Middle East Exclusives

Rasheed Alzahrani

Big Interview – Rasheed Alzahrani

Rasheed Alzahrani, Director of Safety and Security at King Salman Park Foundation, shares insights into innovative safety and security strategies, the integration of AI, and global collaborations within the Kingdom of Saudi Arabia  To begin, could you introduce yourself and provide some background on your role and experiences?  I am a civil engineer who landed in safety and security. My professional journey across various industries, such as energy and real estate, capitalises on the importance of safety and comprehensive security. I currently lead the safety and security at King Salman Park, which presents unique challenges and requirements.  While I’m proud of my previous roles, being part of King Salman Park Foundation is a highlight. King Salman Park might be perceived as another public park; however, it is a life-changing project, transforming the quality of life for Riyadh’s community. Being an urban hub for cultural, recreational, and community activities, safety and security are a top priority.  Our mission is to safeguard both visitors and assets while promoting collaboration and connectivity among stakeholders. Safety and security are about more than just implementing measures, they are about building trust. At the conference today, we discussed the importance of working together, especially during emergencies. Effective communication and resource utilisation are crucial. With rapidly advancing technology, such as 5G, artificial intelligence (AI), and machine learning, we must strike a balance between leveraging these tools and safeguarding private data.  How can safety and security leaders ensure effective communication and collaboration among diverse stakeholders, particularly in emergencies?  The key is to establish clear responsibilities for all entities involved. We must prioritise collaboration by hosting regular meetings to define these roles. Each stakeholder, whether public or private, must have a clear understanding of their position in our safety and security framework. By defining these roles early, we reduce confusion during crises.  We also integrate commercial collaboration documents and protocols, ensuring every facility and stakeholder understands their responsibilities. This preparation includes having agreements in place with emergency services, law enforcement, and private contractors, ensuring a seamless response when needed.  Additionally, we conduct regular drills and exercises to reinforce this collaboration. These exercises simulate real-life scenarios, allowing stakeholders to practise their responses and identify areas for improvement. Sharing knowledge and lessons learned from these drills helps us refine our strategies. Building strong relationships between public and private sectors fosters a unified approach to safety and security, ensuring we can respond efficiently and effectively in any situation.  Saudi Arabia is investing heavily in smart cities. How is safety and security integrated into these developments?  Saudi Arabia is making significant strides in developing smart cities, aligning with its Vision 2030 initiative to diversify the economy and embrace technological innovation. Saudi Arabia’s leaps in smart cities are driven by government efforts to foster digital transformation, which is primarily to attract tourism while emphasising sustainability and environmental responsibility. Green technologies and practices are incorporated to minimise ecological impact and promote sustainable urban living.  As part of this evolution, technology such as artificial intelligence and the Internet of Things (IoT) has been integrated into urban planning, ensuring that cities have the required infrastructure from the outset. Cybersecurity has also been considered to protect data and ensure privacy as part of innovative city initiatives. This includes using centralised cloud infrastructure for real-time data analytics and efficient information sharing among stakeholders.  This transformation reshaped the way safety and security operate, where systems are designed to ensure people feel safe at all times, which is fundamental for fostering trust and confidence. For instance, if someone loses their wallet at the airport, our connected systems can locate and return it within hours. This level of efficiency is possible because of the technology we’ve implemented. Systems are interconnected, allowing us to track and respond quickly to incidents. These systems address immediate concerns and create a sense of security that encourages tourism and investment.  AI is a significant trend in safety and security. How is it being utilised, and what challenges do you foresee?  AI has completely transformed safety and security as an enabler tool. Both government and private security and safety entities benefit from the predictive features, which can prevent potential risks or hazards. Machine learning also plays a key role by helping us allocate resources efficiently. For example, data collected from AI systems can guide decisions on where to deploy security personnel or install additional surveillance systems.   Although AI brings efficiency and better measures, the technology will also create new challenges, such as addressing cultural and geographical factors, data privacy, and ethical considerations. As Saudi Arabia stepped into the data management and AI business, The Saudi Data & AI Authority (SDAIA) has made tremendous efforts to govern and oversee its use.  The European Union has implemented legislation like the EU AI Act to regulate AI use. Do you anticipate similar regulations coming to fruition in other regions?  Absolutely. Without rules, the risks of AI misuse or unethical practices could outweigh its benefits. Saudi Arabia’s Vision 2030 initiative strongly emphasises AI, aiming to position the Kingdom as a leader in AI innovation and regulation. This vision includes significant investments in AI research and development and the establishment of regulatory frameworks to ensure the ethical use of AI technologies.  Saudi Arabia has adopted a risk-based approach in addressing AI applications and is making significant progress in regulating AI, ensuring its deployment is safe, ethical, and aligned with global standards. The Kingdom  has also participated in global discussions and collaborations, such as the Bletchley Declaration, which brings together countries to address AI governance and ethical considerations.  How does cybersecurity complement physical security?  Integrating technology into our daily activities has expanded our parameters to consider cybersecurity. Physical security systems like surveillance cameras and access control are linked to digital networks, underscoring the critical need for robust cybersecurity, as any vulnerabilities in cyberspace can potentially compromise physical security operations.  At King Salman Park Foundation, we emphasise convergent security, integrating cybersecurity measures with physical security for a comprehensive approach. This holistic approach safeguards tangible

Big Interview – Rasheed Alzahrani Read More »

Ettiene van der Watt - Regional Director - MEA, Axis Communications

Axis Communications: Emerging trends in the Middle East

Ettiene Van Der Watt, Regional Director, Middle East & Africa at Axis Communications spoke with International Security Buyer at Intersec 2025 in Dubai  What role do you see artificial intelligence playing in the evolution of security and surveillance technologies, particularly in environments like the Middle East?  Artificial intelligence is playing a critical role in the evolution of security and surveillance technologies, especially in the Middle East, where rapid urbanisation and smart city initiatives are reshaping the security landscape. At Axis Communications, we recognise the importance of AI in not just enhancing security but also in enabling smarter, more efficient operations and enhancing business intelligence. By integrating edge-based AI analytics into our solutions, we enable real-time video analysis directly at the camera, making it possible to detect threats and take action faster. In the Middle East, with its diverse security challenges, AI is crucial in providing proactive and automated solutions that adapt to local needs, improving safety and optimising operations.    How can AI-driven video analytics address the unique challenges faced by businesses and governments?  AI-driven video analytics plays a pivotal role in tackling the unique challenges faced by businesses and governments, particularly in the Middle East. In environments that are rapidly evolving with urban growth and increasing security demands, AI can automate the detection of potential threats in real-time, providing faster response times and more efficient monitoring. For businesses, AI enables proactive security measures, improving asset protection and operational efficiency. For governments, AI is essential in managing public safety, traffic monitoring, and crowd control in densely populated areas. By leveraging AI-powered analytics, both sectors can anticipate issues before they arise, improving safety, reducing risks, and enabling smarter decision-making.    What emerging trends in surveillance took centre stage at Intersec?  At Intersec Dubai, emerging trends in surveillance highlighted the power of AI and edge computing in transforming the security landscape. Real-time, edge-based video analytics were at the forefront, enabling faster, more efficient decision-making without relying on centralised systems. AI-powered solutions like object recognition and anomaly detection gained significant attention, providing more proactive and automated security responses. We also saw a growing focus on cybersecurity, with an emphasis on secure data handling and integration with smart city technologies. Sustainability was another key theme, with solutions designed to be more energy-efficient and aligned with global green technology goals.    In rapidly growing urban areas, what are the key technological advancements in video analytics that can enhance public safety while maintaining privacy?  In rapidly growing urban areas, technological advancements like AI-powered edge analytics and thermal imaging play a crucial role in enhancing public safety while maintaining privacy. Axis Communications ensures that real-time AI analysis can detect unusual activities without capturing personally identifiable information. Our dynamic privacy masking solutions, such as AXIS Live Privacy Shield, allow us to mask faces and sensitive areas, protecting privacy while continuing surveillance. Additionally, radar technology helps monitor large areas without visual data, ensuring privacy is upheld. Axis prioritises privacy alongside security, ensuring our solutions are both effective and ethical.  What challenges do organisations face when integrating AI into their existing security infrastructure, and how can they overcome these hurdles?  Integrating AI into existing security infrastructure can be challenging due to issues like data management, system compatibility, and the need for significant resources. Organisations often face difficulties with integrating AI into legacy systems and ensuring data quality. At Axis, we address these challenges with scalable, open solutions that integrate seamlessly into existing setups. We also offer training programs to help organisations build the necessary skills. By prioritising cybersecurity and adopting adaptable solutions, businesses can successfully leverage AI to enhance security and improve operational efficiency.  How is the demand for AI-driven technologies in surveillance influencing global standards and regulatory frameworks, particularly in the Middle East?  The growing demand for AI-driven technologies in surveillance is shaping global standards and regulatory frameworks, particularly in the Middle East. Countries like the UAE and Saudi Arabia are focusing on AI in sectors such as law enforcement and smart cities, creating a push for stronger regulations. Axis Communications aligns its AI solutions with these evolving standards, ensuring compliance with privacy, security, and ethical guidelines. By doing so, Axis balances innovation with responsibility, helping customers in the region adopt AI-powered surveillance solutions while adhering to local laws and international regulations… To read the full interview, see our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Axis Communications: Emerging trends in the Middle East Read More »

BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud personality interview. What does ‘security’ mean to you?  Security, to me, is the assurance of implicit trust both in systems and in the people who operate them. It’s a balanced interplay between vigilance and resilience, a commitment to anticipate, withstand, and recover from challenges that threaten what is valuable. Security is not a fixed state but an evolving mindset, balancing proactive defences with adaptive responses. It is rooted in the principle of minimizing risk while maximizing trust, empowering individuals, organizations, and societies to pursue their goals without fear of compromise. At its core, security embodies both protection and empowerment, enabling freedom in an a potentially hostile environment.  If you could live anywhere in the world, where would it be?   I would honestly not pick a single country or geography. I have developed an appreciation for various places in the world based on culture, weather, food, and recreation. If I could live anywhere in the world, I would live in all of them and spend time in each. Of course, financially permitting.  If you could have dinner with any three people, past or present, who would it be?  I would choose three family members that have passed away, some before I was even born. This would include my father and grandparents.   Describe a funny thing that happened to you recently?   A funny thing that happened to me recently was more of a surprise. During my last vacation, I won a free cruise based on my participation in an event. I can be lucky at times, and this was truly unexpected. As I look back, I just have to laugh at how silly this really is and look forward to a free vacation later in the year.  What three traits define you?   The three traits that define me are sincerity, reliability and punctuality. I mean what I say, I do what I state, and I do almost anything I can to always be on time.  What’s the most important trend you see today?   The most important trend I see in the world today is change. We are welcoming a new generation into adulthood and based on global leadership, I see changes at a pace that is unprecedented compared to decades past. Everyone should expect change and as we enter the backhalf of the 2020s some of the changes may bluntly not be popular with people and specific geolocations. Just expect that things are changing and not everyone will be happy with many of the proposed and implemented changes.   If you didn’t work in security, what would you be doing?   I do enjoy building, crafting, and working with my hands. I could see myself doing everything from carpentry to automotive repair (ultra high end of course).  What’s the most interesting thing about you that we wouldn’t learn from your CV?   In 1990, I won the NCR Technology Innovation Award from the State University of New York for an invention I created called “eyephones”. It was a visor style device that connected to an audio source and would produce a multicolored light show, synchronized to music, for personal entertainment. It was inspired from going to see planetarium laser shows for Pink Floyd and Rush in the 1980’s on Long Island, New York. My award was a NCR 286 computer with a 20MB hard-disk. It was truly state of the art back then with Digital Research DOS.  What is one thing you would make compulsory in the office and one thing you would ban?   The one thing I would make compulsory in the office would be daily stand up meetings to bring teams into sync on the daily activities, news, and business challenges.  The one thing I would ban in the office – alcohol. I have seen to many offices attempt to become social hang outs for employees and I do not believe alcohol of any type should be served or available in an office environment.  What advice would you give your younger self?  I only have one simple piece of advice for my younger self: “Shut up and listen. You will be able to respond better when you have more information.”   Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Into the Cloud – Morey J. Haber, BeyondTrust Read More »

Samir Cherif

The Innovator – Samir Cherif

Samir Cherif, Senior Director MEA at HID, discusses sustainable solutions, mobile credentials, and emerging technologies shaping access control in the Middle East and Africa with Rebecca Spayne of Security Buyer. HID has a unique approach of working directly with end users and consultants. How does that benefit your research, development, and innovation efforts?  That’s a great question. HID’s DNA—and I’m including the larger group we belong to, ASSA ABLOY—emphasises upfront product specification with the end client. While we don’t sell directly to end users, we evangelise technology at the end-user level. Then, we collaborate with consultants to align ecosystem requirements with what clients want.  This proactive approach helps set the standards for access control products and trends. Ultimately, our channel partners close the business, but our efforts indirectly create demand by educating and aligning expectations. This approach also allows us to gather direct insights into end-user pain points, which feeds back into innovation. It’s a model that works because, as a global leader in access control, we have the resources to prioritise thought leadership over direct selling.  HID has made significant strides in sustainability, such as the bamboo key cards. How does sustainability fit into your manufacturing processes and corporate values?  At HID, sustainability isn’t just a compliance issue—it’s an integral part of our ethos. ASSA ABLOY has adopted ambitious ESG thresholds that actively drive our approach to sustainable development. For example, even when we use plastics, we choose materials with a lower carbon footprint, a practice we embraced even before sustainability gained momentum globally.  Sustainability is embedded across our operations—from manufacturing plants to the products we create. We also advocate for sustainability with our clients, emphasising eco-friendly practices throughout the value chain. Because our focus is on consultants and end clients, this message resonates well. Governments and organisations in this region are increasingly prioritising sustainability, and our efforts align with their goals.  Mobile access credentials are gaining traction worldwide. How does adoption in the Middle East and Africa compare to other regions?  The trend in the Middle East and Africa is similar to other regions, though the scale and pace differ. Markets like North America and Europe have a more significant uptake of mobile access due to their maturity and established ecosystems. The Middle East, while forward-looking, has deep-rooted practices that sometimes slow the transition to newer technologies.  That said, mobile access is growing rapidly here. Though starting from a smaller base, the adoption rate is doubling annually. Projections suggest mobile credentials could account for 20% of all credentials in five years. It’s not just about replacing physical cards but aligning with a broader strategic shift towards mobile solutions and related services.  Does the growing emphasis on user-friendly security influence technology adoption in the region?  Absolutely. There’s a global move towards seamless security, where users feel less like they’re navigating barriers and more at ease while still being protected. In regions like the UAE, there’s a balance between offering a flexible, welcoming environment and ensuring robust security.  For example, mobile credentials are ideal for events like the World Cup in Qatar or exhibitions in Dubai. They offer flexibility, user-friendliness, and enhanced security. While the technology makes processes smoother, the underlying security remains paramount. The shift towards mobile access is about offering a more intuitive experience without compromising safety.  Saudi Arabia is making significant strides in digitisation. How does HID align with these efforts?  Saudi Arabia is indeed at the forefront of digital transformation, particularly in areas like digital IDs for both citizens and visitors. The adoption of these technologies isn’t optional; it’s mandatory as part of their national vision. This aligns perfectly with HID’s capabilities in providing scalable, secure, and sustainable solutions.  As digital IDs become more prevalent, the region is setting benchmarks for how technology can be leveraged for both security and convenience. HID’s focus on mobile credentials and digital solutions positions us well to support these initiatives.  With the rise of digitisation, what challenges are you facing in the Middle East, particularly around cybersecurity?  Cybersecurity is one of the biggest concerns for security managers in this region. The convergence of physical and IT security presents complexities in integrating systems while maintaining robust safeguards. For instance, transferring secure elements from physical credentials to virtual IDs requires meticulous design to prevent vulnerabilities.  The good news is that mobile credentials, by nature, are more secure. Phones often have passwords or biometric locks, and HID incorporates multi-factor authentication into virtual IDs. Our secure identity elements make virtual credentials highly secure and tamper-proof. However, as we integrate more systems, the complexity of managing these integrations becomes a challenge.  Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The Innovator – Samir Cherif Read More »

Oil and Gas

Navigating Africa’s Oil & Gas Industry

A comprehensive analysis of security strategies in Africa’s oil and gas industry, covering physical, cyber, and remote surveillance measures for resilience. By Hannah Larvin, Features Editor of Security Buyer  Africa’s oil and gas industry plays a crucial role in the global energy market, with significant contributions to the continent’s economy. The sector supports millions of jobs, generates substantial revenue, and fuels economic growth across numerous African countries. Major oil-producing nations such as Nigeria, Angola, Algeria, and Libya have long been central to both regional and international energy supplies. However, the infrastructure and operations that support this industry face a unique and intricate set of security threats. The combination of physical, geopolitical, and digital challenges makes protecting this sector particularly complex.  Threats range from insurgencies and armed groups disrupting operations in oil-rich regions to piracy in the Gulf of Guinea—one of the world’s most dangerous maritime corridors for oil shipping. Additionally, the rise of sophisticated cyber-attacks targeting digital infrastructure and industrial control systems poses a significant risk, capable of causing operational paralysis and financial loss. Securing such a vital industry requires a multi-faceted approach that balances advanced technology, robust physical security measures, and strategic collaboration.  This feature explores the strategic measures taken to mitigate these risks. It examines how partnerships between governments, oil companies, and security providers are being forged to enhance resilience. Additionally, it highlights the deployment of cutting-edge surveillance systems, cybersecurity frameworks, and comprehensive risk management practices designed to protect assets, maintain operational integrity, and ensure the safety of personnel in a landscape fraught with potential threats.  Physical Security Challenges and Solutions    The physical security landscape in Africa’s oil and gas sector is marked by persistent and varied threats, with insurgencies, sabotage, and piracy being particularly prevalent in key regions such as Nigeria and Angola. Insurgent groups often target oil facilities with the intent of disrupting operations, extorting resources, or making political statements, leading to not only financial losses but also significant operational halts that can impact global energy markets. The threat of sabotage can range from deliberate damage to oil pipelines to attacks on drilling rigs and storage facilities. These acts not only pose risks to the facilities but also endanger the lives of workers and nearby communities.  Maritime piracy, especially in the Gulf of Guinea, remains a critical concern. This region is one of the world’s most dangerous maritime corridors for oil shipping, where pirates frequently target oil tankers, stealing valuable cargo and holding crew members for ransom. Such incidents disrupt supply chains, delay deliveries, and lead to increased insurance premiums and operational costs for companies.  To counter these complex challenges, companies are deploying a range of sophisticated physical security solutions. Surveillance systems equipped with intelligent video analytics have become essential for continuous monitoring of expansive facilities and surrounding areas. Manufacturers such as Hikvision and Avigilon provide advanced camera systems capable of real-time detection and alerting security teams to potential intrusions or suspicious activities. These surveillance systems are integrated with command centers to deliver comprehensive oversight, allowing security teams to coordinate rapid response efforts effectively.  In addition to surveillance, on-ground security measures are reinforced through armed patrols and fortified perimeters that act as deterrents to potential attackers. These are further supported by sensor technologies capable of detecting vibrations or movements that may signal tampering or unauthorised access. Integrated alarm systems, motion detectors, and seismic sensors provide real-time feedback, enhancing situational awareness and adding an extra layer of defense against potential breaches.  High-security lighting and perimeter barriers equipped with automated floodlights and acoustic sensors add another dimension of deterrence. These technologies can identify unusual noises, such as drilling or cutting, which may indicate sabotage attempts, allowing security teams to react promptly. This multi-layered approach to physical security helps maintain operational continuity and safeguard assets and personnel against both internal and external threats.  Remote On-Site Protection  Given the vast and often remote locations of oil fields and pipelines, traditional security measures alone are insufficient to ensure comprehensive protection. These sites are frequently located far from populated areas and support infrastructure, making them especially vulnerable to security breaches, theft, and sabotage. The logistical challenges of securing such widespread and isolated assets demand innovative approaches that go beyond conventional patrolling or fixed surveillance systems.  Drone surveillance has emerged as a pivotal component of on-site protection strategies, revolutionising how companies monitor their operations in remote regions. Unmanned aerial vehicles (UAVs) equipped with advanced technologies, such as Teledyne FLIR thermal imaging, provide enhanced visibility even in low-light or harsh environmental conditions. This capability allows drones to effectively patrol areas at night or during poor weather, identifying unauthorised activities and alerting security teams to potential breaches with minimal delay…. Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Navigating Africa’s Oil & Gas Industry Read More »

Firas Jadalla

The Innovator – Firas Jadalla

Firas Jadalla, Regional Director – Middle East and Africa, Genetec explores the changing landscape of the Middle East, and the growth of cloud technology  Please introduce yourself and give us a brief insight into Genetec.  I’m Firas Jadalla, Regional Director for the Middle East and Africa at Genetec, where I have contributed to our regional operations for nearly two decades across sales and operations. Currently, I focus on enhancing our presence in the dynamic MEA markets through tailored sales strategies, talent development, and strengthening our network of certified systems integrators, ensuring we lead in unified security technology.  Genetec enhances security and operational intelligence with cloud-based solutions across government, enterprise, and transport sectors. We serve our global customer base through a robust network of resellers, integrators, and certified partners in over 159 countries.  With the prioritisation of access control upgrades becoming a critical focus, what are the key challenges and opportunities for organisations in the Middle East?  As organisations in the Middle East prioritise access control upgrades, they face both challenges and significant opportunities. A key challenge is navigating outdated systems that often lack compatibility with modern security solutions, which can hinder a unified security posture. Managing these legacy systems becomes complex and costly, especially across multiple sites. Additionally, the region’s rapid growth in digital infrastructure requires adaptable, scalable systems to meet regulatory standards.  By adopting unified access control solutions, organisations can streamline operations, reduce manual processes, and enhance situational awareness. With a centralised platform, security teams gain real-time insights into access events, enabling faster responses. Genetec supports businesses by integrating systems that accommodate both cloud and on-premises environments, making it easier to secure remote workforces while scaling efficiently. Upgrading access control enables Middle Eastern organisations to future-proof security with technology that ensures both protection and flexibility.  As hybrid-cloud solutions gain traction, how is Genetec helping Middle Eastern businesses navigate the balance between on-premises and cloud-based security systems?  Genetec is committed to helping Middle Eastern businesses effectively navigate the balance between on-premises and cloud-based security solutions. We recognise that cloud migration isn’t a one-size-fits-all approach. For many of our customers, hybrid cloud solutions provide the flexibility to deploy functions in the cloud or on-premises, depending on operational needs and long-term goals. Our Genetec™ Security Center allows customers to integrate both environments seamlessly within a single, unified interface, so all cloud, and on-premises systems are accessible without any disruption to the user experience.  Our hybrid model supports businesses as they adopt the cloud at their own pace. For instance, Security Center’s latest enhancements, such as improved map and zoom features, allow operators to maintain situational awareness across large or multi-site deployments. Additionally, new authentication configuration tools simplify system setup, making it easier to scale and adapt as businesses grow. The continuous delivery model also means customers have immediate access to new features and cybersecurity updates, ensuring they stay current with the latest innovations.  How and what is technology contributing to the development of smart cities?  As smart city initiatives gain momentum, technology is becoming the backbone of sustainable and resilient urban environments. Central to this transformation is the ability to gather data from interconnected devices, including sensors, IoT devices, and surveillance systems, to enhance residents’ quality of life. The convergence of data analytics, cloud computing, and AI enables city officials to act on real-time information, making operations more responsive. Genetec’s open architecture solutions integrate security functions—video surveillance, access control, license plate recognition, and more—into a unified platform.  Our solutions support cities in improving traffic management, enhancing emergency response, and ensuring public safety. With the rise of intelligent buildings, energy efficiency and tenant satisfaction are prioritised, aligning with sustainability goals. Genetec aims to empower cities with adaptable, secure technology, supporting their evolution toward smarter, connected urban spaces…. Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The Innovator – Firas Jadalla Read More »

Riham Security website

Growing Intersec Saudi Arabia

Could you provide a brief introduction to yourself and an overview of Intersec Saudi Arabia?  I have been leading Intersec Saudi Arabia for the past three years since its relaunch in 2022. I have been with the brand for about five years now, working under Messe Frankfurt, the organisers of the event. Intersec Saudi Arabia is part of a global portfolio of security and fire safety exhibitions that address the growing demand for these sectors, particularly in the Kingdom of Saudi Arabia. I am proud to have been part of the journey of growth and development within this region.  Intersec Saudi Arabia has seen considerable growth since its inception in 2017. Could you share some of the key milestones in the development of the event and highlight the factors that contributed to its success?  The has grown significantly over the past few years. The sixth edition has just concluded. We first launched in 2017 in Jeddah, where it received substantial interest and support from the security, fire, and safety sectors. The event was first launched in 2017 in Jeddah, where it received substantial interest and support from the security, fire and safety sectors. From 2017 until 2019, the show ran successfully in Jeddah. However, we made a strategic decision in 2019 to relocate the event to Riyadh, the capital and the administrative hub of the Kingdom, where the government and many key stakeholders are based. Unfortunately, due to the COVID-19 pandemic, the show was postponed for two years, but this gave us an opportunity to recalibrate and enhance our efforts for the 2022 relaunch.  The relaunch in Riyadh exceeded our expectations in terms of both participation and growth. The Kingdom has entered a transformative phase with ambitious projects, particularly as part of Vision 2030. There is a growing focus on security, fire protection, and safety, which aligns well with the objectives of Intersec Saudi Arabia. The support we have received from the government, alongside international interest, has been a major contributor to the success we have witnessed.   The venue in Riyadh must certainly play a role in accommodating that growth?  Absolutely. The venue in Riyadh has been a significant asset to the show. However, with the event growing so quickly, we are now close to outgrowing the current space. This is a testament to the increased interest in security, fire protection, and safety within the Kingdom. The shift towards involving private companies, both local and international, has fostered a new era of collaboration. We are seeing a considerable amount of investment and innovation being introduced, and it is driving our expansion.    Read more in our latest issue here. Never miss a story… Follow us on: Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Growing Intersec Saudi Arabia Read More »

Intersec Saudi Arabia

What to Expect from Intersec Saudi Arabia

With the doors to Intersec Saudi Arabia 2024 set to open tomorrow, International Security Buyer is thrilled to announce the release of an exclusive video interview featuring Riham Sedik, Event Director of Intersec Saudi Arabia. In conversation with Rebecca Morpeth Spayne, Managing Editor of Security Buyer, Riham shares her expert insights into the event’s impressive history, growing significance, and future direction. As one of the Middle East’s premier security exhibitions, Intersec Saudi Arabia has established itself as a vital platform for industry professionals, government bodies, and security solution providers to connect and collaborate. During the interview, Riham discusses what attendees can expect from this year’s event, including: Innovative Security Solutions: Explore the latest advancements in cybersecurity, surveillance, fire protection, and safety technologies. Exclusive Networking Opportunities: Meet with key decision-makers, government officials, and leading experts in the security industry. Business Growth Opportunities: Showcase cutting-edge products and services to high-profile buyers and influential stakeholders. This year’s event is set to surpass previous editions in scale, with an exciting lineup of exhibitors, expert panels, and live demonstrations, offering unmatched opportunities for both learning and business development. Whether you’re attending to network, discover new technologies, or expand your business in the region, this interview provides a valuable preview of what’s to come. Watch the full interview here: What to Expect from Intersec Saudi Arabia – YouTube Stay tuned for more updates from the event, and don’t miss your chance to be part of this landmark security industry gathering.

What to Expect from Intersec Saudi Arabia Read More »

Middle East

Security Management and risk in the UAE

Rebecca Spayne, Managing Editor of Security Buyer looks at effective security management in commercial environments, comprehensive risk assessment and response strategies  Effective security management in commercial environments is crucial for safeguarding assets, ensuring employee and visitor safety, and maintaining operational continuity. This article provides a detailed examination of best practices in risk assessment and response strategies, emphasising the importance of an integrated approach. Additionally, it highlights specific security solutions from leading manufacturers that enhance these practices.  Comprehensive Threat Analysis  Understanding the potential threats to a commercial environment is the first step in effective security management. Threat analysis involves identifying both internal and external sources of potential security breaches. Internal threats can include employee theft, fraud, or misconduct, while external threats might involve burglary, vandalism, or cyber-attacks. Environmental hazards, such as natural disasters or accidental fires, must also be considered.  A thorough threat analysis requires a multi-faceted approach. This includes reviewing historical data on security incidents, consulting with security experts, and staying updated on emerging threats. According to a report by Mordor Intelligence, the Middle East commercial security market is projected to grow at a compound annual growth rate (CAGR) of 7.2% from 2023 to 2028. This growth is driven by increased investment in security technologies and infrastructure, highlighting the importance of a robust threat analysis in anticipating and mitigating these threats.  Regular Vulnerability Assessments  Conducting regular vulnerability assessments is essential for identifying weaknesses in the security infrastructure. These assessments should evaluate physical security measures, such as access control systems and surveillance equipment, as well as cybersecurity protocols.  Physical security assessments might involve checking the integrity of locks, gates, and barriers, ensuring that surveillance cameras are positioned correctly and functioning properly, and verifying that alarm systems are operational. Cybersecurity assessments should focus on identifying vulnerabilities in the network infrastructure, such as outdated software, weak passwords, and insufficient encryption. A survey by IBM found that the average cost of a data breach in the Middle East was $6.53 million in 2023, emphasising the critical need for regular vulnerability assessments to prevent such costly incidents.  Risk Prioritisation  Once threats and vulnerabilities have been identified, it is important to prioritise them based on their potential impact and likelihood of occurrence. This process involves assessing the severity of each threat, considering factors such as the potential for loss of life, financial impact, and damage to the organisation’s reputation.  By prioritising risks, security managers can allocate resources more effectively, focusing on the most significant threats. This approach ensures that critical vulnerabilities are addressed promptly, reducing the overall risk to the organisation. The 2023 Global Risk Report by the World Economic Forum highlights that cyberattacks on critical infrastructure and the potential for geopolitical instability are among the top risks faced by organisations today, underscoring the importance of risk prioritisation in security management.  Scenario Planning  Developing and simulating different threat scenarios is a key component of effective risk management. Scenario planning involves creating detailed plans for responding to various types of security incidents, from minor breaches to major emergencies.  Scenario planning should include both tabletop exercises and full-scale drills. Tabletop exercises involve discussing hypothetical scenarios in a controlled environment, allowing team members to explore different response options and identify potential weaknesses. Full-scale drills simulate real-world incidents, providing an opportunity to test the response plan under realistic conditions. The Federal Emergency Management Agency (FEMA) in the United States suggests that regular drills can improve response times by up to 40%, highlighting their effectiveness in preparing for actual incidents.  Incident Response Planning  A detailed incident response plan is essential for managing security incidents effectively. This plan should outline specific actions to be taken in the event of different types of security breaches, including communication protocols, roles and responsibilities, and recovery procedures.  The incident response plan should be based on the results of the threat analysis, vulnerability assessments, and scenario planning. It should include clear instructions for notifying relevant authorities, securing the affected area, and conducting a thorough investigation.  Communication is a critical component of incident response. The plan should include procedures for notifying employees, customers, and other stakeholders about the incident, as well as guidelines for interacting with the media. Clear and timely communication helps to maintain trust and minimise confusion during a security incident. According to a study by the Ponemon Institute, organisations with an effective incident response plan reduce the cost of a data breach by an average of $2 million…. Read more in our latest issue here. Never miss a story… Follow us on: Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Security Management and risk in the UAE Read More »

Cloudflare

Taking Back IT and Security Control – Connectivity Cloud

Bashar Bashaireh, Managing Director & Head of Middle East and Türkiye at Cloudflare explores taking back IT and Security Control. Historically IT operations and security teams focused mostly on managing their organization’s on-prem environment. But as business requirements changed, customer bases became global, and remote work took root, these technology teams were handed responsibility across more domains: cloud deployments, SaaS applications, and the public Internet. Individually, each domain has more than its fair share of complex management and security considerations. It’s no surprise that technology teams have less and less control as they try to combine these disparate domains into something like a single environment to meet business needs. Many organizations have proven to be adept at introducing new technologies, but not so focused on managing older technologies out of their environments. This greatly complicates crucial tasks like managing employee access, gaining full visibility into what they have in production, setting global security policies, and monitoring and improving network performance. And it’s hard to find an organization where such loss of control hasn’t become a problem. According to a recent Cloudflare survey conducted by Forrester Research, 99% of businesses say they require secure, performant, “any-to-any” connectivity more than ever before. New research shows the broader effects of this “control gap” on the business as a whole, through lost speed and productivity, increased risk, and greater costs. Speed and productivity – Loss of control slows organizations down. Technology teams spend more time testing and securing complex systems. Technical debt and convoluted infrastructure requirements pile up. Delivery dates for new applications are delayed, leading to an inability to reach new customers or markets before competitors do  — giving nimbler startups a chance to win the disruptive innovation game. Risk – Loss of control amplifies risk in the areas of cybersecurity, legal and policy compliance, and operational stability. Such risk may accumulate slowly, but the consequences often strike suddenly and publicly: devastating ransomware, stolen data offered for sale publicly, or paralyzing logistical slowdowns. Cost – Loss of control imposes a heavy opportunity cost: the inability of technology teams to focus on efforts that add value to the business. Cost is also driven by the need to hire more people — and buy more tools — to bring some measure of order to complex technology environments. The Connectivity Cloud: A New Way to Connect, Protect, and Accelerate Business Organizations won’t fix the control gap in their IT environment with isolated optimizations and more point products. A new approach is needed. They need a different type of cloud—one that delivers secure, performant, any-to-any connectivity. It has to integrate with all networks, give full programmability to support any use case, and deliver unified visibility and control across every domain IT is responsible for. This new cloud model is called a connectivity cloud. Through composable, programmable architecture, integration with all networks, built-in intelligence and innovations, and a unified interface, it gives organizations: Security, networking, and performance resources that scale effortlessly to meet any business need Seamless connectivity across every domain: on-premise networks, cloud deployments, SaaS apps, and public Internet More resources and people-hours to invest in strategic IT and security innovation More predictability when launching new products, services, and tech upgrades Better experiences for customers, fueling competitive advantage Better experiences for employees, resulting in better productivity, efficiency, and business agility The Anatomy of a Connectivity Cloud a connectivity cloud is a new type of cloud that connects everything and everyone in the IT environment, everywhere they are. But what it isn’t is just as important. Many cloud-based platforms offer security, networking, or developer services from the cloud. But without spanning all of those use cases, or easily connecting to every domain in the IT environment, such platforms merely represent another silo. The result is yet another tool to integrate, worse visibility, and more inconsistency in management — all common examples of loss of control. Read more in our latest issue here. Never miss a story… Follow us on: Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

Taking Back IT and Security Control – Connectivity Cloud Read More »

Scroll to Top