Middle East organizations are adopting the latest Internet of Things (IoT) technology infrastructure to drive the wider region's US$ 8 billion market, SAP said.
5G & IoT ME
US-based communications infrastructure giant CommScope has stated it is 'well-positioned' to assist the efforts of operators to 'modernize' and expand their networks as they prepare to make the transition towards the implementation of 5G. CommScope has a huge presence in the MENA region, and the organization attended the 5G MENA event which was held at the Dubai World Trade Centre. CommScope showcased a series of its innovative solutions at the exhibition - and highlighted the role it will play as the telecommunications industry edges closer to an era of 5G.
Vidsys, the leading global software technology manufacturer of Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) software, announced that neXgen Group, a leading smart city advisory and managed services provider based in the UAE, will be offering Smart Safety & Security as a service leveraging Vidsys' CSIM multi-tenant cloud-based solution.
Ooredoo announced the expansion of its Managed Connectivity Platform to Qatar, taking the number of countries covered by the service to four, alongside Indonesia, Tunisia and Kuwait. In expanding the service to major markets, Ooredoo is positioning itself as a leading regional IoT player, and the company is in discussion with a number of global leaders looking to use its network during this week’s Mobile World Congress.
Connected devices are already counted in the billions, and analysts predict these numbers will hit 6.4 billion worldwide by the end of the year. While there's plenty of business potential in these expanding connections, there's a big downside however - with security vulnerabilities growing exponentially. Moath Ismail, Telecommunication Solutions & Services Director for Middle East at Gemalto, explains that because the Internet of Things (IoT) makes virtually every aspect of information governance more complicated, providing hacker-tight security has become more complicated too. With more devices and more information comes more vulnerability.
Page 1 of 2