< PreviousFEATURE 40 Edge/ September 2024 potentially lower cloud spending. Zinn further explained, “Full stack obser vabilit y can comb through voluminous data and identify application behaviour issues, errors in the code, and other bottlenecks that could aff ect application performance. This level of visibility makes full-stack observability a critical asset for organisations.” Full stack observability is crucial in enhancing the performance and reliability of applications for businesses in the MENA region. Kulasekaran noted, “For applications, telemetry data usually consists of logs, metrics, and traces generated by the application itself. Full stack observability solutions can identify subtle code ineffi ciencies or memory leaks causing intermittent slowdowns, which traditional monitoring practices might miss.” Harvey pointed out, “Full stack observability enables a proactive approach by predicting and preventing problems before they impact operations, shifting IT operations from a reactive stance to a more predictive and effi cient model.” This comprehensive visibility across the IT environment helps organisations understand the broader impact of specifi c issues and make informed decisions about prioritisation and resource allocation. Companies in the MENA region must overcome potential challenges and barriers when adopting full-stack observability solutions. Harvey, for example, has emphasised the importance of engaging with customers to ensure they understand the diff erence between observability and monitoring and are prepared for the necessary organisational changes. “Cloud-native architectures built on open-source software with containerised applications and services can benefi t / Full Stack Observability is crucial in enhancing the performance and reliability of applications Edge_Sep2024_36-41_Feature Full stack observability_13361508.indd 40Edge_Sep2024_36-41_Feature Full stack observability_13361508.indd 4002/09/2024 19:4602/09/2024 19:46FEATURE Edge/ September 2024 41 from full s tack obser vabilit y to understand component dependencies, hotspots, and bottlenecks in the overall system,” Royales said. O r ganisat ions mus t educate stakeholders about the value of full- stack observability and encourage knowledge sharing and collaboration across teams to leverage observability insights and best practices. This will break down siloed management practices and pave the way for smooth implementation. G i e s e s t r e s s e d , “ I n te g r a t i n g full-stack obser vabilit y tools into / Full Stack Observability involves monitoring the entire flow of an application existing IT infrastructures is typically straightforward, especially when using well-known technologies and vendors. Challenges may arise with less common or region-specifi c technologies, so it’s important to discuss with vendors how quickly they can support new or niche technologies.” Full stack observability involves monitoring the entire f low of an application, from the front end through the back end to the database. This classic three-tier model has evolved with distributed systems, where components may reside on-premises, in the cloud, or hybrid environments. Observability provides insights into how users ‘actually’ use your products and services, and this insight on use can help you develop innovations specifi cally tailored to their needs and use cases. Royales said, “It also helps simplify and rationalise by removing or reducing applications and services that are not driving the proper returns.” By providing a comprehensive view of the entire IT environment, full-stack observability enables organisations to transition from reactive to proactive operations, optimise resource utilisation, and enhance overall effi ciency. Adopting full-stack observability in the Middle East is essential for enhancing IT infrastructure, improving security, ensuring compliance, and driving innovation. Full stack observability enables organisations to transition from reactive to proactive operations, optimise resource utilisation, and enhance overall effi ciency by providing a comprehensive view of the entire IT environment. As the region continues to embrace digital transformation, full-stack observability will play a pivotal role in ensuring the reliability, performance, and adaptability of IT systems, ultimately supporting business growth and success. Edge_Sep2024_36-41_Feature Full stack observability_13361508.indd 41Edge_Sep2024_36-41_Feature Full stack observability_13361508.indd 4102/09/2024 19:4602/09/2024 19:46FEATURE 42 Edge/ September 2024 Edge_Sep2024_42-45_Feature- Sustainability AI_13358969.indd 42Edge_Sep2024_42-45_Feature- Sustainability AI_13358969.indd 4202/09/2024 19:4602/09/2024 19:46FEATURE Edge/ September 2024 43 REVOLUTIONISING ENERGY How AI and Tech Giants Are Slashing Consumption AI Words by Sindhu V Kashyap As technologies grow and evolve from prototype to product at a breakneck speed, energy consumption has become a critical concern, particularly with the rise of artifi cial intelligence (AI) and expansive digital infrastructures. But like all things AI and technology, this has a double- edged sword element. As the need for organisations to embrace A I and new technologies becomes increasingly apparent , leaders are now directing t h e i r e f f o r t s to w a r d s optimising energy usage. This ensures sustainability and paves the way for a future where technological growth and environmental responsibility go hand in hand. Kamel Al-Tawil, Managing Director for the Middle East and North Africa at Equinix emphasises the need for ef f iciency, “Globally, data centres and technology costs account for approximately 2-3 per cent of global energy consumption. With advancements in AI, this might increase. However, imagine an economy without the internet, technology, or digital infrastructure—a signifi cant price we pay.” In response to these challenges, Equinix aims to be climate-neutral by 2050, supported by substantial investments in renewable energy projects, including solar farms, wind farms, and hydro projects. “In Dubai, we’ve moved our SLA from the ASHRAE recommended standard to higher temperature allowances within data halls, thereby improving energy effi ciency,” said Al-Tawil. The company also purchases carbon off sets to ensure its data centres are fully powered by green energy. Equinix is implementing a liquid cooling prototype in its data centres, which is expected to drastically reduce the energy required for cooling. “The density per rack has increased signifi cantly. What was once 4-5 kilowatts per rack has now increased to 20-30 kilowatts per rack, with expectations of reaching up to 100 kilowatts per rack. Cooling these racks requires a lot of energy,” Al-Tawil explains. Data centres measure energ y ef f i cienc y u s i n g Po we r U s a g e Ef fe c t i veness (P U E ) . Equinix aims to optimise this metric to between 1.4 and 1.2. “In the UAE, we’ve achieved a PUE of 1.5, which is commendable considering the climate,” notes Al-Tawil. Looking to the future, Al-Tawil emphasises the need for continuous innovation in cooling techniques and energy management. By integrating AI and advanced technologies, data centres can become more effi cient and In the UAE we’ve achieved a PUE of 1.5, which is commendable considering the climate conditions Edge_Sep2024_42-45_Feature- Sustainability AI_13358969.indd 43Edge_Sep2024_42-45_Feature- Sustainability AI_13358969.indd 4302/09/2024 19:4702/09/2024 19:47FEATURE 44 Edge/ September 2024 sustainable, balancing increasing energy demands with sustainability measures to ensure a greener future. Heiko Claussen, Senior Vice President of Artifi cial Intelligence Technology at AspenTech, highlights AI’s role in the industry. He said, “While it may seem like something from futuristic science fi ction, chances are good that many people are already interacting with AI and machine learning systems – both Siri and Alexa use the technology to respond to spoken requests. In recent years, though, the reach of AI has grown dramatically and profoundly impacted industry.” AI is helping asset-intensive companies better understand and manage energy usage, increase effi ciency, automate pr ocess e s, and impr ove ass e t maintenance. “Many companies now rely on AI-driven hybrid models, which off er far greater fl exibility than traditional static models,” Claussen explained. “These hybrid models, based on real-world data and f irst-principles engineering, provide a highly accurate view into energy consumption. Operators can then optimise their assets to manage / AI’s ability to model energy usage benefits industrial facilities / AI helps asset-intensive companies better understand and manage energy usage and reduce energy usage and take advantage of renewable energy options, thus increasing sustainability.” AI’s ability to model energy usage benefi ts industrial facilities and utility operators. AI-enabled hybrid models are critical in managing electrical grids, forecasting renewable energy Globally data centres and technology costs account for 2-3% of global energy consumption Edge_Sep2024_42-45_Feature- Sustainability AI_13358969.indd 44Edge_Sep2024_42-45_Feature- Sustainability AI_13358969.indd 4402/09/2024 19:4702/09/2024 19:47FEATURE Edge/ September 2024 45 / Renewable Energy technologies are integral in reducing dependence on traditional sources roles in predicting and managing energy consumption. “Eaton’s Brightlayer Utilities suite employs machine learning and AI to analyse vast amounts of historical and real- time data, predicting energy consumption patterns accurately,” said Noureddin. These predictive capabilities ensure eff ective and sustainable energy use. Renewable energy technologies are integral in reducing dependence on traditional energy sources. “Renewable energy technologies, integrated through Eaton’s Power Expert Solar Inverter and Microgrid Energy Systems, are pivotal in decreasing reliance on fossil fuels. Smart grids facilitate the integration of intermittent renewable sources by using real-time data and advanced analytics to balance supply and demand,” Noureddin noted Several industries have successfully implemented Eaton’s new technologies production, and balancing distributed energy resources like rooftop solar panels, smart thermostats, and EV chargers. “As experienced operators retire and are replaced by younger, less- experienced workers, companies are turning to AI to simplify workfl ows and provide real-time guidance, maximising both performance and sustainability,” Claussen added. Qasem Noureddin, Managing Director at Eaton Middle East, underscores the potential of intelligent grid technology: “Eaton’s ‘Everything as a Grid’ approach fundamentally transforms how power is distributed, stored, and consumed. Eaton enables a more dynamic and responsive energy infrastructure by treating every component and participant in the energy ecosystem as an integral part of the grid.” Eaton’s Smart Grid Solutions utilise advanced sensors, communication networks, and AI algorithms to monitor and manage energy fl ows in real-time. “The Advanced Metering Infrastructure (AMI) provides utilities with granular insights into energy usage patterns, allowing for precise forecasting and load balancing,” says Noureddin. This real- time data enables dynamic rerouting of power to where it’s needed most, reducing energy wastage and enhancing effi ciency. A crucial element of this approach is the integration of energy storage systems. “Eaton’s energy storage solutions capture excess energy during low-demand periods and release it during high-demand times, ensuring a balanced supply and demand. This capability also mitigates the intermittency of renewable energy sources, ensuring a steady and reliable energy supply,” Noureddin explained. He highlighted how IoT devices contribute to more effi cient energy use in residential and commercial settings. “Eaton’s IoT solutions create a connected, data-driven environment that enhances energy effi ciency. Our IoT devices, such as the Energy Management Circuit Breaker (EMCB) and Home Automation Hub, provide detailed insights into energy usage, allowing for automated control and optimisation of appliances and systems.” Machine learning and AI play pivotal to achieve signifi cant energy savings. For instance, Eaton’s intelligent motor control centres (MCC) in manufacturing plants have optimised production processes, reducing energy consumption. Deploying Eaton’s building automation systems in commercial buildings has led to substantial cost savings. Additionally, integrating renewable energy sources and energy storage systems in various industries has decreased reliance on traditional energy sources and enhanced overall energy effi ciency. Continuous advancements in technology, particularly AI, will shape the future of energy consumption. Technology will be invaluable in identifying and implementing sustainable solutions as we navigate the energy transition, from increasing energy effi ciency to scaling renewable energy sources. Edge_Sep2024_42-45_Feature- Sustainability AI_13358969.indd 45Edge_Sep2024_42-45_Feature- Sustainability AI_13358969.indd 4502/09/2024 19:4702/09/2024 19:47FEATURE 46 Edge/ September 2024 SECURING IDENTITIES How BeyondTrust is Redefi ning Cybersecurity SMARTBUYS Words by Sindhu V Kashyap Identity protection has become paramount in an era of increasingly sophisticated cyber threats. BeyondTrust has risen to the challenge with its innovative Identity Threat Detection and Response (ITDR) platform, designed to safeguard organisations from identity-based attacks. Layale Hachem, Senior Solutions Engineer at BeyondTrust, off ers a deep dive into this solution’s development, capabilities, and impact, emphasising the platform’s critical role in modern cybersecurity. BeyondTrust’s ITDR platform was created in response to a growing recognition of the need to focus on identity protection beyond just privileged accounts. / BeyondTrust’s ITDR platform is designed to safeguard organisations from identity based attacks The security industry has traditionally concentrated on network and endpoint protection, often overlooking identities’ crucial role in cyber threats. As digital transformation accelerates, the number of human or machine identities within organisations has increased exponentially. This has expanded the attack surface, providing cybercriminals more opportunities to exploit weak or compromised identities. “Attackers are increasingly bypassing traditional defences by targeting identities,” explained Hachem. “It’s often easier for them to steal credentials and gain access to systems than to exploit technical vulnerabilities.” This realisation led BeyondTrust to develop a platform that off ers a comprehensive view of all identities within an organisation, aiming to detect unusual behaviour and recommend best practices for identity hygiene. The platform’s development was grounded in a deep understanding of the complexities involved in identity protection. BeyondTrust’s initial eff orts focused on integrating key identity systems, such as Active Directory and Okta, to gather and process vast amounts of identity data. These systems are often the backbone of an organisation’s identity infrastructure, managing user credentials, access controls, and authentication processes. By integrating these systems, BeyondTrust Edge_Sep2024_46-49_Smartbuys_13370508.indd 46Edge_Sep2024_46-49_Smartbuys_13370508.indd 4602/09/2024 19:4802/09/2024 19:48FEATURE Edge/ September 2024 47 collected a wealth of data on identities, privileges, and entitlements, providing a detailed view of an organisation’s identity landscape. Hachem explained that the platform’s architecture was designed to handle the complexity and scale of modern identity environments. “We leveraged AI and machine learning technologies to analyse and process the data, developing complex algorithms capable of identifying patterns, detecting anomalies, and correlating data points to provide actionable insights,” she said. These insights are crucial for identifying potential threats that might otherwise go unnoticed. A signifi cant aspect of the platform is its playbooks—predefi ned sets of rules and recommendations designed to help identify potential threats within an environment. These playbooks are continuously updated based on new data and emerging threats, ensuring the platform remains eff ective in a constantly evolving threat landscape. Collaboration between data scientists, security analysts, and software engineers was essential in developing the platform. Each team brought a unique perspective to the project, ensuring the platform was technically robust and aligned with real- world security needs. Data scientists focused on developing the machine learning models and algorithms that power the platform’s detection capabilities. At the same time, security analysts provided insights into the threats organisations likely face. Software engineers, meanwhile, ensured that the platform was scalable, reliable, and easy to integrate with existing security tools and processes. As BeyondTrust began collecting data during the platform’s initial phases, several critical insights emerged that shaped its further development. One particularly surprising discovery was organisations’ sheer complexity and volume of identity- related data. Many organisations had dormant accounts—unused accounts that still had access to critical systems or data. These accounts represent a signifi cant security risk, as attackers can exploit them to gain unauthorised access to an organisation’s network. The platform also uncovered misconfi gurations in access controls and It’s often easier for them to steal credentials and gain access to systems than to exploit technical vulnerabilities identity management processes, which attackers could exploit. Hachem recalled a notable incident during the Okta breach last year when BeyondTrust’s platform detected suspicious activities linked to the breach within their environment. “Thanks to the early warning provided by our platform, we were able to take immediate action, secure our environment, and notify Okta about the breach,” she noted. This real-world scenario underscored the platform’s effectiveness and the importance of proactive identity monitoring. The incident also highlighted the need for organisations to have comprehensive visibility into their identity landscape, as even a small oversight can lead to a signifi cant security breach. Testing the platform, particularly given its reliance on large volumes of data from diverse sources, was a meticulous and ongoing process. BeyondTrust focused on validating the accuracy and reliability of the data collected and the eff ectiveness of its machine-learning models. The rigorous validation process ensured that the connectors pulling data from various identity sources were accurate and comprehensive and that the aggregated data underwent thorough analysis. “We began by thoroughly testing the connectors that pull data from various identity sources, ensuring that the / Layale Hachem, Senior Solutions Engineer at BeyondTrust / The platform leverages AI and machine learning algorithms to analyse and process data Edge_Sep2024_46-49_Smartbuys_13370508.indd 47Edge_Sep2024_46-49_Smartbuys_13370508.indd 4703/09/2024 17:0303/09/2024 17:03FEATURE 48 Edge/ September 2024 information we gathered was accurate and comprehensive,” Hachem explains. “This data was fed into our machine learning engine, which underwent detailed analysis and correlation. Our analysts meticulously examined the results to validate them, cross-referencing them with known security threats and industry benchmarks.” This continuous refinement cycle ensures the platform remains responsive and eff ective as the threat landscape We believe that once customers fully understand the value of identity threat detection and the unique capabilities of the platform, they will be eager to adopt it evolves. The platform’s machine learning models are designed to learn from new data, improving their accuracy over time. Each time the platform detects a new threat or anomaly, this information is fed back into the system, allowing the models to refi ne their detection capabilities. By involving customers in real-world testing environments, BeyondTrust gathers valuable feedback, ensuring the platform meets its users’ evolving needs. This feedback loop is essential for keeping the platform up-to-date with the latest threats and ensuring it remains a valuable tool for organisations. It off ers businesses a comprehensive view of all identities within their environment, identifying potential vulnerabilities and off ering recommendations to maintain a robust security posture. “The platform’s detection capabilities are designed to identify unusual behaviour, such as suspicious login attempts, and allow businesses to take immediate action,” says Hachem. This proactive approach to identity security is crucial in an environment where attackers constantly develop new tactics to bypass traditional defences. In addition to enhancing security, the platform improves operational effi ciency within security operations centres (SOCs) by reducing the noise generated by siloed security solutions. One of the challenges that many SOCs face is the sheer volume of alerts generated by various security tools. These alerts can overwhelm security teams, making identifying and responding to the most critical threats diffi cult. By consolidating identity-related data and providing actionable insights, BeyondTrust’s platform helps SOC teams focus on the most pressing issues, reducing the time it takes to detect and respond to incidents. This improves the eff ectiveness of security operations and helps reduce the workload on security teams, allowing them to focus on higher-priority tasks. The platform supports regulatory compliance, helping businesses meet their obligations and avoid costly penalties. Many regulations, such as the General Data Protection Regulation (GDPR) in Europe and the Health Insurance Portability and Accountability Act (HIPAA) in the United States, require organisations to implement strong access controls and protect sensitive data from unauthorised access. BeyondTrust ’s plat form helps organisations meet these requirements by providing visibility into who has access to what data and ensuring access controls are correctly enforced. Hachem elaborated on the platform’s usability: “Designed with user-friendliness in mind, the platform presents complex data in a clear and actionable manner, enabling security teams to understand and respond to potential threats quickly. By automating many aspects of identity management and threat detection, the platform helps reduce the workload on security teams, allowing them to focus on higher-priority tasks.” This ease of use is a critical factor in the platform’s adoption, as it allows organisations to quickly deploy and start benefi ting from its capabilities without needing extensive training or resources. Looking ahead, BeyondTrust is focused / ITDR’s machine learning models are designed to learn new data, and improve accuracy with time Edge_Sep2024_46-49_Smartbuys_13370508.indd 48Edge_Sep2024_46-49_Smartbuys_13370508.indd 4802/09/2024 19:4802/09/2024 19:48FEATURE Edge/ September 2024 49 / BeyondTrust is focussing on making the platform more accessible and user-friendly on expanding the platform’s reach and capabilities. With plans to bring the solution to a global audience, BeyondTrust is committed to enhancing the platform’s d e te c t i o n a n d re co m m e n d a t i o n capabilities, refi ning AI models, and expanding integration with third-party solutions. “We are investing heavily in research and development to ensure that our platform remains at the forefront of the industry, continuously evolving to meet the needs of our customers,” Hachem emphasised. The company also focuses on making the platform more accessible and user- friendly, ensuring that organisations of all sizes can quickly deploy and benefi t from it. In addition to technical enhancements, BeyondTrust is engaging in extensive promotional activities to raise awareness of the platform and its benefi ts. The goal is to encourage potential customers to test the solution, see its value fi rsthand, and understand how it can transform their approach to identity security. Hachem points out that customer education is a critical component of their strategy: “We believe that once customers fully understand the value of identity threat detection and the unique capabilities of our platform, they will be eager to adopt it. To facilitate this, we are making the platform even more user-friendly and accessible.” BeyondTrust is also actively working on regional expansion, aiming to bring the platform to new markets, including Europe and Asia. This expansion is part of the company’s broader strategy to establish a global presence and ensure that businesses worldwide can access their innovative identity protection solutions. In parallel, BeyondTrust is looking to partner with local and global security providers to enhance the platform’s capabilities and off er customers a more comprehensive security solution. The platform’s business impact on customers is signifi cant and multifaceted. It helps organisations reduce their attack surface and proactively strengthen their security posture by providing comprehensive visibility into all identities within an environment. Hachem highlighted the platform’s role in preventing identit y-based attacks: “By focusing on identity hygiene and providing real-time detection of suspicious ac tivities, the platform helps organisations mitigate the risk of breaches that could result in data loss, fi nancial damage, and reputational harm.” This proactive approach to identity security protects the organisation’s assets and instils greater confi dence among stakeholders, including customers, partners, and regulators. Moreover, the platform supports compliance with various regulatory requirements, a critical concern for many organisations today. By ensuring that identities are appropriately managed and access controls are enforced, the platform helps businesses meet compliance obligations, avoid costly penalties, and demonstrate their commitment to protecting sensitive data. For customers, this translates into a more secure, resilient, and effi cient organisation better equipped to navigate the challenges of the modern threat landscape. As organisations continue to face increasingly sophisticated cyber threats, the importance of identity protection will only grow. Through continuous innovation and customer-centric development, BeyondTrust aims to make this platform the go-to solution for identity security worldwide, helping organisations protect their most valuable assets in an increasingly digital world. By addressing organisations’ evolving needs and staying ahead of emerging threats, BeyondTrust is poised to play a crucial role in shaping the future of cybersecurit y. The company’s commitment to innovation and its focus on customer success ensures that the ITDR platform will remain vital for organisations looking to secure their identities and safeguard their digital assets against the ever-changing threat landscape. Edge_Sep2024_46-49_Smartbuys_13370508.indd 49Edge_Sep2024_46-49_Smartbuys_13370508.indd 4902/09/2024 19:4802/09/2024 19:48Next >