Can The Middle East Keep Pace With The IT Trends Of Silicon Valley?
By The Edge magazine
Technology adoption in running a business is no longer an option – it is a necessity and one that has become indispensable for survival. Historically, while most information technology (IT) initiatives start with Silicon Valley, where does the Middle East rank in terms of technology adoption and what is the way forward on data safety in the context of large-scale usage of cloud and big data infrastructure?
A session at Redefine Next, EMC Corporation’s 2015 gala for its vendors, clients and partners held at the upscale hotel, The Venetian, located in downtown Las Vegas, Nevada, the United States in early May. (Image EMC/Flickr)A session at Redefine Next, EMC Corporation’s 2015 gala for its vendors, clients and partners held at the upscale hotel, The Venetian, located in downtown Las Vegas, Nevada, the United States in early May.
Digital services are witnessing a surge in demand in the Middle East, in tandem with a broader adoption of cloud computing. The latter has seen an increasing use in the number of data centres in the Gulf Cooperation Council (GCC) countries. This is reflected in the value of the data centre infrastructure management (DCIM) sector in the Middle East and Africa (MEA) region that is expected to reach USD397.1 million (QAR1.4 billion) in 2017 – up from USD41.6 million (QAR151.4 million) in 2012 – at a compound annual growth rate of 57 percent, according to a recent report released by MicroMarketMonitor.
With these projected investment volumes, the demand for data storage and management will also see an increase. Revealing the demand of the data storage market in the region, The EMC Digital Universe, a study for the Middle East and North Africa (MENA) states that the digital universe is expected to see an increase an increase of more than 600 percent, over the current levels, by 2020.
Bridging the investment potential of QAR1.4 billion in 2017 and the data platforms that companies such as EMC Corporation bring to consumers are technologies such as cloud, mobile data, social and big data or what International Data Corporation (IDC) refers to as the third platform of technology. These are designed to help enterprises achieve increasing staff mobility and reduce capital and operational expenditure on technology.
Commenting on what prospects these global trends translate into the Middle Eastern markets for companies such as EMC which is a major player in the data storage market, Mohammed Amin, senior vice president and regional manager, Turkey, Eastern Europe, Africa, and Middle East, EMC Corporation, tells The Edge, “This means that the patch of the digital universe that enterprises and their chief information officers now need to manage isn’t just growing in volume. It is also growing in terms of complexity. This means that enterprises are turning their focus to deploy specialised, agile and more scalable IT infrastructure to cope and effectively leverage this massive surge in information to power distinct business advantage, and fuel optimisation.”
The Middle East (ME) region, says Chad Dunn, senior director, VSPEX (which stands for the virtual systems specifications and is a set of 14 IT blueprints created by EMC) Emerging Technology Product Division, EMC Corporation, is growing surprisingly well. “The ME region is adapting more quickly than many of the countries in Europe. So, Saudi Arabia, and United Arab Emirates have been very fast adopters of converged infrastructure both from the Virtual Computing Environment (VCE Company, the privately-held American computer integration company formed in 2009 by Cisco Systems and EMC Corporation), as well as VSPEX reference architecture (that provides a template solution and a common vocabulary for architecture for a particular domain),” says Dunn, adding, “In fact, right now, we’re working with some of our channel partners in the Gulf region to expand our footprint with VSPEX BLUE for our hybrid-converged solutions.”
Smart city offerings
EMC Corporation also offers disaster avoidance solutions as well as intelligence-based security solutions that enable the government to not only protect citizens’ data but can also detect any abnormal behaviour in its network and control any threats linked to disrupted services or, fraud or access to citizens’ private data. “These solutions,” says Amin, “aim to ensure that the community remains secure as it engages in day-to-day communication, both on the ground and in virtual life to create a holistic environment based on trust.”
The issue of trust is highly linked to the use of IT, especially with the increasing adoption of cloud, big data and the like. Addressing the concerns around safety, IDC, in its white paper entitled, Impact of Cybersecurity Attacks and New-Age Security Strategies, lists the top 10 challenges for information security in the GCC. The document mentions that 60 percent of threats come from employees’ lack of adherence to IT security policies, 59 percent due to increasing sophistication of attacks and 39 percent due to shortage of IT security personnel, among others.
Commenting on EMC’s guarantee on data protection and privacy in today’s climate, Dunn of EMC says, “You need protection of the data not through encryption alone but also through access. This is where RSA (the Security Division of EMC which is the provider of intelligence-driven security solutions) plays a very big role for us but it’s also intrusion detection and stopping bad actors in real time.”
Citing an example of any company that has had a data breach, Dunn adds that the companies’ conversations with EMC from a security perspective hinges on not just authentication and encryption but also on factors such as mobile device management, “because users want to bring their own devices and we can’t stop it. We need to have security- and access-controlled technologies that don’t feel as intrusive to the end user but still are going to protect the data. So technologies that we have, such as AirWatch (that targets mobile data management) and RSA for authentication or the encryption when we place data on a public cloud, are useful for our customers across segments.”
In this context, Dunn mentions CloudArray which allows to share data up on a public storage cloud, whether it is Amazon, Google or any other search engine, “but the key is the encryption that takes place on the site and very importantly, the customer always retains those keys and the service provider does not”.
Nicolai Solling, director of technology services at Help AG (a strategic information security consulting company, founded in Germany in 1995 and has been present in the Middle East since 2004) says, “There are a number of things that can be done. We specifically utilise Hardware Security Modules (HSMs) which we integrate into storage and cloud environments, allowing full encryption and even more importantly, crypto key ownership of the data. This means that even if data was taken out of the cloud or data centre by any third party, it would be useless to them as they would have to break the encryption before they are able to see the data in clear-text.”
Solling adds, “As one of the cryptographers said recently at the RSA conference in San Francisco: Encryption will not be broken, but bypassed in closing.”
In the context of bypassing security, Dunn mentions that no matter how tight the security is, “no technology will 100 percent protect all data. There has to be behaviour changes, there has to be organisation changes. Human beings are the most irrational piece of the equation and the battle is to discipline the human mind”.
Products for SMEs
EMC Corporation’s offerings for the small and medium enterprises (SMEs) come in the form of its VSPEX solutions make up a complete portfolio of solutions and products that give the client total choice when it comes to deploying the IT Infrastructure.
Explaining the spread of products for the SMEs, Chad Dunn, senior director, VSPEX says that there are separate components to that: one is EMC’s reference architecture programme which are solutions that are built to achieve business outcomes rather than just selling EMC products.
Elaborating further, Dunn continues, “They include components from other alliance partners such as Cisco, HP, Brocade, Dell, but they’re all targeted towards a range of different sizes and solutions delivered by our partners. They can be customised by our partners and we build them, test them, validate them, and then we give the partners those blueprints that they can customise to get to the right price-point for these SMEs.”
And how much of tailor making can really be done for this segment? Dunn says that “there’s quite a lot of tailor making for SMEs”, illustrating that when EMC Corporation publishes a reference architecture for VSPEX, “we will publish something, for example, to support 100 virtual machines, but within the reference architecture, we tell you what the building blocks are so if it needs to be 50 or 25, you know what components need to be optional, exactly.”
Commenting on the business prospects that Brocade foresees in the SME segment, the company’s senior vice president, Switching, Routing and Analytics, Jason Nolet, says that for a SME business, which do not have a big IT staff, large budgets, or expertise, what is crucial is the ability to deploy a network with the same plug-and-play ease with simple technologies such as hypervisors (or virtual machine monitor – VMM – a piece of computer software, firmware or hardware that creates and runs virtual machines) and servers. Nolet reveals, “This is an ambition that we’ve had for some time. Brocade helps reduce the operational overhead costs and this is really an area that we focus heavily on.”