Middle east

Image provided by Veeam

AI and Ransomware: Cutting Through the Hype

Rick Vanover, Vice President Product Strategy, Veeam discusses how It might be the great paradox: Artificial Intelligence (AI). Everyone’s bored of hearing it, but can’t stop talking about it. It’s not going away so we had better get used to it. AI is disrupting most digital industries and cybercrime is no exception. However, cutting through the hype and getting to the facts is worth it. Much has been made of AI’s potential impact on the global ransomware threat, but how much does it really change the picture? AI-Cops and AI-Robbers While the future potential of AI, on cybercrime and society in general, is immense (and a little scary), it’s more helpful to focus on the here and now. Currently, AI is just another tool at threat actors’ disposal, but it is quite a significant one because it lowers the barrier to entry for criminals. Using AI to assist with coding is already common among legitimate programmers. Even if it’s just reviewing broken code or answering specific questions faster than Google, AI will support people hacking systems just as much as those developing them. But while this might make ransomware gangs’ lives easier, it won’t make things any worse for security teams. The result hasn’t changed; depending on who you ask, the end product might even be worse. However, the other current use cases are more consequential. AI algorithms can scan networks or environments to map architecture and endpoints and, crucially, spot vulnerabilities. Threat actors will already do this manually, but AI will make it much easier and more effective. AI can also be used to automate information gathering for more targeted attacks. These tools can scrap the internet (particularly social media) to collect as much information on a target as possible for phishing and social engineering. This brings us to the last typical use of AI by cybercriminals. In a conversation where the hype is aplenty, describing AI as ‘supporting phishing’ is probably underselling it. At its most basic, even the most readily available AI tools can be used to craft better phishing emails – bridging the language barrier that often makes such scams spottable. That’s another example of AI improving malicious activity that already exists, but the voice cloning (deepfakes) of specific people is another entirely different thing. When combined with automated information gathering on a target, we’re looking at the next generation of social engineering. What it means for security While cybercriminals having more tools at their disposal is never going to feel great, there are two things to bear in mind: one, security teams have access to these tools as well, and two, AI is going to make attacks more sophisticated and effective. For now, it isn’t introducing any brand-new or entirely novel threats, so there’s no need to tear up the playbook. AI is already used on both sides of the battle line. It’s probably fair to say that while ransomware gangs have access to their dark marketplaces of solutions and services, we ‘normies’ have access to far more. The ‘ransomware industry’ was valued at (a still massive) $14 billion as of 2022, but the global security industry makes this look tiny compared to its $222 billion. On the security side, AI can be used for behavioural analytics, threat detection and vulnerability scanning to detect malicious activities and risks. AI can be employed to monitor both the system itself (scanning for vulnerabilities and entry points) and activity on the system (behavioural analytics, data analysis, etc.). AI-enabled security aims to predict and catch threats before they turn into breaches. More advanced tools will automatically respond to these threats, alerting security teams or restricting access. Much like on the criminal side, most of these concepts exist now (such as firewalls and malware detectors), but AI is making them more efficient and effective. You can’t beat basic principles  So, even though AI will be used on both sides, it’s not a case of getting AIs to battle each other in the cyber realm (although that does sound cool.) Ransomware isn’t changing (for now, at least), and attackers’ tactics aren’t transforming. Digital hygiene and zero trust all still work. Security will need to keep up, sure. After all, social engineering only needs to work once, but ransomware prevention and resilience need to work every time. Ultimately, the best practice remains the best practice. As AI-enabled ransomware becomes more common, having copies of your data becomes more critical than ever. When all else fails – you need backup and recovery. All of these scary scenarios, even the most advanced phishing attack known to man (or machine), could all end up with – ‘thank god I had trusted backup and recovery’. As backup is your last line of defence; you must know you can rely on it. Again, the best practice hasn’t changed here. You need multiple copies of your data, one offline and one off-site. You also need a well-rehearsed recovery strategy, including scanning backups for infection and setting up a recovery environment that is ready to rock. It’s less daunting than it seems. AI isn’t changing the game – it’s just a natural progression. Progression is the game’s name in cybersecurity – you can’t do everything, but you should do something. The basic principles still get you pretty far, so keep following those, keep up to date on best practices, and make sure you can trust your backup when all else fails. To read more news and exclusives, see our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

AI and Ransomware: Cutting Through the Hype Read More »

Rasheed Alzahrani

Big Interview – Rasheed Alzahrani

Rasheed Alzahrani, Director of Safety and Security at King Salman Park Foundation, shares insights into innovative safety and security strategies, the integration of AI, and global collaborations within the Kingdom of Saudi Arabia  To begin, could you introduce yourself and provide some background on your role and experiences?  I am a civil engineer who landed in safety and security. My professional journey across various industries, such as energy and real estate, capitalises on the importance of safety and comprehensive security. I currently lead the safety and security at King Salman Park, which presents unique challenges and requirements.  While I’m proud of my previous roles, being part of King Salman Park Foundation is a highlight. King Salman Park might be perceived as another public park; however, it is a life-changing project, transforming the quality of life for Riyadh’s community. Being an urban hub for cultural, recreational, and community activities, safety and security are a top priority.  Our mission is to safeguard both visitors and assets while promoting collaboration and connectivity among stakeholders. Safety and security are about more than just implementing measures, they are about building trust. At the conference today, we discussed the importance of working together, especially during emergencies. Effective communication and resource utilisation are crucial. With rapidly advancing technology, such as 5G, artificial intelligence (AI), and machine learning, we must strike a balance between leveraging these tools and safeguarding private data.  How can safety and security leaders ensure effective communication and collaboration among diverse stakeholders, particularly in emergencies?  The key is to establish clear responsibilities for all entities involved. We must prioritise collaboration by hosting regular meetings to define these roles. Each stakeholder, whether public or private, must have a clear understanding of their position in our safety and security framework. By defining these roles early, we reduce confusion during crises.  We also integrate commercial collaboration documents and protocols, ensuring every facility and stakeholder understands their responsibilities. This preparation includes having agreements in place with emergency services, law enforcement, and private contractors, ensuring a seamless response when needed.  Additionally, we conduct regular drills and exercises to reinforce this collaboration. These exercises simulate real-life scenarios, allowing stakeholders to practise their responses and identify areas for improvement. Sharing knowledge and lessons learned from these drills helps us refine our strategies. Building strong relationships between public and private sectors fosters a unified approach to safety and security, ensuring we can respond efficiently and effectively in any situation.  Saudi Arabia is investing heavily in smart cities. How is safety and security integrated into these developments?  Saudi Arabia is making significant strides in developing smart cities, aligning with its Vision 2030 initiative to diversify the economy and embrace technological innovation. Saudi Arabia’s leaps in smart cities are driven by government efforts to foster digital transformation, which is primarily to attract tourism while emphasising sustainability and environmental responsibility. Green technologies and practices are incorporated to minimise ecological impact and promote sustainable urban living.  As part of this evolution, technology such as artificial intelligence and the Internet of Things (IoT) has been integrated into urban planning, ensuring that cities have the required infrastructure from the outset. Cybersecurity has also been considered to protect data and ensure privacy as part of innovative city initiatives. This includes using centralised cloud infrastructure for real-time data analytics and efficient information sharing among stakeholders.  This transformation reshaped the way safety and security operate, where systems are designed to ensure people feel safe at all times, which is fundamental for fostering trust and confidence. For instance, if someone loses their wallet at the airport, our connected systems can locate and return it within hours. This level of efficiency is possible because of the technology we’ve implemented. Systems are interconnected, allowing us to track and respond quickly to incidents. These systems address immediate concerns and create a sense of security that encourages tourism and investment.  AI is a significant trend in safety and security. How is it being utilised, and what challenges do you foresee?  AI has completely transformed safety and security as an enabler tool. Both government and private security and safety entities benefit from the predictive features, which can prevent potential risks or hazards. Machine learning also plays a key role by helping us allocate resources efficiently. For example, data collected from AI systems can guide decisions on where to deploy security personnel or install additional surveillance systems.   Although AI brings efficiency and better measures, the technology will also create new challenges, such as addressing cultural and geographical factors, data privacy, and ethical considerations. As Saudi Arabia stepped into the data management and AI business, The Saudi Data & AI Authority (SDAIA) has made tremendous efforts to govern and oversee its use.  The European Union has implemented legislation like the EU AI Act to regulate AI use. Do you anticipate similar regulations coming to fruition in other regions?  Absolutely. Without rules, the risks of AI misuse or unethical practices could outweigh its benefits. Saudi Arabia’s Vision 2030 initiative strongly emphasises AI, aiming to position the Kingdom as a leader in AI innovation and regulation. This vision includes significant investments in AI research and development and the establishment of regulatory frameworks to ensure the ethical use of AI technologies.  Saudi Arabia has adopted a risk-based approach in addressing AI applications and is making significant progress in regulating AI, ensuring its deployment is safe, ethical, and aligned with global standards. The Kingdom  has also participated in global discussions and collaborations, such as the Bletchley Declaration, which brings together countries to address AI governance and ethical considerations.  How does cybersecurity complement physical security?  Integrating technology into our daily activities has expanded our parameters to consider cybersecurity. Physical security systems like surveillance cameras and access control are linked to digital networks, underscoring the critical need for robust cybersecurity, as any vulnerabilities in cyberspace can potentially compromise physical security operations.  At King Salman Park Foundation, we emphasise convergent security, integrating cybersecurity measures with physical security for a comprehensive approach. This holistic approach safeguards tangible

Big Interview – Rasheed Alzahrani Read More »

Copyright: Security Buyer

AmiViz Partners with Titania

AmiViz announced a strategic distribution agreement with Titania. This collaboration underscores a shared commitment to enhancing network security and the operational resilience of enterprises across the region. With cyber threats growing in scale and sophistication, organisations are under increasing pressure to ensure their networks are secure, compliant, and optimised. Titania’s solutions, including its flagship product, Nipper Enterprise, provide near-real-time visibility and analysis of all network configuration changes to detect exposure to the tactics, techniques and procedures (TTPs) used by even advanced threats such as Volt and Salt Typhoon. By automating posture reporting and identifying potential indicators of compromise, it helps streamline organisations’ incident responses and improves security outcomes. The agreement enables AmiViz to bring Titania’s innovative solutions to its extensive partner ecosystem, catering to critical industries such as finance, healthcare, energy, and government. AmiViz offers resellers and system integrators seamless access to Titania’s advanced solutions, along with value-added services like training, technical support, and pre-sales assistance through its vast network of channel partners. This partnership is poised to address a growing demand in the Middle East and Africa for proactive cybersecurity measures. Titania’s precise and automated network risk management capabilities align with the region’s focus on digital transformation, where secure and resilient networks are essential to success. By leveraging AmiViz’s deep market expertise and established distribution network, Titania’s solutions are set to reach a wide range of customers looking to enhance proactive network security. Commenting on the partnership, Ilyas Mohammed, AmiViz’s Chief Operating Officer, said, “We are excited to partner with Titania, whose innovative approach to proactive configuration security addresses a critical need in today’s cybersecurity landscape. Together, we aim to equip enterprises across the Middle East and Africa with the tools they need to safeguard their networks and ensure operational resilience.” Titania CEO, Victoria Dimmick, added, “Titania’s mission to enable organisations to protect their critical network infrastructure and remain operationally ready, resilient, and recoverable, is one we are advancing through partnerships. AmiViz’s strong presence and expertise in the Middle East and Africa will be instrumental in supporting organisations in the region to enhance network security.” This agreement strengthens AmiViz’s portfolio of advanced cybersecurity offerings and reinforces Titania’s position as a trusted partner in network security innovation worldwide. To read more articles and news, see our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

AmiViz Partners with Titania Read More »

Malik Alyousef, Co-founder & COO, Mozn

Mozn Unveils a New Generation of AI Fraud Prevention

FOCAL by Mozn strengthens its Fraud Prevention Suite with Device Fingerprinting, Fraud Analytics, and Fraud Management as a Service, delivering real-time detection, proactive risk mitigation, and seamless security. Mozn, a regional leader in enterprise AI technologies, announced the launch of new products to its flagship AI-powered Risk and Compliance platform, FOCAL, at LEAP 2025, Saudi Arabia’s renowned technology conference. FOCAL has strengthened its End-to-End Fraud Prevention Suite to provide businesses with enhanced fraud detection, risk management, and security. Expanding beyond its Device Risk product which utilizes AI-driven analysis of behavioral anomalies, geographic signals, and historical patterns, FOCAL now offers a more comprehensive approach to fraud prevention and management. The FOCAL Fraud Prevention Suite now includes Device Fingerprinting, Fraud Analytics, and Fraud Management as a Service. Device Fingerprinting enables businesses to create unique, persistent identifiers for devices; Fraud Analytics leverages AI and data science and provides businesses with an easy-to-integrate Fraud Analytics solution that consolidates key insights, enabling easier investigation of sophisticated fraud patterns; and Fraud Management as a Service (FMaaS) offering managed service by top data scientists and industry experts for fraud intelligence and decision-making. FOCAL is now one of the first companies in the region to build an AI-enabled, locally developed solution with global expertise to solve regional challenges in fraud prevention and management across industries like BFSI, fintech, e-commerce, telecom, and government services. Trusted by major financial institutions and businesses in the region, FOCAL Fraud Prevention Suite has made a remarkable impact, including reducing fraud by 80% for one of the leading financial service providers in the region. “At Mozn, we are committed to setting new standards in AI-powered financial crime and fraud prevention, ensuring businesses stay ahead of ever-evolving fraud tactics,” said Malik Alyousef, Co-founder and COO, Mozn. ” 73% of businesses now consider device fingerprinting a critical component of fraud prevention, highlighting the need for advanced AI-driven solutions to stay protected. We understand the region’s unique challenges, and the expansion of FOCAL’s Fraud Prevention Suite reflects our dedication to exceeding customer expectations and protecting the financial ecosystem with cutting-edge AI-powered solutions.” FOCAL has solidified its position as a leading AI-powered end-to-end fraud prevention and AML compliance platform, experiencing remarkable growth and earning global recognition. It was recently named among CNBC’s Top 250 Global Fintech Companies in 2024 as well as recognized by CHARTIS Research as a Category Leader for KYC solutions and featured in the Risk Tech AI 50 ranking. These prestigious accolades highlight FOCAL’s cutting-edge innovation, market leadership, and unwavering commitment to delivering world-class fraud prevention and compliance solutions, reinforcing its reputation as a trusted partner in safeguarding the financial ecosystem. To read more exclusives or news, see our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

Mozn Unveils a New Generation of AI Fraud Prevention Read More »

Ettiene van der Watt - Regional Director - MEA, Axis Communications

Axis Communications: Emerging trends in the Middle East

Ettiene Van Der Watt, Regional Director, Middle East & Africa at Axis Communications spoke with International Security Buyer at Intersec 2025 in Dubai  What role do you see artificial intelligence playing in the evolution of security and surveillance technologies, particularly in environments like the Middle East?  Artificial intelligence is playing a critical role in the evolution of security and surveillance technologies, especially in the Middle East, where rapid urbanisation and smart city initiatives are reshaping the security landscape. At Axis Communications, we recognise the importance of AI in not just enhancing security but also in enabling smarter, more efficient operations and enhancing business intelligence. By integrating edge-based AI analytics into our solutions, we enable real-time video analysis directly at the camera, making it possible to detect threats and take action faster. In the Middle East, with its diverse security challenges, AI is crucial in providing proactive and automated solutions that adapt to local needs, improving safety and optimising operations.    How can AI-driven video analytics address the unique challenges faced by businesses and governments?  AI-driven video analytics plays a pivotal role in tackling the unique challenges faced by businesses and governments, particularly in the Middle East. In environments that are rapidly evolving with urban growth and increasing security demands, AI can automate the detection of potential threats in real-time, providing faster response times and more efficient monitoring. For businesses, AI enables proactive security measures, improving asset protection and operational efficiency. For governments, AI is essential in managing public safety, traffic monitoring, and crowd control in densely populated areas. By leveraging AI-powered analytics, both sectors can anticipate issues before they arise, improving safety, reducing risks, and enabling smarter decision-making.    What emerging trends in surveillance took centre stage at Intersec?  At Intersec Dubai, emerging trends in surveillance highlighted the power of AI and edge computing in transforming the security landscape. Real-time, edge-based video analytics were at the forefront, enabling faster, more efficient decision-making without relying on centralised systems. AI-powered solutions like object recognition and anomaly detection gained significant attention, providing more proactive and automated security responses. We also saw a growing focus on cybersecurity, with an emphasis on secure data handling and integration with smart city technologies. Sustainability was another key theme, with solutions designed to be more energy-efficient and aligned with global green technology goals.    In rapidly growing urban areas, what are the key technological advancements in video analytics that can enhance public safety while maintaining privacy?  In rapidly growing urban areas, technological advancements like AI-powered edge analytics and thermal imaging play a crucial role in enhancing public safety while maintaining privacy. Axis Communications ensures that real-time AI analysis can detect unusual activities without capturing personally identifiable information. Our dynamic privacy masking solutions, such as AXIS Live Privacy Shield, allow us to mask faces and sensitive areas, protecting privacy while continuing surveillance. Additionally, radar technology helps monitor large areas without visual data, ensuring privacy is upheld. Axis prioritises privacy alongside security, ensuring our solutions are both effective and ethical.  What challenges do organisations face when integrating AI into their existing security infrastructure, and how can they overcome these hurdles?  Integrating AI into existing security infrastructure can be challenging due to issues like data management, system compatibility, and the need for significant resources. Organisations often face difficulties with integrating AI into legacy systems and ensuring data quality. At Axis, we address these challenges with scalable, open solutions that integrate seamlessly into existing setups. We also offer training programs to help organisations build the necessary skills. By prioritising cybersecurity and adopting adaptable solutions, businesses can successfully leverage AI to enhance security and improve operational efficiency.  How is the demand for AI-driven technologies in surveillance influencing global standards and regulatory frameworks, particularly in the Middle East?  The growing demand for AI-driven technologies in surveillance is shaping global standards and regulatory frameworks, particularly in the Middle East. Countries like the UAE and Saudi Arabia are focusing on AI in sectors such as law enforcement and smart cities, creating a push for stronger regulations. Axis Communications aligns its AI solutions with these evolving standards, ensuring compliance with privacy, security, and ethical guidelines. By doing so, Axis balances innovation with responsibility, helping customers in the region adopt AI-powered surveillance solutions while adhering to local laws and international regulations… To read the full interview, see our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

Axis Communications: Emerging trends in the Middle East Read More »

Gallagher Security

Gallagher Security marks partnership with Moro Hub at Intersec

Award-winning global security manufacturer, Gallagher Security is proud to announce its partnership with Moro Hub, a subsidiary of Digital DEWA, the digital arm of Dubai Electricity and Water Authority at Intersec Dubai 2025. The strategic partnership marks a significant step forward in redefining physical security solutions for government and enterprise clients in the UAE and beyond. Gallagher Security CEO – Middle East, Bilal Chehime says, “By integrating Gallagher’s cutting-edge security technologies with Moro Hub’s expertise in digital transformation, we are committed to delivering customized and robust solutions that enhance operational safety and efficiency across various sectors. “ He adds, “Our partnership with Moro Hub represents a significant step forward in advancing physical security within the UAE’s growing smart city landscape. Together, we aim to create transformative solutions that cater to the evolving needs of secure, intelligent systems in the region.” “We are thrilled to partner with Gallagher. This collaboration reflects our dedication to delivering innovative, comprehensive solutions that empower government entities and enterprises to thrive in a secure digital ecosystem, says Mohammed Bin Sulaiman, CEO of Moro Hub. Combining Gallagher’s advanced physical security capabilities with Moro Hub’s expertise in IoT and smart city solutions will enable intelligent systems designed to tackle key challenges in access control, perimeter protection, and system integration. These innovations align with the UAE’s vision of creating secure, sustainable, and technologically advanced urban environments. Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

Gallagher Security marks partnership with Moro Hub at Intersec Read More »

Samir Cherif

The Innovator – Samir Cherif

Samir Cherif, Senior Director MEA at HID, discusses sustainable solutions, mobile credentials, and emerging technologies shaping access control in the Middle East and Africa with Rebecca Spayne of Security Buyer. HID has a unique approach of working directly with end users and consultants. How does that benefit your research, development, and innovation efforts?  That’s a great question. HID’s DNA—and I’m including the larger group we belong to, ASSA ABLOY—emphasises upfront product specification with the end client. While we don’t sell directly to end users, we evangelise technology at the end-user level. Then, we collaborate with consultants to align ecosystem requirements with what clients want.  This proactive approach helps set the standards for access control products and trends. Ultimately, our channel partners close the business, but our efforts indirectly create demand by educating and aligning expectations. This approach also allows us to gather direct insights into end-user pain points, which feeds back into innovation. It’s a model that works because, as a global leader in access control, we have the resources to prioritise thought leadership over direct selling.  HID has made significant strides in sustainability, such as the bamboo key cards. How does sustainability fit into your manufacturing processes and corporate values?  At HID, sustainability isn’t just a compliance issue—it’s an integral part of our ethos. ASSA ABLOY has adopted ambitious ESG thresholds that actively drive our approach to sustainable development. For example, even when we use plastics, we choose materials with a lower carbon footprint, a practice we embraced even before sustainability gained momentum globally.  Sustainability is embedded across our operations—from manufacturing plants to the products we create. We also advocate for sustainability with our clients, emphasising eco-friendly practices throughout the value chain. Because our focus is on consultants and end clients, this message resonates well. Governments and organisations in this region are increasingly prioritising sustainability, and our efforts align with their goals.  Mobile access credentials are gaining traction worldwide. How does adoption in the Middle East and Africa compare to other regions?  The trend in the Middle East and Africa is similar to other regions, though the scale and pace differ. Markets like North America and Europe have a more significant uptake of mobile access due to their maturity and established ecosystems. The Middle East, while forward-looking, has deep-rooted practices that sometimes slow the transition to newer technologies.  That said, mobile access is growing rapidly here. Though starting from a smaller base, the adoption rate is doubling annually. Projections suggest mobile credentials could account for 20% of all credentials in five years. It’s not just about replacing physical cards but aligning with a broader strategic shift towards mobile solutions and related services.  Does the growing emphasis on user-friendly security influence technology adoption in the region?  Absolutely. There’s a global move towards seamless security, where users feel less like they’re navigating barriers and more at ease while still being protected. In regions like the UAE, there’s a balance between offering a flexible, welcoming environment and ensuring robust security.  For example, mobile credentials are ideal for events like the World Cup in Qatar or exhibitions in Dubai. They offer flexibility, user-friendliness, and enhanced security. While the technology makes processes smoother, the underlying security remains paramount. The shift towards mobile access is about offering a more intuitive experience without compromising safety.  Saudi Arabia is making significant strides in digitisation. How does HID align with these efforts?  Saudi Arabia is indeed at the forefront of digital transformation, particularly in areas like digital IDs for both citizens and visitors. The adoption of these technologies isn’t optional; it’s mandatory as part of their national vision. This aligns perfectly with HID’s capabilities in providing scalable, secure, and sustainable solutions.  As digital IDs become more prevalent, the region is setting benchmarks for how technology can be leveraged for both security and convenience. HID’s focus on mobile credentials and digital solutions positions us well to support these initiatives.  With the rise of digitisation, what challenges are you facing in the Middle East, particularly around cybersecurity?  Cybersecurity is one of the biggest concerns for security managers in this region. The convergence of physical and IT security presents complexities in integrating systems while maintaining robust safeguards. For instance, transferring secure elements from physical credentials to virtual IDs requires meticulous design to prevent vulnerabilities.  The good news is that mobile credentials, by nature, are more secure. Phones often have passwords or biometric locks, and HID incorporates multi-factor authentication into virtual IDs. Our secure identity elements make virtual credentials highly secure and tamper-proof. However, as we integrate more systems, the complexity of managing these integrations becomes a challenge.  Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: LinkedIn: Security Buyer Twitter (X): @SecurityBuyer Facebook: @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

The Innovator – Samir Cherif Read More »

Oil and Gas

Navigating Africa’s Oil & Gas Industry

A comprehensive analysis of security strategies in Africa’s oil and gas industry, covering physical, cyber, and remote surveillance measures for resilience. By Hannah Larvin, Features Editor of Security Buyer  Africa’s oil and gas industry plays a crucial role in the global energy market, with significant contributions to the continent’s economy. The sector supports millions of jobs, generates substantial revenue, and fuels economic growth across numerous African countries. Major oil-producing nations such as Nigeria, Angola, Algeria, and Libya have long been central to both regional and international energy supplies. However, the infrastructure and operations that support this industry face a unique and intricate set of security threats. The combination of physical, geopolitical, and digital challenges makes protecting this sector particularly complex.  Threats range from insurgencies and armed groups disrupting operations in oil-rich regions to piracy in the Gulf of Guinea—one of the world’s most dangerous maritime corridors for oil shipping. Additionally, the rise of sophisticated cyber-attacks targeting digital infrastructure and industrial control systems poses a significant risk, capable of causing operational paralysis and financial loss. Securing such a vital industry requires a multi-faceted approach that balances advanced technology, robust physical security measures, and strategic collaboration.  This feature explores the strategic measures taken to mitigate these risks. It examines how partnerships between governments, oil companies, and security providers are being forged to enhance resilience. Additionally, it highlights the deployment of cutting-edge surveillance systems, cybersecurity frameworks, and comprehensive risk management practices designed to protect assets, maintain operational integrity, and ensure the safety of personnel in a landscape fraught with potential threats.  Physical Security Challenges and Solutions    The physical security landscape in Africa’s oil and gas sector is marked by persistent and varied threats, with insurgencies, sabotage, and piracy being particularly prevalent in key regions such as Nigeria and Angola. Insurgent groups often target oil facilities with the intent of disrupting operations, extorting resources, or making political statements, leading to not only financial losses but also significant operational halts that can impact global energy markets. The threat of sabotage can range from deliberate damage to oil pipelines to attacks on drilling rigs and storage facilities. These acts not only pose risks to the facilities but also endanger the lives of workers and nearby communities.  Maritime piracy, especially in the Gulf of Guinea, remains a critical concern. This region is one of the world’s most dangerous maritime corridors for oil shipping, where pirates frequently target oil tankers, stealing valuable cargo and holding crew members for ransom. Such incidents disrupt supply chains, delay deliveries, and lead to increased insurance premiums and operational costs for companies.  To counter these complex challenges, companies are deploying a range of sophisticated physical security solutions. Surveillance systems equipped with intelligent video analytics have become essential for continuous monitoring of expansive facilities and surrounding areas. Manufacturers such as Hikvision and Avigilon provide advanced camera systems capable of real-time detection and alerting security teams to potential intrusions or suspicious activities. These surveillance systems are integrated with command centers to deliver comprehensive oversight, allowing security teams to coordinate rapid response efforts effectively.  In addition to surveillance, on-ground security measures are reinforced through armed patrols and fortified perimeters that act as deterrents to potential attackers. These are further supported by sensor technologies capable of detecting vibrations or movements that may signal tampering or unauthorised access. Integrated alarm systems, motion detectors, and seismic sensors provide real-time feedback, enhancing situational awareness and adding an extra layer of defense against potential breaches.  High-security lighting and perimeter barriers equipped with automated floodlights and acoustic sensors add another dimension of deterrence. These technologies can identify unusual noises, such as drilling or cutting, which may indicate sabotage attempts, allowing security teams to react promptly. This multi-layered approach to physical security helps maintain operational continuity and safeguard assets and personnel against both internal and external threats.  Remote On-Site Protection  Given the vast and often remote locations of oil fields and pipelines, traditional security measures alone are insufficient to ensure comprehensive protection. These sites are frequently located far from populated areas and support infrastructure, making them especially vulnerable to security breaches, theft, and sabotage. The logistical challenges of securing such widespread and isolated assets demand innovative approaches that go beyond conventional patrolling or fixed surveillance systems.  Drone surveillance has emerged as a pivotal component of on-site protection strategies, revolutionising how companies monitor their operations in remote regions. Unmanned aerial vehicles (UAVs) equipped with advanced technologies, such as Teledyne FLIR thermal imaging, provide enhanced visibility even in low-light or harsh environmental conditions. This capability allows drones to effectively patrol areas at night or during poor weather, identifying unauthorised activities and alerting security teams to potential breaches with minimal delay…. Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

Navigating Africa’s Oil & Gas Industry Read More »

Firas Jadalla

The Innovator – Firas Jadalla

Firas Jadalla, Regional Director – Middle East and Africa, Genetec explores the changing landscape of the Middle East, and the growth of cloud technology  Please introduce yourself and give us a brief insight into Genetec.  I’m Firas Jadalla, Regional Director for the Middle East and Africa at Genetec, where I have contributed to our regional operations for nearly two decades across sales and operations. Currently, I focus on enhancing our presence in the dynamic MEA markets through tailored sales strategies, talent development, and strengthening our network of certified systems integrators, ensuring we lead in unified security technology.  Genetec enhances security and operational intelligence with cloud-based solutions across government, enterprise, and transport sectors. We serve our global customer base through a robust network of resellers, integrators, and certified partners in over 159 countries.  With the prioritisation of access control upgrades becoming a critical focus, what are the key challenges and opportunities for organisations in the Middle East?  As organisations in the Middle East prioritise access control upgrades, they face both challenges and significant opportunities. A key challenge is navigating outdated systems that often lack compatibility with modern security solutions, which can hinder a unified security posture. Managing these legacy systems becomes complex and costly, especially across multiple sites. Additionally, the region’s rapid growth in digital infrastructure requires adaptable, scalable systems to meet regulatory standards.  By adopting unified access control solutions, organisations can streamline operations, reduce manual processes, and enhance situational awareness. With a centralised platform, security teams gain real-time insights into access events, enabling faster responses. Genetec supports businesses by integrating systems that accommodate both cloud and on-premises environments, making it easier to secure remote workforces while scaling efficiently. Upgrading access control enables Middle Eastern organisations to future-proof security with technology that ensures both protection and flexibility.  As hybrid-cloud solutions gain traction, how is Genetec helping Middle Eastern businesses navigate the balance between on-premises and cloud-based security systems?  Genetec is committed to helping Middle Eastern businesses effectively navigate the balance between on-premises and cloud-based security solutions. We recognise that cloud migration isn’t a one-size-fits-all approach. For many of our customers, hybrid cloud solutions provide the flexibility to deploy functions in the cloud or on-premises, depending on operational needs and long-term goals. Our Genetec™ Security Center allows customers to integrate both environments seamlessly within a single, unified interface, so all cloud, and on-premises systems are accessible without any disruption to the user experience.  Our hybrid model supports businesses as they adopt the cloud at their own pace. For instance, Security Center’s latest enhancements, such as improved map and zoom features, allow operators to maintain situational awareness across large or multi-site deployments. Additionally, new authentication configuration tools simplify system setup, making it easier to scale and adapt as businesses grow. The continuous delivery model also means customers have immediate access to new features and cybersecurity updates, ensuring they stay current with the latest innovations.  How and what is technology contributing to the development of smart cities?  As smart city initiatives gain momentum, technology is becoming the backbone of sustainable and resilient urban environments. Central to this transformation is the ability to gather data from interconnected devices, including sensors, IoT devices, and surveillance systems, to enhance residents’ quality of life. The convergence of data analytics, cloud computing, and AI enables city officials to act on real-time information, making operations more responsive. Genetec’s open architecture solutions integrate security functions—video surveillance, access control, license plate recognition, and more—into a unified platform.  Our solutions support cities in improving traffic management, enhancing emergency response, and ensuring public safety. With the rise of intelligent buildings, energy efficiency and tenant satisfaction are prioritised, aligning with sustainability goals. Genetec aims to empower cities with adaptable, secure technology, supporting their evolution toward smarter, connected urban spaces…. Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

The Innovator – Firas Jadalla Read More »

Milestone systems

Milestone Systems Sets New Pace

At Intersec 2025, the Middle East’s flagship security and safety event, Milestone Systems made a resounding statement about the future of data-driven video surveillance and analytics. The Danish video management software (VMS) leader showcased its latest innovations, highlighting the transformative role of artificial intelligence (AI) in redefining safety and operational efficiency across industries. A Growing Regional Footprint According to the independent, global analyst company Omdia, Milestone Systems is estimated to be the largest supplier of video management software in the Middle East and Europe. The Middle East, a region investing heavily in smart cities and large-scale infrastructure, has proven fertile ground for Milestone’s ambitious growth. The company has consistently outpaced the average growth rate of 8-9% in the VMS sector, driven by heightened demand for robust and intelligent surveillance solutions. “We are proud to participate for the 15th time in Intersec 2025, as a security leader in the transformation of the Middle East towards smart cities.” said Louise Bou Rached, Regional Director of META at Milestone Systems “Our strategy is to strengthen partnerships with integrators, resellers, and end-users to drive growth and innovation and simultaneously expand our presence in the MENA region.” Milestone’s plans include strategically bolstering its UAE operations and Saudi Arabia’s rapidly growing market, where smart city initiatives like NEOM signal tremendous potential. Tech for Tomorrow’s Challenges Central to Milestone’s presence at Intersec was the flagship product, XProtect Video Management Software, and the AI-driven BriefCam Video Analytics platform. Milestone underscored the value of collaboration, announcing seamless integrations with eight leading technology partners, including Conexao Technology and CIAS. These partnerships highlight the open-platform flexibility of XProtect, a key differentiator in a crowded market. Together, these technologies demonstrated the power of converting video into actionable data insights, from monitoring bustling airports to streamlining operations and enhancing public safety supporting diverse industries from retail, hospitality, and healthcare to public safety and government infrastructure. The company’s emphasis on AI-driven analytics reflects the growing demand for smarter surveillance tools that go beyond recording footage. BriefCam’s capabilities, for instance, allow organizations to analyze hours of video in minutes, enabling everything from faster emergency response and forensics to operational cost savings. MENA’s Next Big Play Milestone’s reputation has been bolstered by its role in securing major events like the FIFA World Cup, which showcased its ability to handle complex, high-stakes environments. Now, the company is turning its focus to the Middle East’s booming hospitality and aviation sectors, two pillars of the region’s economic diversification efforts. “The demand for hybrid and cloud-based VMS solutions is surging as governments and businesses prioritize digital transformation,” Bou Rached noted. “Our technology is designed to meet these evolving needs, ensuring the safety of public spaces while enabling smarter business operations.” A Future Shaped by Innovation As the Middle East accelerates its journey toward smart cities, Milestone Systems is positioning itself as a cornerstone of this transformation. By combining advanced AI, strategic partnerships, and an expanding regional presence, the company is helping shape a safer, more connected future for cities, businesses, and communities alike. At Intersec 2025, the message from Milestone Systems was clear -innovation in video analytics isn’t just about surveillance, it’s about empowering industries, enhancing public safety, and building smarter cities for generations to come. Read more exclusives and news in our latest issue here. Never miss a story… Follow us on: Security Buyer  @SecurityBuyer  @Secbuyer Media Contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: [email protected]

Milestone Systems Sets New Pace Read More »

Scroll to Top