Selected-Features

As industries worldwide increasingly rely on wearable technology to monitor workers' well-being and enhance safety protocols, the nexus between heat safety, data security and privacy emerges as a critical consideration. In the sweltering heat of the Middle East, where scorching temperatures pose significant challenges, the fusion...

MVP Tech, a Convergint company, explores how healthcare organizations can benefit by integrating biometric access control into their security infrastructures. Security attacks on medical facilities have become increasingly common, making robust access control measures crucial for healthcare organizations. By implementing tailored access control solutions based on the...

Integrated Design Limited (IDL) was tasked with improving secure access control for an energy supplier in Qatar across 10 interconnected high-rise towers. Company Overview A prominent energy supplier in Qatar was looking to enhance its security across 10 office buildings located in the central business district in...

Ryad Soobhany, Associate Professor of Mathematical and Computer Sciences, Heriot-Watt University Dubai, unravels the use of camera technology in Middle East urban planning to enhance security. In the ever-changing landscape of the Middle East, where rapid urbanisation meets technological advancement, the integration of camera technology is...

John Hathaway, Regional Vice President, iMETA at BeyondTrust, says the path to cyber resilience is paved by privileged access management. IBM’s 2023 edition of its Cost of a Data Breach report puts the Middle East’s average data breach cost at US$8 million, which is almost double...

Passwordless implementation has long been heralded as the future, but are we ready, asks Mortada Ayad, Director, Sales Engineering at Delinea. We often hear about the increasing appetite for a passwordless future and while this mostly is in the context of consumers, the reasons for organisations...

Dan Norman takes us through the ISF’s last two-year forecast – made in 2022 – to determine how accurate they were, and the measures organisations may need to take. Every year the ISF provides a detailed, scenario-based, two-year threat forecast to its member organisations – a...

The future of technological advancements in the security landscape is a topic which most are interested in. However, it is always best to ask an expert. Vice President of Industrial Security Operations at Saudi Aramco, Sami Alajmi, reflects on his career and the state of...

Rudie Opperman, Engineering and Training Manager EMEA at Axis Communications explores how thermal imaging technology is being used to protect electrical substations. Like any critical infrastructure, electrical substations face several risks. These include intruders, vandals, hazardous weather conditions, and peak energy demand periods. On top of...

As cyber threats becomes an epicentre of GCC business risk, James Gerber, CFO of SimSpace, details the preventative measures large organisations should be taking to ensure bottom-line growth in 2024. In early 2023, the GCC Executive Committee for Cybersecurity held its first meeting, marking a political...

When it comes to protecting critical infrastructure, biometric technology is the route to go, says Shiraz Kapadia, CEO and President of Invixium. Strategies for safeguarding critical infrastructure at a national level are a fundamental necessity for the governments of countries everywhere placing significant importance on securing...

Data is central to corporate daily operations, and leaders must be knowledgeable in the intricacies of data privacy and protection. As the digital landscape continues to evolve, it is transforming the way organizations, industries, societies, and individuals operate and interact with each other. In the first part...

Matrix Security Solutions was able to assist a cash management solutions company in Riyadh in overhauling its systems for more efficient operations. Company Overview A cash management solutions company based in Riyadh, that provides customised cash solutions to banks, CITS and corporates. The company manages end-to-end receivables...

Matthew Hunt, Head of Sales (Land Communications), Thales UK, looks at Cyber and Electro Magnetic Activities (CEMA) and its role on the battlefield. Ask anyone for the first words that spring to mind at the mention of ‘cyberspace’ and they will likely say some variety of:...

Explore how an AI-powered security solution strengthens airport safety and security and enhances passenger’s experience. After the post-COVID slump, the aviation industry is now experiencing a robust recovery. But as passenger traffic increases, so do security challenges for airports. To protect their assets and safeguard staff...

Sandy Issa, Marketing Manager, Intelligent Security Systems (ISS) for the Middle East, is the only woman on a team of 25. She talks to Security Middle East magazine about how she navigates the gender divide in a tech-orientated sector. What it is like to be a...

We learn more about March Networks and its innovative and proven video surveillance and business intelligence capabilities from Trevor Sinden, March Networks’ Director of Middle East Sales. March Networks helps enterprises of every size improve their security and competitive advantage with the world’s most innovative solutions...