Author: GEC NEWS WIRE

  • Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organizations Worldwide

    Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organizations Worldwide

    Sophos and Secureworks has announced a definitive agreement for Sophos to acquire Secureworks. The all-cash transaction is valued at approximately $859 million. Sophos is backed by Thoma Bravo, a leading software investment firm.

    Sophos’ experience and reputation as a leading provider of managed security services and end-to-end security products, combined with Secureworks’ security operations expertise transformed into the Taegis™ platform, is expected to further deliver complementary advanced MDR and XDR solutions for the benefit of their global customer bases. Together, they will help strengthen the resilience and security posture of global organizations of any size with a combination of security controls, AI, world-class threat intelligence, and two teams with decades of cybersecurity expertise.

    Sophos expects to integrate solutions from both companies into a broader and stronger security portfolio benefiting small, mid- and enterprise customers. This includes Sophos expanding its current portfolio with other new offerings like identity detection and response (ITDR), next-gen SIEM capabilities, operational technology (OT) security, and enhanced vulnerability risk prioritization. As two partner-centric organizations, the combination of Sophos and Secureworks will enable the combined company to expand its market presence to create greater value within the channel and strengthen the overall security community.

    “Secureworks offers an innovative, market-leading solution with their Taegis XDR platform. Combined with our security solutions and industry leadership in MDR, we will strengthen our collective position in the market and provide better outcomes for organizations of all sizes globally, said Joe Levy, CEO of Sophos.

    Cyber risk continues to escalate, driven by a rampant cybercriminal ecosystem and global geopolitical pressures. Combined, Sophos and Secureworks share a long history of having exceptional threat intelligence, security operations, incident response, and innovative security product capabilities that help organizations defeat these adversaries.

    “Our mission at Secureworks has always been to secure human progress. Sophos’ portfolio of leading endpoint, cloud, and network security solutions – in combination with our XDR-powered managed detection and response – is exactly what organizations are looking for to strengthen their security posture and collectively turn the tide against the adversary,” said Wendy Thomas, CEO, Secureworks.

     

  • Globant Unveils Report to Tackle AI Myths in Healthcare to Unleash Potential Across the GCC

    Globant Unveils Report to Tackle AI Myths in Healthcare to Unleash Potential Across the GCC

    Globant has launched its new ‘Move Your But’ report to drive AI adoption in the healthcare industry, showcasing AI’s potential to transform patient care and operational efficiency. The report’s findings have significant implications for the GCC region, where the healthcare market is projected to reach $135.5 billion by 2027, with AI poised to inject $320 billion into the Middle East economy by 2030.

    Addressing AI Adoption Challenges

    This new report delves into AI’s impact on the healthcare industry and marks the inaugural release of an industry-focused report titled “Move Your But.” With this initiative, Globant aims to tackle the common excuses—or “buts”—that organizations use to justify not implementing AI. The findings are particularly relevant to the GCC, where the healthcare sector is rapidly evolving.

    The study addresses beliefs that may hinder AI adoption and provides solutions to these challenges. For instance, despite the belief that ‘Healthcare is Personal,’ AI can enhance personalization by automating routine tasks, enabling healthcare providers to focus more on patient care. This is particularly relevant in the GCC, where the prevalence of chronic diseases like diabetes presents a significant opportunity for AI to make an impact. Globant’s collaboration with a glucose monitoring organization demonstrates AI’s potential, resulting in a 78% increase in click-through rates, thereby improving diabetes management adherence.

    “Artificial Intelligence possesses a remarkable ability to transform established paradigms, and the GCC healthcare sector is primed to benefit. With the region’s advanced digital infrastructure, AI is overcoming hurdles like complex data management and resource constraints. The potential of AI in GCC healthcare is crystal clear and is beginning to have a tangible impact. It’s revolutionizing everything from telemedicine and personalized treatment plans to operational efficiency and patient safety—raising the bar for quality and accessibility across the Gulf. And with the region’s commitment to innovation, there’s undoubtedly more to come,” said Federico Pienovi, Chief Business Officer & CEO for APAC & MENA at Globant.

    Navigating Data Management and Regulatory Compliance

    Addressing ‘Data Management Challenges,’ the report recognizes the complexity of navigating healthcare data. Globally, 62% of healthcare organizations see data silos as a significant obstacle to AI implementation. However, the report acknowledges AI’s potential to break down these silos by integrating disparate sources into an efficient system. In the GCC, where digital health initiatives are rapidly advancing, AI-driven analytics can result in 50% faster data processing speeds, markedly improving data management and patient care.

    This improvement is crucial, as Gen-AI technology can analyze unstructured data sets—such as clinical notes, diagnostic images, and medical charts—representing a potential breakthrough for healthcare operations. “We’re taking a long-term perspective on AI in healthcare,” commented Federico Pienovi, Chief Business Officer & CEO for APAC & MENA at Globant.

  • Rubrik Unveils Data Security Posture Management for Microsoft 365 Copilot

    Rubrik Unveils Data Security Posture Management for Microsoft 365 Copilot

    Rubrik, Inc. has announced Rubrik Data Security Posture Management (DSPM) for Microsoft 365 Copilot to provide greater visibility and control of sensitive data, reduce the risk of exposure, and empower organizations to quickly and securely adopt Copilot.

    ”Organizations are facing significant pressure when it comes to improving security of their rapidly growing data,” said Mike Tornincasa, Chief Business Officer at Rubrik. “Rubrik DSPM for Microsoft 365 Copilot helps safeguard those business-critical assets, allowing organizations to leverage the power of innovative tools like Copilot while maintaining a strong data security posture and ensuring cyber recovery–all within a comprehensive cyber resilience platform.”

    Microsoft 365 Copilot is an AI-powered assistant that generates answers anchored in an organization’s business content to deliver highly relevant and contextual responses. To ensure Copilot surfaces only data which users have permissions to view, it follows the same data access controls already in place in Microsoft 365. Misconfigurations in these controls could lead to the exposure of sensitive data to unauthorized users.

    To help mitigate this risk, Rubrik DSPM for Microsoft 365 Copilot is designed to provide the data visibility and control needed to ensure sensitive data is correctly classified, labeled, and segmented – and has the right access permissions. This enables organizations to leverage the power of Copilot while securing sensitive data from the risk of exposure.

    Key Benefits of Rubrik DSPM for Microsoft 365 Copilot:

    • Prepare your Microsoft 365 environment for secure Copilot adoption: Gain visibility and control of your Microsoft 365 data to help minimize privacy and governance risks, readying your environment for a Copilot rollout with an enhanced security posture.
    • Identify high-risk access permissions: Detect sensitive files with public or organization-wide access so you can remediate excessive permissions and prevent the exposure of sensitive data to unauthorized users when leveraging Copilot.
    • Ensure accurate data labeling: Identify and remediate missing or inaccurate data sensitivity labels to help prevent unauthorized user access to sensitive data when using Copilot.

    “Microsoft is committed to enabling secure and intelligent productivity tools for our customers,” said Tony Surma, CTO, Americas Partners at Microsoft. “The introduction of Rubrik Data Security Posture Management for Microsoft 365 Copilot aligns with our mission by providing robust data visibility and control, enabling organizations to confidently leverage AI-driven capabilities while ensuring their sensitive data remains secure.”

     

  • Redington Hosts ‘The Vertical Congress’ in Saudi Arabia  to help Transform Key Industries

    Redington Hosts ‘The Vertical Congress’ in Saudi Arabia to help Transform Key Industries

    Redington has hosted its flagship event, ‘The Vertical Congress’ in Riyadh, Saudi Arabia.

    ‘The Vertical by Redington’ showcases tailored industry-specific digital solutions. It brings enterprise-grade technologies for supporting customers in all verticals to accelerate and grow their business in the digital age.

    The Vertical Congress – Riyadh Edition focused on redefining business outcomes in BFSI, Education, Construction and Healthcare across the Kingdom. The summit featured industry leaders such as Huawei, Microsoft and HPE as Diamond sponsors; ASUS, AWS, Freshworks, Forescout, Hitachi Vantara, Microsoft CSP, MSI and Lenovo as Gold Sponsors, and Enterprise DB and Deepas | Emojat as Bronze Sponsors

    Dharshana Kosgalage, Executive Vice President, Technology Solutions Group, Redington MEA, said, “Our commitment is to assist Saudi Arabian businesses in adopting digital technologies and achieving their digital transformation goals. ‘The Vertical by Redington’ provides businesses with access to advanced digital solutions, as well as the expertise and support needed for their success. We believe that ‘The Vertical by Redington’ will bring about a significant change in Saudi Arabian businesses, and we are excited to be part of this transformative endeavor.”

    The exclusive closed-door event comprised industry veterans, including speakers Feras Alsarraj, CTO, and Business Dev. Manager, IT Products & Solutions, Huawei; Frangiskos Lambrinos, DPS Lead, Middle East & Africa from Microsoft and Fahad BinThabit, Director Digital Data and Performance at Al Rajhi Takaful.

    Increasingly businesses in these key sectors in the Kingdom are looking to accelerate their digital transformation initiatives and are seeking robust technologies to improve operational efficiencies. ‘The Vertical by Redington’ offers a common platform for customers to connect with pioneering tech providers to help realize their digital ambitions.

    Attendees had the opportunity to network with industry leaders and gain technical proficiency from technology breakout sessions running parallel in different rooms; while exploring cutting-edge strategies and innovations across the key verticals.

    Nehal Sharma, Vice President, Cloud Solutions Group, Redington MEA, said, “Technology is transforming the way we work and live. Across the key verticals of Saudi Arabia, the integration of cloud computing is revolutionizing processes, enhancing collaboration, and driving innovation. At Redington, we are committed to harnessing the power of cloud technology to create new opportunities and drive sustainable growth in these key industries.”

    Rawad Ayash, President, Saudi Arabia, Redington, said, “Saudi Arabia is a frontrunner in digital transformation. The nation possesses the necessary resources, skilled workforce, and determination to achieve this goal. Through strategic policies and investments, Saudi Arabia is paving the way to become a worldwide center for innovation and technology. Through ‘The Vertical by Redington’, we are presenting the industry with an excellent opportunity to access top-notch solutions across essential sectors and enhance the digital experiences of our customers.”

  • Bulwark’s AI-Driven Cybersecurity Advancements

    Bulwark’s AI-Driven Cybersecurity Advancements

    With a strong focus on AI-driven innovations, Managing Director Jose Menacherry highlights the company’s ongoing commitment to delivering advanced, vendor-backed technologies that address the evolving security needs of customers

    What new are you bringing to the table in 2024 GITEX?

    This marks our 22nd participation in GITEX, where we’ve been showcasing our products and solutions to customers, partners, and vendors. GITEX serves as an excellent platform for engaging with partners, interacting with customers, and aligning vendors with end customers. Through this event, we gain valuable insights and feedback not only from customers but also from vendors.

    Customers can connect directly with our vendors, discuss their needs, and share the challenges they face, particularly in the cybersecurity space. This exchange helps us identify new technologies and vendors while providing valuable feedback to existing vendors, who can then incorporate these insights into their product roadmaps to ensure their offerings are well-positioned and effectively address customer needs.

    As for AI integration, while we aren’t a product development company ourselves, we represent various vendors, many of whom specialize in cybersecurity. These vendors are increasingly embedding AI technologies into their solutions, recognizing the crucial role AI plays in enhancing cybersecurity capabilities. Our role, as a distributor, is to provide and deliver these advanced solutions from our vendors to our customers.

    How are you attracting vendors that are incorporating AI into cybersecurity solutions?

    Our existing vendors are constantly engaged in development activities to stay ahead of emerging threats. In today’s landscape, addressing security concerns without AI has become increasingly difficult, as cyberattacks have grown more sophisticated. Even hackers are leveraging the same advanced technologies. This makes it essential for our vendors to continuously adopt AI solutions in their products, ensuring they keep pace with evolving threats.

    As a distributor, we operate solely through channel partners. While we do interact with end customers to position products and understand their concerns, all sales are made through our channel partners. We maintain regular interactions with them, holding frequent update sessions to keep them informed of any new developments or features in our solutions. We also provide training so they are fully equipped to present the latest technology to their customers. It’s a collaborative effort—working alongside our channel partners, we meet with end customers to address their needs, especially as we introduce new security solutions into the market.

    In terms of feedback, we’ve seen strong engagement, especially over the past couple of days. Many customers and partners have been interacting with us, seeking new solutions to address the latest security challenges, including the rise of ransomware and phishing attacks. We’ve heard that ransomware is still a prevalent issue, with some customers having experienced it firsthand, and they are actively seeking solutions to mitigate these threats.

    Overall, the feedback has been valuable, and it’s clear that there is a demand for more advanced security solutions in response to the increasing number of breaches.

  • Mig Cardamone, Sales Director, Sennheiser Middle East and Africa

    Mig Cardamone, Sales Director, Sennheiser Middle East and Africa

    In this informative interview, Mig Cardamone, Sales Director, Sennheiser Middle East and Africa speaks with the GEC Media Group Editor about the company’s cutting-edge unified communications solutions. Mig highlights Sennheiser’s comprehensive business communications portfolio, designed to enhance collaboration in any setting—from small meeting rooms to large auditoriums and lecture halls. Discover how Sennheiser’s innovative products are transforming the way organizations communicate and collaborate effectively.

  • Ericsson conducts seamless automated upgrade of Vodafone Oman’s Core and Cloud

    Ericsson conducts seamless automated upgrade of Vodafone Oman’s Core and Cloud

    Ericsson has completed the automated upgrade of Vodafone Oman’s core network applications and cloud infrastructure. The upgrade has prepared Vodafone Oman to deploy 5G standalone and 5G services for its consumer and enterprise customers.

    The scope involved the upgrade of the complete Ericsson end-to-end core network and cloud infrastructure, network management, life cycle management and business support systems (BSS) in a single project, marking it as a significant first in the Gulf Cooperation Council (GCC) region.

    Vodafone Oman’s core network consists of virtual and containerized functions implemented over the upgraded cloud infrastructure, including Evolved Packet Core (EPC), Home Subscriber Server (HSS), Unified Data Management (UDM), IP Multimedia Subsystem (IMS), Policy and Charging Rules functions (PCRF), and Management and Orchestration (MANO) applications. The upgrade of the core network functions was enabled by Ericsson’s automation pipeline with minimal human intervention.

    Upgrading through this model means Vodafone Oman is set up well to reduce risks in the network due to the ability to implement the latest security patches and corrections. It also facilitates improved performance and faster time-to-value compared to manual processes.

    Ericsson Orchestrator, which handled the upgrades of the other elements in the project, provides automation packages which allowed experts from the two companies to facilitate a smooth transition to the latest technologies, empowering the communication service provider (CSP) to deliver exceptional network experiences to its customers.

    The Ericsson Service Delivery team conducted the upgrade in collaboration with Vodafone Oman and the Ericsson Managed Network Services team, which oversees network operations. This joint effort aimed to enhance Vodafone Oman’s network performance and reliability, ensuring a better experience for its users.

    The process was completed seamlessly, without any disruptions to network traffic. Over 200 live node activities (LNA) were executed in 100 percent first-time-right with zero incidents and escalations.

    Bader Al Zidi, Vodafone Oman Chief Executive Officer, says: “At Vodafone Oman, we are committed to supporting the goals of Oman Vision 2040 by driving digitalization and fostering economic growth. We are actively collaborating with global technology leaders, such as Ericsson, to create a connected tech-telco ecosystem. This upgrade, and the introduction of the Ericsson automation framework to support further automated upgrades, are an important stepping stone for us to enable the implementation of new technology services and preparing Vodafone for a smooth introduction of 5G SA. The automation will not only enhance our day-to-day operations but also set the stage for future expansion.”

    Nicolas Blixell, Vice President and Head of Ericsson Gulf Council Countries, says: “We are delighted to be a trusted partner of Vodafone Oman in the continued evolution of its network. We are leveraging the power of automation to improve the CSP’s operational and energy efficiency, boost performance, reduce time to market for new services and lower expenses by eliminating manual processes and enabling zero-touch operations.”

    Ericsson has enjoyed a productive collaboration with Vodafone Oman as its core and cloud network supplier since the launch of the CSP’s trial operations in the country in 2021. The two companies are working together to deliver a state-of-the-art 5G standalone network while enhancing Vodafone Oman’s radio access network (RAN) and transport capabilities, in addition to developing a cloud-native microservices based 5G infrastructure.

  • ManageEngine IAM Solutions Recognized by Industry Analyst Firms Gartner and KuppingerCole

    ManageEngine IAM Solutions Recognized by Industry Analyst Firms Gartner and KuppingerCole

    ManageEngine has received multiple recognitions from industry analyst firms.

    The recent recognitions include the company’s positioning as a Challenger in the 2024 Gartner Magic Quadrant for Privileged Access Management for the second consecutive year. ManageEngine was evaluated alongside eight other PAM vendors for its Completeness of Vision and Ability to Execute.

    In a new milestone, the company has also been acknowledged as a Market Leader in the KuppingerCole Leadership Compass 2024: Identity Governance and Administration Report. ManageEngine’s IAM solutions, AD360 and Identity360, have been recognized for their strengths in identity life cycle management, risk identification, and remediation, including robust access governance through access certificate campaigns and strong support for various authenticators, including FIDO.

    “We believe these recognitions highlight our strategic focus on delivering comprehensive, identity-centric security solutions that address the evolving needs of global enterprises,” said Manikandan Thangaraj, vice president at ManageEngine. “We feel our platform’s strength lies in its ability to unify advanced PAM, IGA, identity threat detection and response, and identity security posture management capabilities. This holistic approach enables organizations to build a resilient identity fabric that adapts to complex threat landscapes and stringent regulatory requirements.”

    Resolving the Identity Crisis

    The evolving digital landscape has expanded the scope of identity management beyond traditional boundaries. With the proliferation of modern technologies and distributed work environments, organizations face the challenge of securing an increasingly complex identity ecosystem containing both human and non-human identities. Securing these has evolved from a mere technical requirement to the cornerstone of enterprise security. ManageEngine’s platform addresses these complexities by providing a unified approach to managing all identities across the entire IT infrastructure.

  • Kaspersky announces further development of Cyber Immune solutions in the Middle East and Turkiye

    Kaspersky announces further development of Cyber Immune solutions in the Middle East and Turkiye

    Kaspersky has announced the launch of Appicenter, a content distribution platform for KasperskyOS-based devices. Kaspersky IoT Secure Gateway is the first product to be supported by Appicenter. The Appicenter platform introduces a wide range of business scenarios and expands the industries covered by the Cyber Immune IoT Gateway. Kaspersky IoT Secure Gateway 3.0 and Kaspersky Appicenter are now available in the Middle East and Turkiye.

    Both solutions embody the concept of Cyber Immunity, where IT products are created from the ground up using Secure by Design methodology. This approach ensures “inherent” resistance to the majority of cyberattacks. Cyber Immune solutions are particularly sought after in industries requiring high levels of cybersecurity, reliability and predictability requirements, such as the industrial sector, energy, petrochemistry, transport and logistics, healthcare, and smart city systems.

    Kaspersky Appicenter supports all stages of the application lifecycle, connecting developers, global vendors, and end-users of KasperskyOS-based devices. The platform is comprised of three key elements: 1) a developer portal to facilitate successful application development; 2) a website with an application catalogue to find available apps for KasperskyOS-based devices; 3) management consoles to search, install, update, and uninstall applications for KasperskyOS-based devices. The developer portal provides SDK and KISG firmware, openly accessible for developers. Currently, the Appicenter website features three applications for Kaspersky IoT Secure Gateway: MQTT Publisher, OPC UA Client, and Network Protector.

    Kaspersky IoT Secure Gateway (KISG) is a Cyber Immune gateway designed to secure data transmission between technological and corporate data networks, offering robust protection for the industrial Internet of Things. The newly launched 3.0 version of KISG provides self-testing of key subsystems to monitor the performance of security functions. It enables the verification of the integrity of system files and installed applications, and supports the installation of applications from the Kaspersky Appicenter.

    The new product can operate in two modes: router and data diode. In router mode, the NAT port forwarding function has been introduced, along with application protocol filtering and industrial protocol inspection (DPI with intrusion detection/prevention function). This enables the blocking of network connections and specific operations based on the application protocol. Multiple gateways can now be combined into a high-availability network cluster, with one gateway active and the others acting as backups. Additionally, the new KISG supports user-configurable static routes for more flexible management of network packets. In data diode mode, user applications can now be executed, with each application running in an isolated environment.

    Kaspersky IoT Security Gateway helps customers reduce the cost of building network infrastructure and optimizes cybersecurity processes. It enables centralized device management through a single administration console (Kaspersky Security Center). Untrusted applications can be integrated into a secure operating system, eliminating the risk of vulnerability exploitation or undeclared functionalities. This solution adds an independent layer of protection to existing automation systems and enhances the security of IoT devices.

    “Our Cyber Immunity approach is reshaping the future of cybersecurity and is gaining significant momentum in the Middle East and Turkiye, as more organizations recognize the need for inherently secure technologies. The recent updates in our Cyber Immunity portfolio help enhance the security posture of our clients in critical infrastructure industries. In the coming years, we expect this shift to accelerate,” said, Toufic Derbass, Managing Director for the Middle East, Turkiye and Africa region.

  • Driving Cybersecurity Innovation

    Driving Cybersecurity Innovation

    What is Utimaco’s focus within cybersecurity?

    So, basically, we do a few things, and I like to say we do them very well. Our focus is on data protection, specifically secure payments and key management. This is a niche in the market and is essential to meeting regulatory requirements most of the time. That’s essentially what we do here. As you can see, we are a company that operates entirely through the channel, and in the Middle East we work with Bulwark Technologies.

    Basically, what we do is primarily driven by regulations. For example, take the NCA regulation in Saudi Arabia, or similar regulations in other countries, where encryption is a key requirement for data protection. These regulations typically don’t specify exactly how to achieve this, but they clearly state that data protection must be accomplished through encryption. What we offer is hardware, which is a solution for generating and storing encryption keys. So, behind every regulation, there is a project, and behind every project, there is this need.

    Quantum computing is emerging. How are you helping your customers prepare for post-quantum cryptography?

    We are actually one of the pioneers in this field. Essentially, quantum computing requires preparation with algorithms that a quantum computer cannot easily break. Currently, the algorithms everyone uses—although we might not think about it—are behind every online connection, securing them through encryption, which is essentially math.

    What we are doing is offering new algorithms approved by international bodies working on post-quantum cryptography. We also provide HSMs (Hardware Security Modules) that are already compliant with these new algorithms. In short, if you’re an organization that needs such a device for your current requirements, you can also begin future-proofing with the same device, preparing for the post-quantum era. This allows you to manage your encryption in two ways: the standard method for today and the new method for tomorrow. This means everyone in your organization can start testing and understanding what will eventually come.

    Utimaco also offers critical infrastructure protection. Can you shed more light on this?

    Yes, of course. It’s a space we are very active in. We work with most governments on projects like document security, insurance, and key management for passports. Although it’s not limited to governments, banks are also frequent targets of cyberattacks. So, what do we do? We ensure that most of the security is centered around encryption. Essentially, even if data is stolen, it’s useless because the thief cannot read it without the decryption key.

    Encryption relies on keys. You could have the most secure infrastructure, but if someone has the key, they can access everything. What we offer is a solution that is certified to securely generate and store these keys. For example, if you have a database containing employee, customer, or citizen information—whether you’re a bank or a government—if someone steals the database, they can’t read the data without the key. However, if the key is stored alongside the data, they can steal both. But if the key is inside tamper-proof hardware specifically designed for security, the data remains protected. We are essentially the foundation of security for critical infrastructure like governments and other key organizations.”