more advanced. A comparable PwC Private Equity and Digital Transformation survey, led by Private equity firms in Middle East European team, found that less than two- thirds 62% of private equity firms thought have considered the extent to which that digital could deliver sustainable they should increase their investment value for a company, although it was considered the single most important trend in digital beyond traditional domains. influencing investment decisions. Almost three quarters said that they are now focused on the level of maturity of a company’s digitisation during the

biznesstransform.com 45 MARKET OUTLOOK

due diligence stage of an acquisition. When PwC maps this to the recent deal What do we mean by digitisation? activity happening in the region, they Transforming analogue and manual are seeing industries such as Financial Services, Healthcare, Retail and Consumer processes, functions and tasks into as investable sectors all focused on digital throughout a company. enhancing their digital footprint. From the survey findings, it is clear that digitisation means different things to different private equity houses. Some see it as an enabler to maximise revenues within a fairly short timeframe. Others unlikely to be early adopters of the latest see it as a way to improve management technologies. Given capital constraints reporting, with better- quality data and holding periods, with typical 75% feeding better informed decision making. investors looking to sell assets after 3-5 OF PE HOUSES ARE There is a general consensus over the need years, private equity houses will adopt a NOW FOCUSED for better information systems including very pragmatic approach to digitisation. ON THE DIGITAL real time information. Private equity houses will carefully MATURITY OF A consider the solutions to be rolled out, COMPANY AT DUE REAL LIFE SCENARIOS ensuring they have been tested before DILIGENCE STAGE OF committing to them. THEIR ACQUISITION That said, for all of the recognition of The risk and costs of testing a very digital’s importance, private equity innovative solution will probably exceed companies are cautious about their the expected return in their typical time initial investment decisions and they are horizon. Digitisation is not something

46 biznesstransform.com MARKET OUTLOOK

that can simply be imposed by private THE REGION IS ALREADY BEING HEAVILY equity investors. DISRUPTED BY DIGITAL. SOME EXAMPLE INCLUDE: Rather, digitally enhancing portfolio companies depends on the actions and attitudes of wider stakeholders including FINANCIAL SERVICES (FINTECH) the Board and Management, and on how easy it is to change customers’ mind set. Overall, the survey suggests that private equity houses recognise that they are at RETAIL (E-COMMERCE) a crossroads here. They must balance the risks of adopting new technology against the opportunities it offers and the danger HEALTHCARE (AI AND ROBOTICS) of failing to build the exit equity story. There is also increasing awareness of how digital is disrupting the business FMCG (CUSTOMER DATA CAPTURE)) model. For example, PwC are already seeing Procurement 4.0 and how digital innovation is disrupting the entire procurement MANUFACTURING (BSB SUPPLY CHAIN)) value process. The market is seeing some innovative examples of how digital is rapidly transforming supply chain and logistics, such as, efficient inventory management and have on the exit phase before they invest. transport tracking systems. They must ask questions about how the Some 79% of respondents in the investment industry will be disrupted and Middle East say that such production what that will mean for the asset. and procurement savings are some of the Industries from retail to healthcare will most important impacts of digitisation be heavily impacted in the near future, on portfolio companies. In fact, there is so this needs to be a major consideration no single right way to embrace digital when looking to exit. That is all the truer or to adopt new technologies: the extent for private equity houses looking to sell of digitising portfolios must be based on assets to international buyers, who will the current needs of the company and on expect global standards when it comes to global industry standards. the assets’ digital offering and capabilities. Private equity firms need a strong Using digital to increase sales and management team on the ground who performance will be seen as central to truly understand the specific companies’ maximizing value by the time investors digital needs and the extent to which decide to exit. Therefore, developing a these technologies can be implemented. robust digital strategy that compliments the Private equity houses have also found exit process will be key. 95% of respondents ways to access global knowledge through think that digital is important to future exits experts and advisors. from their portfolios, and to the returns on Hiring external expertise allows them investments that can be realised. to manage the skills gap in their own E-commerce remains relatively management teams and at Board level underdeveloped in the Middle East and in the region. They consider the digital reportedly accounts for just 2% of retail agenda to be a Board discussion topic sales compared to over 17% in the UK. 79% and the focus should often be given With such high mobile penetration in the BELIEVE to Board members who have led such region, it is reasonable to expect there will PRODUCTION AND transformation projects either inside or be rapid catch-up growth in this sector. PROCUREMENT outside of the region. All of this suggests that digital markets SAVINGS WOULD will grow very fast with mobile platforms BE THE MOST EXIT STRATEGIES becoming increasingly important in areas IMPORTANT IMPACTS such as healthcare, where apps such as OF DIGITISATION The digital revolution is further increasing Babylon are even using artificial intelligence ON PORTFOLIO the focus private equity houses should AI to answer users’ medical queries. COMPANIES

biznesstransform.com 47 MARKET OUTLOOK 14 - 18 OCTOBER 2018 DUBAI WORLD TRADE CENTRE

Investors are recognising that, as the infrastructure develops and KEY TAKEAWAYS companies join consumers in a rapidly evolving digital landscape, it will • Private equity companies are cautious about their initial become increasingly central to company investment decisions and unlikely to be early adopters of performance. This should also support the latest technologies. digitisation efforts of the region. • With capital constraints and holding periods private equity When PwC compare the Middle East houses will adopt a very pragmatic approach to digitisation. landscape to that of Europe or the West, • The risk of testing a very innovative solution will probably it is clear that all regions are at different exceed the expected return in their typical time horizon. stages of digital adoption. Our survey • Digitisation is not something that can simply be imposed by shows that private equity firms here private equity investors. in the Middle East have considered the • Survey suggests that private equity houses recognise extent to which they should increase they are at a crossroads, balancing risks of adopting new their investment in digital beyond the technology against opportunities. traditional domains such as enterprise resource planning ERP systems. The unique and vast opportunities that this presents in the region is exciting. The FUTURE OUTLOOK Middle East can tap into sector knowledge from across the globe, meaning private PwC findings suggest that companies equity firms can benefit from best practice in the Middle East have been cautious and lessons learned from the West. Being over exploiting the potential of such new part of a growing economy means that technology - none of PwC respondents there are fewer technologies already in have actually implemented things like AI place and less need to upgrade legacy robotic surgery, for example, although systems. Many companies are starting it is interesting to some investors. There with a blank canvas. was no mention of online monitoring The digital revolution has changed the of patients, which has been used way products and services are consumed. successfully in countries such as India As the market continues to adapt to and China. More broadly, areas such as consumer demand, private equity firms and Experience AI and smart manufacturing seem to be portfolio companies must remain relevant further down the agenda. by mirroring consumer behaviour. Digital transformation is high on the Having a digital strategy is essential Future Urbanism agenda for Governments across the region, for future proofing a company that WELCOME TO THE LARGEST TECHNOLOGY with many national programmes launched wants to retain market share and stay EVENT IN THE MIDDLE EAST, to improve and develop the countries’ ahead of the competition. Those who are digital infrastructure and economy. In nimble will reap the benefits of the value AFRICA & SOUTH ASIA the UAE, PwC have seen the Smart Dubai to be created through digitisation. This initiative launch in early 2017 which sets mindset out for the UAE Government to be 100% must also be adopted by management Big on numbers. paperless by 2021. Saudi Arabia views teams who can no longer survive Bigger on digitisation as a key enabler for its Vision without integrating digital capabilities 2030 transformation programme. within their teams to complement their opportunities. 4.700+ 100.000+ 6.238 EXHIBITORS VISITORS MEETINGS SET traditional skillsets. At the centre of the global tech revolution Digitisation encompasses digitising and the region’s digital transformation, Excerpted and adapted from PwC Report: GITEX Technology Week brings together 80% 16.000+ 9 the most powerful innovations influencing product and service offerings as well Digitisation, The revolution transforming EXHIBITORS GOVT & CORP VERTICAL CONFERENCES Private Equity by Erwan Colder, Private Equity the future – right from AI to Smart Cities SECURED OVER 2 BUYERS WITH 100+ HOURS OF BUSINESS DEALS CONTENT as expanding the business model and Leader Middle East; Romil Radia, Middle East to Blockchain. Valuations Leader; Maged EzzEldeen, Egypt customer access. * * * * * ** * **** *** ** * * ** * * * * * ** * *** ** * * * ** *** *** ** * *** ** * * * * * * Deals Leader; Ovais Chhotani, Middle East Deals Director; and Jad Barakat, Middle East Deals Director. FOLLOW US CONTACT THE TEAM ON Organised by Co-located with +971 4 308 6566/6022/4090/6282/6077 [email protected] 48 biznesstransform.com #GITEX2018 www.gitex.com

GITEX 2018 AD 31x22.indd 1 7/26/18 3:14 PM 14 - 18 OCTOBER 2018 DUBAI WORLD TRADE CENTRE

Experience Future Urbanism WELCOME TO THE LARGEST TECHNOLOGY EVENT IN THE MIDDLE EAST, AFRICA & SOUTH ASIA

Big on numbers. Bigger on opportunities. 4.700+ 100.000+ 6.238 EXHIBITORS VISITORS MEETINGS SET At the centre of the global tech revolution and the region’s digital transformation, GITEX Technology Week brings together 80% 16.000+ 9 the most powerful innovations influencing EXHIBITORS GOVT & CORP VERTICAL CONFERENCES the future – right from AI to Smart Cities SECURED OVER 2 BUYERS WITH 100+ HOURS OF BUSINESS DEALS CONTENT to Blockchain.

* * * * * ** * **** *** ** * * ** * * * * * ** * *** ** * * * ** *** *** ** * *** ** * * * * * *

FOLLOW US CONTACT THE TEAM ON Organised by Co-located with +971 4 308 6566/6022/4090/6282/6077 [email protected] #GITEX2018 www.gitex.com

GITEX 2018 AD 31x22.indd 1 7/26/18 3:14 PM RESEARCH

HOW VULNERABLE ARE SCADA OPERATIONAL SYSTEMS IN THE GCC Gulf Business Machines looks at the increasing vulnerability of operational technology systems and the role of artificial intelligence in the Gulf region.

ccording to 7th Edition of GBM’s Annual Cybersecurity Study, conducted across UAE, Bahrain, Oman and Kuwait, 31% have already experienced Aattacks to their operational technology environments. The survey polled over 600 executives and IT professionals from a range of industries including IT, healthcare, education, oil and gas, hospitality, and many others. According to Hani Nofal, Vice President, Intelligent Network Solutions, Security and Mobility, Gulf Business Machines, operational technology systems are being challenged HANI NOFAL because of the integration of SCADA systems Vice President, Intelligent Network with Internet of Things and the Internet. Solutions, Security and Mobility, Gulf Business Machines. Industrial control systems are the central nerve system for all manufacturing, utilities, oil and gas plants. These are the systems which operate the plants input and output, all of which are designed to work seamlessly to achieve specific measured outputs. Computer-based supervisory control servers and desktops. Industrial control and data acquisition systems have evolved systems send data in the clear, without any over the past 40 years from standalone, encryption or authentication. compartmentalised operations into From a cyber perspective, SCADA systems networked architectures that communicate look similar to business systems like across large distances. In addition, their firewalls, switches, Active Directory, file implementations have migrated from custom and print servers, Windows Servers and hardware and software to standard hardware workstations. However, they often lack basic and software platforms. However, the protection. There is near zero visibility in security envelope has not evolved with the SCADA environments from a threat detection same pace as SCADA and ICS systems. perspective. SCADA and ICS systems and applications 31% of organisations have already were designed for high resilience but not experienced attacks to their operational with the view of cybersecurity. SCADA technology environments. There is a shift in and critical infrastructure systems run on Gulf organisations that have started taking the same operating platform as corporate action by deploying security controls for

50 biznesstransform.com RESEARCH

operational technology and developing a everyone should improve their skills security strategy for prevention, detection with experience – practice makes perfect and response. – and that is the fundamentals behind A few organisations in fact are leading machine learning, computer learning and the way in setting up a security operations adapting through experience. This is why centre dedicated for SCADA infrastructure CISOs have been investigating how to and applications isolated from the IT use artificial intelligence to bolster their environment. cybersecurity. Machines and technology can now be taught to teach themselves how BLENDING AI AND HUMAN SKILLS to build models or recognise patterns and 31% anomalies without human intervention. HAVE ALREADY There has been a significant increase Organisations can use the data from EXPERIENCED in the development and execution of previous cyberattacks to detect and ATTACKS TO THEIR artificial intelligence and machine respond to newer and similar attacks their OPERATIONAL learning technology over the past few security may experience, while it can also TECHNOLOGY years. We have always talked about how be automated to simply watch over the ENVIRONMENTS

biznesstransform.com 51 RESEARCH

network traffic, learn what is normal and use the information gathered to flag any WHAT DO YOU THINK IS THE DRIVING anomalies that it considers suspicious. FACTOR BEHIND AN AI-BASED Detection, response and prediction CYBERSECURITY TECHNOLOGY ADOPTION? are driving factors behind an artificial intelligence-based adoption with Gulf organisations. Organisations in the UAE, Bahrain, Oman and Kuwait have highlighted that a mix of artificial intelligence and human skills is the way forward to best utilise the functions of artificial intelligence or machine learning. There is an ongoing debate between cybersecurity experts on what path to take when considering the protection of their business and it appears the opinion is still split down the middle. Organisations are now beginning to see the full benefits of utilising artificial intelligence within their cybersecurity practices as 62% of enterprises in the Gulf surveyed said they were likely to utilise artificial intelligence within 3 years, 40% of whom aim to accomplish this within a 1-2- year timespan. While many organisations wonder if artificial intelligence will eat into the security. For the simpler attacks, the jobs aspect, it seems far-fetched to have system could be programmed to deal with the same effect on cyber security. Either the situation without any guidance and artificial intelligence will help in bridging instead only flag up the more extreme the gap in human skills or create a new case to the security teams. Taking an skillset requirement which the new assume breach mentality, artificial generation needs to be ready with. It is intelligence can also be programmed unlikely that the shortage of human skills to attack or breach your own systems, in cybersecurity will fade in the next as any hacker would to discover three years. vulnerabilities, sending the findings to the security team, maybe even with SECURITY OPERATIONS AND AI recommendations, so it can be patched up before it is exploited for real. Another, often overlooked, benefit of CISOs want to enhance their security, artificial intelligence is how much time improve their operations and protect their it will free up for employees tasked with organisation’s IT business and artificial intelligence is certainly gaining momentum in providing some much-needed protection against attackers. There are always discussions about artificial intelligence SOC integrated with artificial bringing forth mass redundancies, but intelligence allows analysts artificial intelligence needs to be applied 31% to complement the security team and its OF ORGANISATIONS to not be overwhelmed infrastructure not replace. HAVE ALREADY by data and monitor a The aim of artificial intelligence is to EXPERIENCED company’s infrastructure. eliminate human error. However, human ATTACKS TO THEIR is the heart of not just functioning OPERATIONAL security operations centre, but a TECHNOLOGY successful one. The high volume of ENVIRONMENTS.

52 biznesstransform.com RESEARCH

data now being collected and stored by organisations and the sheer weight of KEY TAKEAWAYS attacks they face has made it difficult for one single solution to be the answer. • A few organisations are leading in setting up a SOC A security operations centre integrated dedicated for SCADA isolated from the IT environment. with artificial intelligence can provide • SCADA and ICS systems and applications were designed for the best of both worlds, allowing a high resilience but not with the view of cybersecurity. security operations centre analyst to not • There is near zero visibility in SCADA environments for be overwhelmed by the constant stream threat detection. of data and also consistently monitor a • The aim of artificial intelligence is to eliminate human error. company’s infrastructure, flagging any major security incident that requires human intervention. For companies uncomfortable with putting the fate of their security in the hands of unmanned machines, it is important to note that artificial intelligence HOW LIKELY ARE YOU TO UTILIZE still needs human feedback in order to improve the quality of its decision making. ARTIFICIAL INTELLIGENCE IN SECURING The best solution is an integrated one. YOUR ORGANIZATION? What the survey has discovered is artificial intelligence is as important as human resources in predicting cyberattacks and it is expected that mentality would be repeated in all aspects of cybersecurity. The fact is artificial intelligence and security operations centre is the future of cybersecurity and organisations in the

Artificial intelligence is as important as human resources in predicting cyberattacks.

WHAT WOULD BE THE MOST CRITICAL RESOURCE THAT COULD HELP YOUR ORGANIZATION PREDICT CYBERATTACKS? Gulf are quickly coming to the realisation this is the direction needed to fully protect their infrastructure for the ever-increasing threat of cyberattacks. A security operations centre is a facility housing an information security team who monitor and analyse an organisation’s security on an ongoing basis. By analysing and monitoring an organisation’s network, server, data and endpoints 24x7, the security operations centre team can ensure the timely detection and response of any security incidents.

biznesstransform.com 53 INDUSTRY COMMENT

HOW ORGANISATIONS CAN USE GATEWAYS TO BRIDGE OT AND IT Operational and information technology are different worlds and gateways help to bridge information from one to the other, explains Oliver Horn at Red Hat.

he Internet of Things, IoT will Operational control systems, make operational technology, on the other hand, are devised as TOT, the hardware and standalone systems and were not embedded software for monitoring originally designed for connection and controlling physical devices, to the outside world or for external processes, and events – fit for access. OT systems are frequently the future. It has the potential self-contained and proprietary. to fundamentally transform Department managers and IT almost every industry, whether architects see the IoT as a catalyst production, energy supply and for change. They want to deploy distribution, transport and haulage, standards-based operational OLIVER HORN or healthcare. The networked control systems as an important Senior Solutions Architect – Alliances, Red Hat. sensors, measuring devices, and component of IoT projects, thereby actuators monitor and control the replacing standalone measuring status of resources and machines. devices, sensors, and actuators with Most IT companies still treat intelligent, IP-based devices. By IT and OT as separate areas and interlinking OT and IT solutions on develop, maintain, and use the two the basis of established protocols for different purposes: and modules, companies can • The CIO is responsible for general link heterogeneous systems and company applications, such as processes, thereby eliminating ERP, CRM, and BI solutions. redundancies. • The operations or production When attempting to link OT and manager is in charge of IT systems, system architects are production control and other faced with a number of functional special applications, such requirements: as Manufacturing Execution Systems, Energy Management SCALABILITY Systems, and Supervisory Control and Data Acquisition Systems. Intelligent systems record and analyse large quantities of data IT and OT solutions emerge from a variety of endpoints independently of each other and require high-performance over time. They solve different computing, storage, and problems and use different system networking capacities to do so. architectures and communication protocols. For example, IT systems AVAILABILITY were developed to connect applications and enable data Many intelligent systems are sharing, and they generally use an designed to be deployed in open, standards-based architecture. environments where system failure

54 biznesstransform.com INDUSTRY COMMENT

oriented company applications. The connection to the company’s THE TWO ORGANISATIONAL UNITS HAVE TO value chain is made here. COORDINATE THEIR ACTIVITIES IN ORDER • The gateway tier serves as an intermediary between the devices TO BENEFIT FROM A CONVERGENT OT AND and the datacentre or the cloud. IT ENVIRONMENT WITH A UNIFORM IOT It aggregates device data and ARCHITECTURE. can buffer it before relaying it to the datacentre. In addition, it transfers controlling information to the device on the basis of open might lead to reduced productivity, messaging standards. It also unsatisfied customers, or even loss serves as a buffer for data that is of revenue. In the case of critical required for tactical analysis or applications such as medical regulatory requirements. applications, monitoring solutions, and smart grid implementations, Furthermore, gateways can system failure may even result in facilitate a direct, local reaction, as severe damage to health or the required – without going through environment. the datacentre. Therefore, the gateways can be situated in the SECURITY factory hall, a train station, or a hospital wing. Intelligent systems frequently depend on the publicly accessible GATEWAYS Internet or use cloud-based computing and memory resources. IoT gateways are the cornerstones of To protect against loss or theft a convergent OT and IT architecture. of data or a denial of service They were especially developed to attack, the new solutions have to close the gaps between devices in the be optimally secured and easy to field, as well as in central economic maintain. This means, among other and industrial applications. IoT things, that it must be possible to gateways optimise the performance apply security patches quickly. OT of a solution by collecting real-time is not traditionally configured to data from operating procedures at support this. the place of origin and performing To achieve optimal scalability and initial processing. reliability, a hierarchical, intelligent In this way, they disburden the system architecture consisting of applications in the datacentres and a device tier, a gateway tier, and a the cloud and facilitate efficient datacentre or cloud tier, is required. development by introducing an • The device tier includes abstraction tier between the devices endpoints such as IP-capable and the application. Furthermore, measuring devices, sensors, by separating the devices from displays, actuators, medical the applications, they enable new devices, antennas, machines, and endpoints to be added more quickly vehicles, where data is collected and easily to a configuration. and then transmitted. The Industrial Internet of • The datacentre or cloud tier Things, IIoT area provides a good consists of computing or memory example in this context: here, capacities, for example, for gateways are used due to different industrial process monitoring communication technologies and and control. But it also includes can deliver value-added services integration into the existing IT at the intersection of IT and OT. In infrastructure, the deployed ERP this use case, data often needs to be systems, and other business- converted between fieldbus systems

biznesstransform.com 55 INDUSTRY COMMENT

KEY TAKEAWAYS - for example the Modbus - and redundant architecture components TCP. In doing so, data can also be at every tier. • Through a convergence of OT and aggregated and machine conditions This ensures service availability, IT environments, companies can for example are only reported when for example, in cases of an improve their performance and there is a change. individual component malfunction. reduce the total cost of ownership. Another example is building Specific security measures that • Different organisational units have services where different cover a comprehensive spectrum of previously been responsible for OT communication technologies are threats and vulnerabilities should and IT functions – with different used, for example power line be implemented at every tier. targets, budgets, and strategies. communication, different radio • To achieve scalability and reliability, frequencies and protocols as well CONVERGENCE a hierarchical system architecture as bus systems. Collected data can consists of device tier, gateway tier, be transferred into a unified TCP Through a convergence of OT and and a cloud tier. communication and data can be IT environments, companies can • Most IT companies still treat IT and enriched - for example from which improve their performance and OT as separate areas and develop, building, which room, and which reduce the total cost of ownership. maintain, and use the two for sensor does the data come from? However, detailed preliminary different purposes. Furthermore, data can also be analysis and planning is required • IoT gateways are the cornerstones aggregated, the gateway only sends to reconcile various departments, of a convergent OT and IT a message when the temperature disciplines, and business processes architecture. is changing. Here, reactions might optimally with each other. In most be necessary locally and self- companies, different organisational sufficiently in order to stick to units have previously been required reaction times or to ensure responsible for OT and IT functions reactions when connectivity to the – with different targets, budgets, datacentre is interrupted. and strategies. Finally, there are use cases in The OT department implements the transportation sector. It might and supports highly specialised be necessary to amalgamate data process control systems that from the tractor, the trailer and ensure continuous availability of the cargo directly at the vehicle - applications. Yet, the IT department again either to react locally, when implements and supports having an unstable data connection comprehensive, complex, open to the datacentre or because there systems that depend on standards- are heterogeneous technologies based networks and servers for vehicle, trailer and cargo that running virtualised applications cannot be controlled by one tool. that partly rely on cloud services. The hierarchical architecture The two organisational units addresses the strict requirements have to coordinate their activities in regarding IoT scalability, order to benefit from a convergent availability, and security. The OT and IT environment with a number of gateways can be uniform IoT architecture. increased incrementally, thereby Unlike traditional, enabling cost-efficient growth. manufacturer-specific control To avoid single points of failure, systems, modern OT solutions use companies can implement standards-based IT infrastructures and communication protocols; as a result, they can achieve greater flexibility and scalability while BY SEPARATING DEVICES FROM remaining cost-efficient. Thanks to the convergence of previously APPLICATIONS, THEY ENABLE NEW separated OT and IT environments, ENDPOINTS TO BE ADDED MORE QUICKLY companies might now be in a AND EASILY TO A CONFIGURATION. position to increase performance while reducing complexity and infrastructure costs.

56 biznesstransform.com AUSTRALIA INDIA NIGERIA SWITZERLAND AZERBAIJAN INDONESIA OMAN THAILAND BAHRAIN ITALY RUSSIA TURKEY BOTSWANA KAZAKHSTAN SAUDI ARABIA UAE CANADA KENYA SCOTLAND UNITED KINGDOM CHINA MALAYSIA SINGAPORE US EGYPT MAURITIUS SRI LANKA ZIMBABWE FRANCE NEW ZEALAND SPAIN GHANA NEPAL SOUTH AFRICA 34 50 PARTICIPATING QUALIFYING COUNTRIES ROUNDS 3,700 C-LEVEL EXECUTIVES

FOR MORE VISIT: www.gecopen.com

CONTACT: [email protected], [email protected], [email protected] LOOKING GLASS

Source: Riverbed Digital Performance Global Survey 2018

58 biznesstransform.com LOOKING GLASS

Source: Riverbed Digital Performance Global Survey 2018

biznesstransform.com 59