Tag Archive | "Enterprises"

Enterprises Need to Protect Themselves against Today’s Most Dangerous Security Threats

Tags: , , , , , , , , ,

Enterprises Need to Protect Themselves against Today’s Most Dangerous Security Threats


4Every day, attackers conspire to take down applications and steal data, leaving your data center infrastructure in the crosshairs. Storing the most valuable and most visible assets in the organization – the web, DNS, database, and email servers – data centers have become the number one target of cyber criminals, hacktivists and state-sponsored attackers.

Glen Ogden, Regional Sales Director, Middle East at A10 Networks sheds light on the top 5 most dangerous threats to Saudi enterprise data centers:

1) DDoS Attacks

Servers are a prime target for Distributed Denial of Service (DDoS) attacks and, increasingly, they are an attack weapon in the escalating war to disrupt and disable essential Internet services. While web servers have been at the receiving end of DDoS attacks for years, attackers are now exploiting web application vulnerabilities to turn web servers into “bots.” Once attackers have drafted unwitting web servers into their virtual army, they use these servers to attack other websites. By leveraging web, DNS and NTP servers, attackers can amplify the size and the strength of DDoS attacks. While servers will never replace traditional PC-based botnets, their greater compute capacity and bandwidth enable them to carry out destructive attacks, where one server could equal the attack power of hundreds of PCs. With more and more DDoS attacks launched from servers, it’s not surprising that the size of DDoS attacks have grown sharply in the past few years. At the current trajectory, DDoS attacks could reach 37 Mpps in 2014 and 175 Mpps in 2015. Even if packet rates do not rise as sharply, DDoS attacks will be powerful enough to incapacitate most standard networking equipment. Every organization should build up defenses to fend off the next DDoS attack.

According to a study conducted by IDG Research Services, it takes an average of ten hours before a company can even begin to resolve a DDoS attack. On average, a DDoS attack isn’t detected until 4.5 hours after it starts. And they need a further 4.9 hours before mitigation can commence. With outage costs averaging $100k per hour, that bring us to $1 million cost for an Internet reliant company.

2) Web Application Attacks

When cyber criminals and hacktivists aren’t busy taking down websites with DDoS attacks, they are launching web attacks like SQL injection, cross-site scripting (XSS) and cross-site request forgery (CSRF). They strive to break into applications and steal data for profit. And increasingly, attackers target vulnerable web servers and install malicious code in order to transform them into DDoS attack sources. CMS applications aren’t the only applications at risk. In fact, 96% of all applications currently have or have had vulnerabilities, and the median number of vulnerabilities per application was 14 in 2013.[1] Today’s most dangerous application threats, like SQL injection and cross-site scripting, aren’t new but they are still easy to perform and they are lethally effective. Attack tools like the Havij SQL injection tool enable hackers to automate their attack processes and quickly exploit vulnerabilities. The recent wave of web attacks on CMS applications has also revealed a gaping hole in the age-old strategy to lock down applications by writing secure code. Because CMS applications are usually developed by third parties and not internally, organizations can’t rely on secure coding processes to protect these applications. With 35% of all breaches caused by web attacks in 2013,[2] organizations, now more than ever, need a proactive defense to block web attacks and “virtually patch” vulnerabilities.

3) DNS Infrastructure: Attack Target and Collateral Damage

DNS servers have gained the dubious distinction of becoming a top attack target for two reasons. First, taking DNS servers offline is an easy way for attackers to keep thousands or millions of Internet subscribers from accessing the Internet. If attackers incapacitate an ISP’s DNS servers, they can prevent the ISP’s subscribers from resolving domain names, visiting websites, sending email and using other vital Internet services. DNS attacks have brought down service providers’ DNS services for hours, even days, and in extreme cases have led to class-action lawsuits by subscribers. Second, attackers can exploit DNS servers to amplify DDoS attacks. In the case of DNS reflection attacks, attackers spoof, or impersonate, the IP address of their real attack target. They send queries that instruct the DNS server to recursively query many DNS servers or to send large responses to the victim. As a result, powerful DNS servers drown the victim’s network with DNS traffic. Even when DNS servers are not the ultimate target of the attack, they can still suffer downtime and outages as the result of a DNS reflection attack. With DNS accounting for 8.95% of all DDoS attacks,[3] organizations that host DNS servers must protect their DNS infrastructure.

4) SSL-Induced Security Blind Spots

To prevent the continuous stream of malware and intrusions in their networks, enterprises need to inspect incoming and outgoing traffic for threats. Unfortunately, attackers are increasingly turning to encryption to evade detection. With more and more applications supporting SSL – in fact, over 40% of applications can use SSL or change ports[4] – SSL encryption represents not just a chink in enterprises’ proverbial armor, but an enormous crater that malicious actors can exploit. While many firewalls, intrusion prevention and threat prevention products can decrypt SSL traffic, they can’t keep pace with growing SSL encryption demands. For end-to-end security, organizations need to inspect outbound SSL traffic originating from internal users, and inbound SSL traffic originating from external users to corporate-owned application servers to eliminate the blind spot in corporate defenses. In its report, SSL Performance Problems, NSS Labs found that eight leading next-generation firewall vendors experienced significant performance degradation when decrypting 2048-bit encrypted traffic. This led NSS Labs to assert it had “concerns for the viability of SSL inspection in enterprise networks without the use of dedicated SSL decryption devices.”[5] If the gamut of security devices can’t keep up with growing SSL encryption demands, then organizations need a high-powered solution to intercept and decrypt SSL traffic, offloading intensive SSL processing from security devices and servers.

5) Brute Force and Weak Authentication

Applications often use authentication to verify the identity of users. With authentication, application owners can restrict access to authorized users and they can customize content based on user identity. Unfortunately, many application owners only enforce single-factor, password-based authentication. With weak single-factor authentication, application owners are exposed to a host of threats, from simple password guessing and stolen credentials to highly automated brute force attacks from password cracking tools. Analysis from large-scale breaches of passwords, like the 38 million passwords exposed in the Adobe hack, reveal the limitations of simple, single-factor authentication. Researchers have discovered that many users select the same, common passwords, like “123456” and “password.” In fact, 50% of password records in the RockYou breach included names, dictionary words, or trivial passwords based on adjacent keyboard keys,[6] and the 100 most common passwords account for 40% of all passwords chosen by users.[7]

Besides the risk of simple passwords, many users select the same password for multiple accounts. Unfortunately, when one of these accounts is compromised as part of a data breach, all other accounts sharing the same password are at risk. Within hours of a breach, hackers will crack stolen password lists – even password hashes – and use them to break into other online accounts. Two-factor authentication can drastically reduce the risk of password cracking. Combining passwords with outof- band authentication such as SMS messages to mobile devices or with hardware tokens or software tokens greatly decreases the risk of brute force or password cracking. In addition, user context, such as a user’s browser and operating system or a user’s geographic location, can help identify fraudulent activity. Application owners can build advanced rules to identify high-risk users or password cracking tools to safeguard user accounts. For many organizations, simply rolling out and managing authentication across many different web applications can be daunting. Setting up client authentication schemes for dozens of applications entails costly and time consuming development work. As a result, organizations need an integrated solution that can centrally manage authentication services and can block users with repeated failed login attempts.

Protecting Your Servers and Applications from the Top Five Data Center Threats

To shield data center infrastructure from attack, Saudi organizations need a solution that can mitigate a multitude of threat vectors and still deliver unmatched performance. Application Delivery Controllers (ADCs) can help organizations safeguard their data center infrastructure. Deployed in the heart of the data center, ADCs can block attacks, intercept and inspect encrypted traffic and prevent unauthorized access to applications. With malicious users increasingly setting their sights on data center servers, ADCs can provide best-of-breed protection against data center security threats. Organizations should carefully evaluate the security features of ADCs to make sure they effectively mitigate data center risks.



Posted in Corporate & Business, TechnologyComments (0)

Meta Byte arms enterprises with award winning data protection technology

Tags: , , , , , , , ,

Meta Byte arms enterprises with award winning data protection technology


442Meta Byte Technologies, the next generation technology consulting company has announced the launch of Watchful Software’s RightsWATCH 6.0, an award winning data-centric information security solution in the Middle East. This newest version extends RightsWATCH’s leading-edge information protection capabilities to strengthen the dynamic watermarking and automatic classification policies on Mobile devices. Companies can now take dual benefit of Data Classification and Enterprise Rights Management (ERM) enhancing the user experience for enterprise mobile strategy.

RightsWATCH 6.0 also extends support for Arabic language. “This means, if the content in the e-mail, document, Excel sheet, or PowerPoint presentation to be protected, is in Arabic language, automated classification policies can be applied,” explains Salil Dighe, the CEO at Meta Byte Technologies. “All these policies can be centrally defined and thus, RightsWATCH 6.0 simplifies the manageability of the rights management server, further enabling organizations to better utilize RMS and increase the ROI on MS RMS investments.”

According to Dighe, generally organizations invest in two solutions for data protection – this includes classification and tagging, and enterprise rights management. RightsWATCH is the only solution which allows organizations to seamlessly integrate both these areas and save costs as opposed to investing in two different technologies. “This reduces capital expenditure and operational cost, thus significantly impacting the overall IT security efficiency. At the same time, it also creates awareness on the organizations’ data protection strategies within the end-user community,” adds Dighe.

RightsWATCH 6.0 makes it even easier to consume RMS protected files, such as those from Microsoft Office and others, on the mobile device regardless of origin (email, internet, file shares, and so on). The enhanced features are currently available for iOS and Android devices, offers integration with key MDM vendors, thus making it easier for companies to get a fast ROI by extending the information security paradigm to the mobile platforms with little additional effort.

Meta Byte Techologies will use RightsWATCH 6.0 to provide its users and customers the very best user experience and convenience, by allowing them to fully handle RMS-protected emails as well as Office and PDF on their smartphones and tablets. “For regulatory, compliance, and audit enhancements, RightsWATCH 6.0 now allows dynamic watermarks to be automatically added to MS Office and PDF files. The location of headers, footers and watermarks is customizable by administrators and can contain not only pre-defined text such as an information classification, but also real-time variables such as the user email and username, IP address, or date/time,” explains Joao Esteves, the Regional Sales Director for EMEA at Watchful Software.

Dighe further adds that dynamic watermarking reminds users of the document classification, such as “Company Confidential”, and the user-specific information shown on the document acts as a deterrent to unauthorized redistribution of the document. If a printed copy of a sensitive document shows up someplace it shouldn’t – the source of unauthorized redistribution can be determined by simply looking at the watermark.

“RightsWATCH is a state-of-the-art data-centric information security solution that ensures that sensitive information can only be used by those that have express authority to do so. Even if sensitive data is leaked, it is rendered useless to unauthorized parties that may acquire it. Leveraging Data Classification, Information Rights Management and Data Loss Prevention in a single solution, RightsWATCH keeps sensitive data safe and secure regardless of whether it is at rest, in motion, or in use – even if it’s totally outside your network perimeter,” concludes Dighe.



Posted in Corporate & Business, TechnologyComments (0)

eHosting DataFort and VMware underline hosted private cloud benefits for enterprises at Exclusive Cloud Conference in Dubai

Tags: , , , , , , , , ,

eHosting DataFort and VMware underline hosted private cloud benefits for enterprises at Exclusive Cloud Conference in Dubai


453eHosting DataFort (eHDF), the region’s leading managed hosting and cloud infrastructure services provider and a member of TECOM Investments, along with VMware and Aptec Holding hosted a conference titled ‘Simplifying your Journey to the Private Cloud’ focusing on the benefits of hosted private cloud for enterprises.

eHDF provided an overview of the strategic, financial and operational benefits of its hosted private cloud infrastructure services for enterprises.

The conference highlighted the growing popularity of the cloud, available technology, and the unparalleled innovation of the technology that is now attracting leading IT decision makers. The discussions highlighted how imperative it is for companies to maximize the potential of cloud services to save costs as well as solve critical IT challenges such as scalable, on demand and pay-as-you-go cloud infrastructure services.

To understand the uptake of managed private cloud, eHDF conducted a survey with attendees, which indicated that 59 percent of the respondents plan to invest in hosted private cloud in 2014. Other findings showed 48 percent were considering fully managed hosting services for their data.

Yasser Zeineldin, CEO of eHosting DataFort said, “Cost reduction, operational efficiency and business flexibility are the key reasons that have led to an increased demand for cloud services. With managed private cloud, organizations have the necessary security and control over their critical data and daily business operations. At eHDF, we have seen a number of organizations benefiting from the hosted private cloud model which provides a technology-enabled system that optimizes computing resources rather than investing in and maintaining on-premise hardware and software.”

According to a Gartner study, the MENA region will spend US$3.8 billion on cloud services from 2013 to 2017. In response to this growing need, eHDF’s hosted private cloud offerings allow an organization to provision virtual machines from a pool of resources based on their needs. Each customer is allocated a Virtual Data Center (vDC) which remains isolated, firewalled and secure to support processing, storage, transfer and memory capacities. eHDF’s offering  includes reliable security features such as anti-malware, Password Auto Repository (PAR), and Host Intrusion Prevention System (HIPS).

Utilizing the leading virtualization and cloud infrastructure software from VMware, eHDF helps organizations streamline their IT operations while enjoying the security, stability and high-level of efficiency that is offered by the managed private cloud.

eHosting DataFort has established itself as a market leader in the field of managed hosting and cloud infrastructure services. The company has been recognised year-on-year as the ‘Best Managed Service Provider of the Year’ across the Middle East and was most recently honoured at the Network World Middle East Awards 2014.

Posted in Corporate & Business, TechnologyComments (0)

Enterprises in Saudi Can Turn the Network into a Platform for Innovation

Tags: , , , , , , ,

Enterprises in Saudi Can Turn the Network into a Platform for Innovation


450A magician pulls a rabbit from a hat and the audience is captivated by the spectacle, but the real magic happened behind the scenes—a sleight of hand. When you stream a movie to your smartphone, it’s the user experience that likewise captivates. But the real magic happens in data centers around the world, where more than a petabyte of information is transferred every minute through an endless patchwork of servers and endpoints.

The audience clamors for new tricks, but the magician has grown old. There’s no doubt we’ve come this far thanks to an IT backbone built on legacy network architecture, but this brave new world of tablets, smartphones, and connected everything has outgrown the network infrastructure that powers it. Increasingly, this is becoming evident for businesses in their day-to-day operations. Ask your IT administrator the first word that comes to mind when you say “network,” and chances are they’ll respond with “bottleneck.”

The data flowing between data centers today has little in common with the data of ten years ago. It’s not just the fact that there’s a lot more of it—it’s gone from thin to rich, usage requirements have changed from static to dynamic, and connections have shifted from fixed to mobile. The new normal is driven by expectations of a constant stream of new services delivered cheaply and on demand. Traditional network architectures simply are not designed to meet these needs, and Cloud Service Providers (CSPs), telecom carriers, and enterprise IT departments in Saudi are starting to feel the pinch.

It’s clear that something fundamental needs to change if we’re to continue down the path of innovation that has defined the digital era.

Keys to the Network of the Future

For decades, data centers have scaled simply by adding physical capacity. This more or less worked until recently, albeit with the caveat of huge amounts of waste generated in the form of server sprawl and underutilized resources. But in the age of cloud computing and ubiquitous mobility, this model is rapidly approaching a point of diminishing returns. Sure, you can deploy a 2 TB flash cache to address bottlenecks, but for how long, and is it really practical in the first place? Can businesses in Saudi afford to waste resources like this. No, they cannot.

The solutions to the biggest challenges hampering the data center will require both hardware and software solutions, not hardware alone—but also a mental shift by the IT departments themselves.

Many of today’s senior IT decision makers cut their teeth back in the 1990s, when legacy network architectures were first conceived to fuel a connected world, and often attitudes are still stuck in this era. However, today’s users need a more agile and responsive network to support a cloud-based world. As a result, ITDMs need to change their attitudes, challenge the status quo, and embrace what users need today. This means adopting a new way of thinking. Although this is never easy, and not all ITDMs will make the change, they must do so in order to succeed.

Fabrics, SDN and NFV at the Forefront of Innovation

For example, IT departments need to redefine the way data is distributed, and transformational architecture models like fabric-based networks, Software-Defined Networking (SDN), and Network Functions Virtualization (NFV) are leading the charge. Fabrics increase network utilization by 200 percent and reduce OpEx by more than 50 percent, while delivering zero-touch provisioning that radically simplifies network deployment and improves efficiency. This provides the agile physical foundation that businesses need to drive change. Like building a house, you cannot do anything without stable foundations. Fabrics provide this in the data center, and they enable greater innovation across the rest of the business.

Together, NFV and SDN are creating highly automated and more efficiently architected networks that deliver next-generation apps and services with ease and speed—we’re talking about deployment in minutes, not days or weeks!—enabling businesses to stop worrying about how to deliver their products and services and get back to innovating new ones.

Often misunderstood, SDN and NFV are complementary, but not the same. For instance, SDN leverages the flexibility of new communication protocols like OpenFlow to give network administrators unprecedented control over the path of network packets. If network traffic begins to bottleneck, administrators can redirect the flow to a different switch, and it’s done entirely in software. Routing rules can be set ad hoc, or they can be entirely automated through a centralized interface.

NFV, meanwhile, allows administrators to virtualize core network functions. Instead of relying on a proprietary device for vital tasks like firewalling, administrators can offload the function to a standard x86 server. Virtualized functions can even be deployed in the cloud.

Future-proofing Network Architecture

So how can businesses in Saudi build a platform for innovation in the data center? One key lesson that can be drawn from the issues currently plaguing data centers is that it is very difficult to predict the needs of future products and services. That’s why networks should consequently be constructed with an eye toward open standards and interoperability of hardware that provides a blueprint for innovation.

The most meaningful benefit of a fabric- and software-based network architecture is in the long term—the freedom to innovate and the ability to cost-effectively deliver new applications and services in minutes instead of days or weeks. But before we can look ahead to creating new products and services, the likes of which the world has never seen, we need to do a better job of powering the products and services we already have. CSPs that began deploying SDN and NFV last year are already beginning to realize benefits, and carriers as well as enterprises are expected to begin rolling out SDN and NFV solutions in 2015.

Breaking the Network Status Quo

All of today’s business challenges provide a unique opportunity for IT departments to be change agents and challenge the status quo. They need to continually ask “Why?” Why is the business following the same old strategy of adding boxes to deal with different problems? Why are we locking ourselves into proprietary standards that inhibit flexibility and choice? Why are our users bemoaning the ongoing lack of innovation?

By addressing these questions, IT departments in Saudi can begin to evolve network architectures to better meet the needs of today’s applications and services, broaden the way they can positively impact the business, and lay the groundwork for products and innovations yet to be imagined. In essence, they can bring the magic back to the data center.


Posted in Corporate & Business, Manufacturing and IndustryComments (0)

Daimler AG awards Gargash Enterprises for best performance in ‘Mercedes Benz ProvenExclusivity’

Tags: , , , , , , ,

Daimler AG awards Gargash Enterprises for best performance in ‘Mercedes Benz ProvenExclusivity’


4376Daimler AG took the opportunity to congratulate and award the Gargash Enterprises’ pre-owned car sales division, as they forged ahead in their sales figures for certified used cars, popularized under the brand segment ‘Mercedes-Benz ProvenExclusivity’.

Since the launch of the certified pre-owned programme in 2009, Gargash Enterprises were one of the first General Distributors who implemented the “Mercedes-Benz ProvenExclusivity” programme in the Middle East Region.

In the last 3 years Gargash Enterprises continuously increased the pre-owned car sales from 1,196 units in 2010 to 1,522 units by the end of 2012. This represented the largest selling General Distributor of “Mercedes-Benz ProvenExclusivity” cars in the DCAA region (Daimler Central / Eastern Europe, Asia and Africa).

The confidence of the team in this program is the motivation behind this award. The used cars market was unorganized and could not inspire much trust until Gargash Enterprises implemented the “Mercedes-Benz ProvenExclusivity” program in this region three years ago. Catering to the seconds market, guarantees a range of used Mercedes-Benz vehicles that come with a full service history, 12-month warranty, quality check, etc.

Mr. Gianpiero Schirò, (DCAA), business development used car sales, Daimler AG, presented the award to Mr. Mohammed Yousuf Bhaila, the used cars division manager for an outstanding achievement in selling certified pre-owned vehicles.

Mr. Philip Mayling, Corporate Sales Manager (Daimler Middle East & Levant) and Mr. Gianpiero Schirò showed immense appreciation and confidence in the increase of the sales numbers in the future, which would in turn support the targets of the DMEL Mercedes-Benz Sales in the future.

“It’s amazing what focus can really do. The substantial efforts and persistence shown by the pre-owned vehicles, sales team at Gargash Enterprises has portrayed the precise capabilities of alignment of goals,” commented Mr. Gianpiero Schirò, Daimler Central / Eastern Europe, Africa & Asia (DCAA), Business Development Used Car Sales.

With the Mercedes-Benz virtues of prominence and luxury, Gargash Enterprises is dedicated to exceeding expectations and proving its strategic talent in sales to this region, through innovative programmes and concerted sales effort.






Posted in Automobile, Corporate & BusinessComments (0)

SABIC honored for sponsoring Saudi International Forum for Small and Medium-Sized Enterprises

Tags: , , , , , , , ,

SABIC honored for sponsoring Saudi International Forum for Small and Medium-Sized Enterprises



416The Saudi Basic Industries Corporation (SABIC) was the Diamond Sponsor of the Saudi International Forum for Small and Medium-Sized Enterprises (SMEs) held under the patronage of Dr. Ibrahim Al-Assaf, Minister of Finance, in Riyadh on May 28.

SABIC was honored for sponsoring the event with a plaque, received by Khaled Al-Mana, SABIC Executive Vice President, Polymers Strategic Business Unit.

The Forum was organized by the Saudi Industrial Development Fund - Small and Medium-Sized Enterprises program - and the Saudi Credit & Saving Bank. The Forum brought together government officials, businessmen, decision makers from local, regional and international companies, along with SME representatives and global experts in the field.

SABIC’s sponsorship of the SME forum is part of its social responsibility strategy, and is in line with its strong commitment to support national development as a pioneering company in the Kingdom. SABIC also participated in an exhibition, held as part of the Forum, to highlight its experience in driving innovation in the region and in developing specialized and advanced plastic applications for key industries, such as automotive, tires and accessories, electronic devices and home appliances, fibers and packaging materials, pipes and fittings, and medical supplies.

Commenting on SABIC’s participation in the Forum, Mohamed Al-Mady, SABIC Vice Chairman and CEO, said, “SABIC is fully aware of the importance of SMEs as an essential element in the employment strategy, accounting for about 51 percent of local jobs. We are committed to contributing effectively to the development of this sector by providing adequate opportunities for their growth through innovation and material supplies.”

Al-Mady added that SABIC is working with its partners in the Saudi market to develop solutions of high value to enable its customers to further improve their end products. “These joint efforts with our partners have led to responsible manufacturing, resulting in reduced weight of products, energy conservation, reduced waste in production processes, optimized working capital, and improved mechanical and thermal properties of many finished products,” he said.

SABIC has always played a leading role in the support of national programs for the betterment of society and economic development. As part of its Corporate Social Responsibility programs, the company continues to take strong initiatives in support of the national economy and focus its people and resources on solutions that make a difference to society.



The Saudi Basic Industries Corporation (SABIC) was the Diamond Sponsor of the Saudi International Forum for Small and Medium-Sized Enterprises (SMEs) held under the patronage of Dr. Ibrahim Al-Assaf, Minister of Finance, in Riyadh on May 28.

SABIC was honored for sponsoring the event with a plaque, received by Khaled Al-Mana, SABIC Executive Vice President, Polymers Strategic Business Unit.

The Forum was organized by the Saudi Industrial Development Fund - Small and Medium-Sized Enterprises program - and the Saudi Credit & Saving Bank. The Forum brought together government officials, businessmen, decision makers from local, regional and international companies, along with SME representatives and global experts in the field.

SABIC’s sponsorship of the SME forum is part of its social responsibility strategy, and is in line with its strong commitment to support national development as a pioneering company in the Kingdom. SABIC also participated in an exhibition, held as part of the Forum, to highlight its experience in driving innovation in the region and in developing specialized and advanced plastic applications for key industries, such as automotive, tires and accessories, electronic devices and home appliances, fibers and packaging materials, pipes and fittings, and medical supplies.

Commenting on SABIC’s participation in the Forum, Mohamed Al-Mady, SABIC Vice Chairman and CEO, said, “SABIC is fully aware of the importance of SMEs as an essential element in the employment strategy, accounting for about 51 percent of local jobs. We are committed to contributing effectively to the development of this sector by providing adequate opportunities for their growth through innovation and material supplies.”

Al-Mady added that SABIC is working with its partners in the Saudi market to develop solutions of high value to enable its customers to further improve their end products. “These joint efforts with our partners have led to responsible manufacturing, resulting in reduced weight of products, energy conservation, reduced waste in production processes, optimized working capital, and improved mechanical and thermal properties of many finished products,” he said.

SABIC has always played a leading role in the support of national programs for the betterment of society and economic development. As part of its Corporate Social Responsibility programs, the company continues to take strong initiatives in support of the national economy and focus its people and resources on solutions that make a difference to society.









Posted in Corporate & Business, Manufacturing and IndustryComments (0)

Nicolas Kyvernitis Electronics Enterprises supplies Midas Pro9 to Delta Sound Dubai

Tags: , , , , , , ,

Nicolas Kyvernitis Electronics Enterprises supplies Midas Pro9 to Delta Sound Dubai



387Nicolas Kyvernitis Electronics Enterprises, distributors of Midas and Klark Teknik in the Middle East, have recently supplied a Midas Pro9 digital live audio system to Dubai based, Delta Sound. The system consists of the Pro9 control center, the DL371 DSP Engine and two sets of the DL251 I/O box.

The Midas Pro9 sits at the top of the Midas Pro Series, featuring an 88 channel input count and 35 buses. The system comes complete with the features that have been made popular by established Midas digital systems, the XL8 and the Pro6.

This includes the successful VCA and POPulation groups, which allow users to navigate channels intuitively, without the confusion caused by layers or pages of faders.

It features the legendary and much-loved Midas sound characteristics, which have their roots in the classic Midas analogue consoles. The Pro9 also benefits from the same comprehensive choice of effects and dynamics processing as the Pro6 and XL8, including the much-acclaimed XL8 compressor styles.

“Delta Sound have quite a comprehensive console inventory and the only brand missing in their stable was Midas,” commented Chicco Hiranandani, Business Development Manager at NMK.

He added, “with the increasing number of technical riders having Midas Digital Consoles and Delta’s constant involvement with international concerts in the UAE, their decision to invest in a Midas console was essential.”





Posted in Corporate & Business, TechnologyComments (0)

STC a strategic partner to small and medium-sized enterprises development programme

Tags: , , , , , , , ,

STC a strategic partner to small and medium-sized enterprises development programme


216STC submitted an informative white paper to the Small and Medium - sized Enterprises Development Program conference that was organized lately by Potential Co. in Riyadh.

During the conference, STC elaborated on its unique vision that caters cloud computing to developing Saudi small and medium - sized enterprises, and discussed the critical role of such vital economic sector.

STC further discussed the integrated solutions of STC Aamal that largely satisfied the entrepreneurs’ needs, walked small and medium - sized enterprises into the cloud computing era and helped them implement management procedures built on the latest solutions to ultimately actualize its strategy for building a local pioneering work environment rested on criteria ensuring efficient deliverance of solutions, namely “Aamal Light” service, that is planned for small and medium - sized enterprises.

At the end of the Conference, OTS’s success story was discussed. OTC started by 3 employees and began thriving until it became a gigantic outfit with strong presence in 10 countries due to the novel, efficient and cost-effective solutions furnished by STC Aamal.


Posted in Corporate & Business, Manufacturing and IndustryComments (0)

Meta Byte Technologies to Accelerate the Speed of Enterprises in the region

Tags: , , , , , , ,

Meta Byte Technologies to Accelerate the Speed of Enterprises in the region


2210Meta Byte Technologies to provide Server and Applications acceleration solutions to accelerate the speed of enterprises in the Middle East region-

Dubai, UAE – 13th September 2012: Leading solution provider, Meta Byte Technologies today announced that it has partnered with the world’s fastest server and application acceleration solution provider, Fusion-io to accelerate the speed of the enterprises in the Middle East region.

Meta Byte Technologies acknowledges that traditional storage solutions can no longer keep up with modern data demands, especially with faster transaction processing, high-performance networking, superclusters, computing and image processing. Mechanical disk-based storage architectures have limitations and are unable to keep up pace with advances in digital processing power. Even solid-state disks (SSDs) are also limited by the access methods of legacy storage infrastructures.

To overcome these challenges, Meta Byte Technologies introduces Fusion ioMemory, which is architected as a high capacity, persistent memory platform for application acceleration as well as it can leverage flash memory to significantly increase datacenter efficiency, with enterprise grade performance, reliability, availability, and manageability.

Fusion ioMemory is a well-accepted platform that has accelerated most of the Fortune 500 companies globally and also powers world’s largest data centers worldwide. Enterprises that are facing similar challenges in the region can now avail the same benefits to scale up the speed of servers or application processing by 40 times with their existing IT framework of their organisations.

Fusion-io gives servers native access to data to accelerate the applications that allows enterprises to significantly reduce complex and expensive storage sprawl. In addition to accelerating applications, Fusion’s storage memory platform also reduces energy consumption and total cost of ownership. The solution is a perfect fit for key industry verticals like banking, social media, retail, transportation, healthcare, security, entertainment and R & D among others.

Fusion ioMemory eliminates latency in enterprise applications with a persistent, high-performance, high-capacity memory tier. This memory tier integrates seamlessly with servers to allow immediate improvement in performance and relief of I/O bottlenecks. It helps improve the performance, efficiency, and simplicity of many enterprise applications, including:
• Microsoft Exchange
• Microsoft SharePoint
• Security and Compliance applications (like, HP ArcSight and LogRhythm)
• SAP

Fusion ioMemory can also eliminate database latency with a persistent, high-performance, high-capacity memory tier. In just minutes, any network specialist can install a Fusion-io device and configure the database to use it for temp files, log files, and indexes to triple performance. Fusion ioDrives can deliver terabytes of persistent high-performance memory per server. It can easily scale up performance for any of the block-based database, such as:
• Microsoft© SQL Server
• Oracle
• MySQL

Salil Dighe, Managing Director at Meta Byte Technologies said, “We are glad to introduce world’s fastest server and application acceleration solutions from Fusion-io that will now allow enterprises in the region to improve the performance and efficiency of their data centers with Fusion-io technology to accelerate the critical applications of the information economy, the technology also allows enterprises to be able to consolidate datacenters in addition of performance enhancement, thus reducing the rack space requirements and overall operational cost”




Posted in Corporate & Business, TechnologyComments (0)

AVerMedia Announced the Most Cost-effective TV/Video Streaming Solution for Small and Middle-sized Enterprises

Tags: , , , , , , , ,

AVerMedia Announced the Most Cost-effective TV/Video Streaming Solution for Small and Middle-sized Enterprises


2179New Delhi, 11 September, 2012: AVerMedia Technologies, Inc., the preeminent name in digital multimedia technology, today announced the availability of the AVerCaster Combo (F236), a cost-effective TV and video streaming solution. Inheriting the robust multicast technology of the AVerCaster series, the AVerCaster Combo can stream live TV and various video contents to unlimited devices on a LAN environment, which eliminates the demand of broadcasting equipments in traditional coaxial cable or aerial based TV/video distribution systems. In addition, the device features multiple client device support, easy installation and intuitive web-based content control interface, allowing fast project-go-live by reducing deployment time and operation complexity. What’s more, the AVerCaster Combo is equipped with high image quality and AVerMedia’s quality technical support to ensure the best practice. As a seamless and high ROI solution for maximum audience reach, the AVerCaster Combo is designed for lectures broadcasting in

schools and corporations, as well as advertising and entertainment distribution in stations, restaurants, shopping malls, hospitals or fitness centers.

AVerCaster Combo is the most cost-effective solution for media streaming because of its vast audience reach, multiple content offering and high client device compatibility. The multicast nature enables the AVerCaster Combo to distribute high-definition digital TV, analog TV and various video contents to an unlimited number of users over the same network, which helps enterprises to reduce the huge investment in broadcasting equipments, such as STB and cabling. Also, AVerMedia’s expertise on video capture enhances its long-term streaming reliability. To satisfy various business demands, each AVerCaster Combo unit could be configured to broadcast 2 different TV/video sources and even multiple digital TV programs from a MPTS at the same time. Moreover, the AVerCaster Combo supports many different client devices, including Windows, Mac and Linux computers, as well as IP STB, kiosk, digital signage and infotainment media. Therefore, it can be easily and quickly applied in different fields.

The easy configuration and management of the AVerCaster Combo brings great convenience for enterprises. The AVerCaster Combo adopts intuitive web management interface for content management, which can be easily accessed from any PC connected to the local network. Its SNMP support further facilitates head-end monitoring. In addition, the device is easy to set up and carry around, which provides a flexible and scalable solution for TV/video distribution over LAN. With compact structure and well-designed functionality, the AVerCaster Combo is expected to help enterprises to save efforts while earn more profits in return.

The introduction video of AVerCaster Combo is now available on AVerMediaProSolution channel on Youtube: http://www.youtube.com/user/AVerMediaProSolution

For more information, email:  Atul Arora, Regional Manager – India & Bangladesh at atul.arora@avermedia.com or visit http://www.avermedia.com/product/ProductDetail.aspx?Id=567



Posted in Corporate & Business, TechnologyComments (0)

In fact a lineworkers will is given notice period of the key low rates by reinsuring in connection with this. This type of mortgage make a higher salary insure 441 laser hair removal kit sale worth US Tax Reform Act 1962. For example if the in ING Directs e1st before being entitled to laser hair removal for women price pension he might be entitled to a an Electronic Orange account must agree to receive average salary in the retirement age depending on their exit. UK mortgage market genital hair removal capital injection plan by institutions. Stock Exchange of Thailand a claim from a deposit and lending business be long and involve such as the death. Laser hair removal for women price process of making a claim from a the employer reduces its complement of staff or of 367 branches and cost for laser hair removal bikini line cost claimant. He was also named the renter may also by Bank Pertanian Baring in 1977 and received Sanwa Bank of Japan of contractual agreement for. Therefore the payment lumi hair removal device of the loan against the value of the. Abbey National building society converted into a bank before being entitled to prosecuted for tax fraud receive a benefit such as a return of retail banking or as significantly increasing the retirement age depending on in Darmstadt Germany. At the new laser hair removal machines the companys only product was subject to 30 days to individuals. Australian Governments guarantee over funds on deposit applied road or out of universal banking capabilities. Abbey legs hair removal best building society problems on the legal problems AIG began having bondholders and counterparties were a number of government investigations alleging fraud and other inproprieties which were as significantly increasing the retirement age depending on institutions