< PreviousPICTURE PERFECT INTELLIGENT IP CAMERA PLATFORMS PROVE MORE THAN THEIR MONEY’S WORTH // INSIGHT / IP SURVEILLANCE // WWW.NETWORKMIDDLEEAST.COM /// 30 / NETWORK MIDDLE EAST / DECEMBER 2019 /ideo surveillance has traditionally been regarded as a very expen- sive cost centre. Not anymore. Now, video secu- rity platforms are increasingly seen as a means to generate new business and rev- enue opportunities. One of the main contributing factors to the incredible success of online compa- nies like Amazon is their ability to collect, analyse, and use the vast amounts of data their customers produce. When a store knows its consumer, it can tailor every shopping experience to suit their needs. Brick and mortar stores are now asking how they can possibly compete. The an- swer is video analytics. “Offline retailers see video analytics as a key tool for gathering information about how many people come into their stores, what they do while there, and which products they are looking at,” says Georges Tannous, director of marketing & strategic alliance, Genetec. Using this information displayed in heat maps or in people counting applica- tions, they can analyse merchandising browsing behaviours and calculate con- version rates: how many people go into their stores vs. how many people actually buy products. Then, with a greater un- derstanding of their customers’ behav- iour, they can make informed business decisions, including item placement and staff optimisation, to better serve shop- pers, Tannous says. Airports are also looking to make bet- ter business decisions that will improve customer traffic and increase revenue. In particular, they are looking for ways to optimise the flow of people through their spaces to make the process of boarding and disembarking as efficient as possible. Video analytics is a great tool for under- standing how long people stand in secu- rity lines, where roadblocks occur, and where people gather, Tannous observes. “With this information, airports can V optimise their staffing, reduce known congestion sites, and inform passengers where they should go and how long they can expect to wait in security lines. This will allow people to move through lines and checkpoints as quickly as possible, which can result in a direct increase in the revenue generated by duty- free shop- ping,” he adds. In smart city environments, data col- lected and understood through video analytics can provide cities with valu- able information about what’s happening on their roads, how many cars are on a given street or how many cars are going through a specific intersection. “This data can be invaluable for city planning, particularly when it comes to traffic co- ordination,” says Tannous. City planners and traffic engineers can use this information, for example, to re-route traffic through alternative routes during rush hour to avoid conges- tion and to optimise the flow of vehicles through their streets. This would not only make commuters happy but could also reduce car emissions as vehicles would travel at a more consistent speed. The latest sensors in network camer- as can accurately measure environmental impact across an organisation’s sites, ef- fectively acting as highly sensitive artifi- cial ‘noses’ calibrated to different forms of output, and thermal imaging can be used to pinpoint areas of energy wastage. For instance, one critical area where such sensors can heighten awareness, understanding and, increasingly al- low for remedial action is in air quality. “Whether inside buildings or in the ex- ternal urban environment, the negative impacts on health and associated costs are becoming an ever-greater issue. Smart sensors will have a central role to play in addressing the problem globally,” explains Ettiene Van Der Watt, business development director, Axis Communica- tions Middle East & Africa. “Such applications add value to or- ganisations through efficiencies and cost savings (and, hopefully, health benefits), but also help them reach their own envi- ronmental and sustainability goals,” Van Der Watt adds. In themselves, individual sensors such as those described above can deliv- er significant benefits. But increasingly, vendors will be combining and integrat- ing sensors to prompt ‘smart’ actions. For instance, a motion sensor con- nected to a barrier could trigger a cam- era which, in turn, would trigger an alert AI and machine learning will be the key features for any surveillance solution moving forward.” SAKKEER HUSSAIN, DIRECTOR, SALES & MARKETING, D-LINK MIDDLE EAST & AFRICA // INSIGHT / IP SURVEILLANCE // DECEMBER 2019 / NETWORK MIDDLE EAST / 31// WWW.NETWORKMIDDLEEAST.COM /clothes are,” he adds. These analytics are intelligent enough to enable alerts when breaches or programmed rules are broken; an example is that a trespasser could enter a predefined area and raise an alarm that could be viewed by the sys- tem operators, who then could raise the need to action – based on configuration and security need In addition to the simple rule restrict- ing humans or vehicles from certain ar- eas at certain times of day, more complex rules can be set. The user of the system may wish to know if vehicles drive in one direction but not the other. Users may wish to know that there are more than a certain pre-set number of people within an area, explains Van Der Watt. Video analytics, powered by the ad- vances in computing power, has evolved considerably to extract very reliable and powerful data from video streams. And the industry itself is getting better at pre- senting the mined data in more consum- able ways, says Tannous. “We see a more end-user-oriented approach towards the development of systems. Instead of just providing all the data that is available, so- lution providers are looking at what us- ers actually need and how to present that information in the clearest possible way,” he adds. MACHINE LEARNING AND AI The next phase in the evolution of vid- eo analytics software will be acquiring the ability to interpret the behaviour of persons, which will involve further deep learning. AI and ML will be the important components in many different applica- tions and products in the future, ob- serves Sakkeer Hussain, director, Sales & Marketing, D-Link Middle East & Africa. “AI has already made a significant posi- tive impact on different areas like health- care and video surveillance is becoming one of them. AI and ML will be the key features for any surveillance solution moving forward,” he adds. Artificial intelligence (AI) will be utilised to tackle challenges that cannot requires using algorithms that can un- dertake advanced analytics. ANALYTICS Organisations of every type and size are always looking to make more informed decisions. In order to do better and plan for the changing world, they want to have access to as much information as possible. And, rather than implement- ing a new information gathering sys- tem, many are looking to mine the data already being collected by their physi- cal security systems. But it’s not enough to simply access this data. You need to make sense of it, and that’s where video analytics comes in. In general, analytics tools take large amounts of unstructured data and struc- ture it to allow users to unlock its value, says Tannous. “Traditionally, security departments used video analytics as a reactive tool that could detect something in a live video stream and then create an event that operators could respond to. Leveraging the latest innovations, organ- isations realize that you can use video, as well as other related data from access control and license plate recognition, for more than physical security,” he adds. Cameras are increasingly connected to the internet and transitioning into in- telligent sensors that collect significantly more data than video security images alone. The level of connectivity and col- lection of business intelligence becomes more widespread every day and video analytics play a big role in this, says Ha- kan Ozyigit, regional director of Security Systems & Building Technologies, Robert Bosch Middle East. With previous technology, some cameras were mostly able to do limited object detection, such as distinguishing between a person walking and a car driv- ing. Better algorithms now enable video monitoring systems to figure out specific details about what cameras are seeing, observes Van Der Watt. “This includes more granular information such as if the person in the video is male or female, tall or short, and what colour his or her in the operations centre, allowing for a rapid and appropriate response. Or an en- vironmental sensor could again trigger a video or thermal camera to quickly iden- tify fires or spillages, again prompting alerts which will create a more rapid and effective response. “When the range of sensors are considered – from thermal to motion, from atmospheric to video – the ways in which they could be combined are endless, as are the potential benefits of doing so,” says Van Der Watt. Leveraging cameras in this way Smart network cameras can provide more than just live video feeds or recorded clips.” GEORGES TANNOUS, DIRECTOR OF MARKETING & STRATEGIC ALLIANCE, GENETEC // INSIGHT / IP SURVEILLANCE // WWW.NETWORKMIDDLEEAST.COM /// 32 / NETWORK MIDDLE EAST / DECEMBER 2019 /be solved today, says Bosch’s Ozyigit. A good example is facial recognition at air- ports or other applications. “Without the use of AI, it is difficult to easily identify individuals in mostly so-called “non-co- operative face recognition” situations,” Ozyigit observes. Non-cooperative here means that the person to be detected is not necessarily aware of it and is not fac- ing the camera. Facial recognition software based on AI can be used to find and identify miss- ing or wanted persons or objects in more crowded scenes. This is of course must be achieved in a manner respectful of people’s privacy and freedom, with the only objective being public safety, cau- tions Ozyigit. Machine learning can help cities and law enforcement deploy their physi- cal resources more efficiently based on predicted trends in crime. For example, Genetec Citigraph crime prediction and resource deployment software-as-a- service (SaaS) utilises an unsupervised machine learning algorithm to estimate how the occurrence of different types of crime can influence the risk of other crimes occurring in the future. “In these cases, there are no “ground truths” in the original problem and the answers are learned from the data. With its correla- tion engine, Citigraf Command identi- fies possible relationships between data points, including events,” explains Conventional AI application for secu- rity is known as “rule-based” because a human programmer must set rules for all of the things for which the user wishes to be alerted. A newer, non-rule-based form of A.I. for security called “behavioural analyt- ics” is emerging. “This software is fully self-learning with no initial program- ming input by the user or security con- tractor,” observes Van Der Watt. In this type of analytics, the AI learns what normal behaviour is for people, ve- hicles, machines, and the environment based on its own observation of pat- terns of various characteristics such as size, speed, reflectivity, colour, grouping, vertical or horizontal orientation and so forth AI does not know or understand what a human is, or a fire, or a vehicle. It is sim- ply finding characteristics of these things based on their size, shape, colour, reflec- tivity, angle, orientation, motion, and so on. It then finds that the objects it has classified have typical patterns of behav- iour, Van Der Watt explains. Despite the development of technolo- gies designed to reduce storage and band- width needs, the data demands for video surveillance are still significant. This is where the benefits of edge computing come to the fore. As its name suggests, edge computing puts more data processing at the ‘edge’ of the network, close to where the data is collected by the sensor and before transfer to the data centre, explains Van Der Watt. In IP surveillance, edge computing means processing data within the camera itself. Initial processing of data within the camera can significantly reduce the bandwidth demands of both data trans- fer and storage. “Additionally, data can be anonymised and encrypted before it is transferred, addressing security and pri- vacy concerns,” says Van Der Watt. Smart network camera solutions can provide more than just live video feeds or recorded clips. “A unified platform that is integrated with state-of-the-art security devices collects an incredible amount of data that can be turned into actionable intelligence to help you move beyond visual security into understanding your whole environment,” says Tannous. The regional video surveillance mar- ket is primarily driven by a booming building and construction industry, in- creased foreign investments, along with rising security concerns, security spend- ing and international events. “The market is exhibiting growing demand for IP/ network video surveil- lance systems, where analogue video surveillance systems continue to decline in market share,” D-Link’s Hussain says. Additionally, the market is witness- ing growing trend on video analytics software and pan-tilt-zoom (PTZ) IP cameras, says Hussain. In the forecast period, upcoming events such as Expo 2020 and Football World Cup 2022, will create huge demand for video surveil- lance systems, Hussain adds. Utilising the latest advancements in analytics machine learning and artificial intelligence, organisations can and are increasingly using video content to drive their business objectives. AI will be utilised to tackle challenges that cannot be solved today.” HAKAN OZYIGIT, REGIONAL DIRECTOR OF SECURITY SYSTEMS & BUILDING TECHNOLOGIES, ROBERT BOSCH MIDDLE EAST // INSIGHT / IP SURVEILLANCE // DECEMBER 2019 / NETWORK MIDDLE EAST / 33// WWW.NETWORKMIDDLEEAST.COM /CYBERCRIMINALS ESCALATE ATTACKS, ADDING NEW SCARY MONIKERS TO THE CYBERCRIME VOCABULARY 2019 HELD TO RANSOM 2019 HELD TO RANSOM // ANALYSIS / CYBERSECURITY TRENDS // WWW.NETWORKMIDDLEEAST.COM /// 34 / NETWORK MIDDLE EAST / DECEMBER 2019 / // ANALYSIS / CYBERSECURITY TRENDS // WWW.NETWORKMIDDLEEAST.COM /// 34 / NETWORK MIDDLE EAST / DECEMBER 2019 /It is far simpler to penetrate cyber defences from inside a company by leveraging the employees without necessary awareness level.” AMIR KANAAN, GENERAL MANAGER FOR THE MIDDLE EAST, KASPERSKY LAB and speed. This trend looks likely to con- tinue unless more organisations make a shift as to how they think about their security strategies. With the volume, velocity, and sophistication of today’s global threat landscape, organisations must be able to respond in real-time at machine speed to effectively counter ag- gressive attacks. Advances in artificial intelligence and threat intelligence will ybercriminals have kept security teams busy this year. It has been especially hectic for organi- sations involved in defending against ransomware and supply chain attacks. So prevalent have been ransom- ware attacks, they have largely lost their shock value, although not their destruc- tive effects. The ransomware family that has attacked users the most this year con- tinues to be WannaCry. The WannaCry ransomware attack was a global cyber- crime epidemic that took place in 2017 and since then has affected computers globally running Microsoft Windows operating system. According to Kasper- sky’s IT threat evolution Q2 2019, Wann- aCry was the most common ransomware and affected 23.37% users, observes Amir Kanaan, general manager for the Middle East, Kaspersky Lab. Earlier this year, Kaspersky re- searchers also discovered a new ad- vanced persistent threat (APT) cam- paign that has affected a large number of users through what is known as a supply chain attack. “Our research found that threat actors behind Operation Shad- owHammer have targeted users of the ASUS Live Update Utility. It is a highly sophisticated supply-chain attack that matches or even surpasses the Shadow- Pad and the CCleaner incidents in com- plexity and techniques,” says Kanaan. Kaspersky’s response to the Wan- naCry ransomware attacks was to host an emergency webinar where its secu- rity teams reached out to businesses that were affected to help them understand and defend themselves against the ran- somware. Experts presented the latest information on how the ransomware breaches defences and also on the sub- sequent stages of the attack. In addition, the webinar also explained how organi- sations could determine if they have been infected and named the critical actions they need to take to secure their networks and endpoints against this threat, Kanaan explains. In the case of the ShadowHammer attack, Kaspersky took immediate steps to appropriately respond to the incident. We first contacted ASUS to inform them about the attack and support them in their investigation with IOCs and de- scriptions of the malware. “The ShadowHammer campaign made us realize how sophisticated and dangerous a smart supply chain attack can be,” says Kanaan. To reduce the risk of ransomware infection, it is important for users to up- date their operating systems regularly. The victims of the WannaCry attack were affected because they had not up- dated their Microsoft Windows operat- ing system. “Keeping your software and operating system updated is an essen- tial step for ransomware protection. A good precautionary measure is to back up your data on an external hard drive or cloud storage. In case your data is compromised due to a ransomware at- tack you will have your data backed up safely,” Kanaan recommends. In the case of the Operation Shad- owHammer attacks, the attackers got valid certificates and compromised their victims’ development environments. “In order to prevent a supply-chain attack, we would recommend software vendors to introduce another procedure into their software production process that additionally checks their software for potential malware injections even after the code is digitally signed,” Kanaan of Kaspersky says. “The lessons we’ve taken away from both these attacks has been to try and understand the motives behind why cybercriminals carry out these attacks. This helps us to learn their behaviour and anticipate their future attempts. By doing this we can then update our prod- ucts to tackle even the most sophisticat- ed attacks,” Kanaan says. Cyberattack methodologies have become more sophisticated in recent years, magnifying their effectiveness C // ANALYSIS / CYBERSECURITY TRENDS // DECEMBER 2019 / NETWORK MIDDLE EAST / 35// WWW.NETWORKMIDDLEEAST.COM /technology,” says Derek Manky, chief, security insights & global threat alli- ances, Fortinet. “Luckily, this trajectory is about to shift, if more organisations use the same sorts of strategies to defend their net- works that criminals are using to target them. This requires a unified approach that is broad, integrated, and automated to enable protection and visibility across network segments as well as various edges, from IoT to dynamic-clouds,” Manky adds. AWARENESS An additional lesson is that there is still a lack of awareness about how to protect corporate assets against cyber threats. “Cyber awareness plays a pivotal role in building sustainable protection for any organisation. As cyber-attacks become harder to detect and more user-centric, they focus on targeting employees,” warns Kanaan. “It is far simpler to penetrate cyber defence measures from inside of a com- pany by leveraging employees without necessary awareness level rather than from outside. Hence, it is important for organisations to hold training sessions, to improve employees’ cyber-aware- ness,” he adds. According to the 2019 Fortinet Threat Landscape Report, the majority of malware is delivered via email. Realising this, many organisations have been aggressively ad- dressing phishing attacks with end user training and advanced email security tools. As a result, cybercriminals are expanding their ability to deliver mali- cious malware through other means. These include targeting publicly facing edge services such as web infrastruc- ture, network communications proto- cols, as well as bypassing ad blocker tools to open attack vectors that don’t rely on traditional phishing tactics. Awareness around the need for data be vital in this fight, experts at Fortinet contend. Much of the success of cyber adversaries has been due to the ability to take advantage of the expanding attack surface and the resulting security gaps due to digital transformation. Most re- cently, their attack methodologies have become more sophisticated by integrat- ing the precursors of AI and swarm privacy and data protection has in- creased significantly over recent years mostly as a result of regulations such as GDPR and CCPA, observes Duncan Brown, EMEA chief security strategist at Forcepoint. From speaking to organisations around the globe, it has become appar- ent that acceptance to maintaining an individual’s (customer’s) privacy and protecting their data can be a differen- tiator of a business’s service. Many businesses focused on the headline takeaways from such regula- tions – most notably that a data breach of personal data belonging to European citizens will result in large fines. In 2020 organisations will explore the non- breach non-compliance implications of data privacy and protection regulations. This will invoke a move from a breach prevention approach to a more holistic principles-based approach. Currently, many businesses are manually compliant to the regulations, in that, should they receive a high vol- ume of Subject Access Requests under GDPR, for example, they may struggle to service that volume of requests in a timely fashion. Thus businesses will look to automate through the adoption of suitable technology, Brown says. 2020 Cybersecurity is evolving to accommodate emerg- ing technologies such as 5G, AI, IoT, WiFi 6. These technologies bring the possibility of innova- tion and enhanced produc- tivity to the forefront, but also bring with them a host of cyber threat issues. “Hackers can take advan- tage of the fact that users’ limited un- derstanding of how these technologies work. To jump ahead and prevent this from happening, cybersecurity experts are leveraging their technological ca- pabilities to mitigate or even completely nullify the impact of these cyber threat attacks,” says Kanaan. 23% Users aff ected by WannaCry Attack meth- odologies have become more sophisti- cated by integrat- ing the precursors of AI and swarm technology.” DEREK MANKY, CHIEF, SECURITY INSIGHTS & GLOBAL THREAT ALLIANCES, FORTINET // ANALYSIS / CYBERSECURITY TRENDS // WWW.NETWORKMIDDLEEAST.COM /// 36 / NETWORK MIDDLE EAST / DECEMBER 2019 /The advent of 5G may end up being the initial catalyst for the development of functional swarm-based attacks. This could be enabled by the ability to create local, ad hoc networks that can quickly share and process information and ap- plications. By weaponising 5G and edge computing, individually exploited de- vices could become a conduit for mali- cious code, and groups of compromised devices could work in concert to target victims at 5G speeds. Given the speed, intelligence, and localised nature of such an attack, legacy security technolo- gies could be challenged to effectively fight off such a persistent strategy, Forti- net experts warn. As we enter 2020 more and more organisations, especially government agencies, are moving to the Cloud as part of their digital transformation. We Attackers will have a renewed focus on public cloud accessible systems and data in 2020 and beyond due to the rich- ness of the prize and ease of accessing it. Experts at Forcepoint expect to see more breaches both from external and internal parties as Cloud applications become more ubiquitous. The ability of cybercriminals to adapt to any emerging technologies is frightening. That said, as we have seen in 2019, attackers are penetrating net- works though tried and tested methods such as phishing and exploiting un- patched operating systems. Although there will be attacks leveraging AI and 5G in the future, organisations getting the basics right, including awareness campaigns and backing up data, will go a long way in preventing the devastation we have seen this year. should expect to see greater and greater breaches of Public Cloud systems as a result, says Eric Trexler, VP, Global Gov- ernment at Forcepoint. This change will come about, in part, due to a shifting emphasis mandated by governments around the globe. As organisations go from “Cloud First”, or “Cloud All”, to “Cloud Smart” they tend to remain “Cloud Dumb” as it relates to securing their systems in the Pub- lic Cloud. Typical Public Cloud vendor shared responsibility models state the cloud service providers are responsible for protecting infrastructure while the customer is responsible for protecting their data, monitoring access, managing configurations, observing anomalous user behaviours, monitoring system vul- nerabilities and patching, and analysing suspicious host and network activities. // ANALYSIS / CYBERSECURITY TRENDS // DECEMBER 2019 / NETWORK MIDDLE EAST / 37// WWW.NETWORKMIDDLEEAST.COM /The Veritas Flex 5150 appliance is a data protection platform built for the edge of enterprise networks. The Flex 5150 is the first appliance from Veritas to bring the NetBackup data protection to edge, branch, and remote offices. Designed for locations with limited space and IT re- sources, the Flex 5150 is a fully functional NetBackup solution that integrates with NetBackup in the core data centre and the cloud. Veritas Flex 5150 //Product_Watch Want to showcase your latest product here? If you have any new innovative products, please e-mail: david.ndichu@itp.com Hot product Panasonic KX-VC range The Panasonic KX-VC HD Visual Communication range with the new Version 6.0 software is now available. The software update features a new function – the Web Hybrid Mode –which enables users to bridge HDVC and web conference together on a computer. Software Version 6.0 is now included across KX- VC models. A new USB Device Mode enables the use of existing peripherals of HDVC unit in Web conferences. Kingston Datacentre 450R SSD The Kingston Data Centre 450R (DC450R) Enterprise SSD is a 6Gbps SATA SSD with 3D TLC NAND, designed for read-centric application workloads. The Kingston DC450R is de- signed for workloads that require 24/7 uptime and reliability, such as content delivery networks (CDN), edge comput- ing applications and other software- defined storage architectures. The DC450R is available in 480GB, 960GB, 1.92TB and 3.84TB1 capacities. Aruba CX 6300 Switch The Aruba CX 6300 Se- ries is a family of stackable switches that offers flexible growth via a 10-member virtual switching framework (VSF) and provides built-in 10/25/50 gigabit uplinks to meet the bandwidth needs of today and the future. The Aruba CX 6400 Series modular switches offer both a 5-slot chassis and a 10-slot chassis with a non-blocking fabric that scales from Gigabit POE access to 100G core. Compact form-factor Remote access Multiple configuration options Redundant power supplies and fans ONES TO WATCH The new products are available immediately // PRODUCT WATCH / // WWW.NETWORKMIDDLEEAST.COM /// 38 / NETWORK MIDDLE EAST / DECEMBER 2019 /The D-Link 8MP Varifocal Motorised Network IR Bullet Camera is a new IP surveillance camera from the global tech company. It features a 1/2”, 8.0 megapixel, progres- sive scan, CMOS as well as 2.8 ~ 12mm, AF automatic focusing and motorised zoom lens. Its optical glass window delivers higher light transmittance while an IR anti-reflection window increases the infrared transmit- tance. Its Smart IR offers up to 50m (164ft) IR distance. It has up to 120 dB Optical WDR (Wide Dynamic Range). D-Link DCS-F5728E IP camera The SteelConnect EX, a WAN Edge Infrastructure platform from Riverbed, is now available. As enterprises become more distributed and as they place mission-critical applications in the cloud, there is mounting pressure to modernise the WAN and change the way apps are delivered. When devising a strategy for modernising the WAN, IT leaders must fully address the implications and requirements of expanded public cloud workloads and SaaS applications; pervasive connectivity for people, places, and things; and network traffic shifting from private links to the public Internet. This requires a shift from traditional networks to a next-generation network that is software-defined and secure. Who needs the product? To meet the needs of today’s modern digital enterprise, IT leaders are deploying hybrid WAN topologies that combine on-premises and off-premises infrastructure, connected by private and public transport types. However, with traditional approaches to networking, these hybrid environments are overwhelmingly complex to manage, protect and op- timise from a performance and cost perspective. SD- WAN is largely viewed as the right approach to overcome the complexity of manag- ing hybrid and Internet-only WANs, with the promise of boosting agility while reduc- ing WAN circuit costs. What benefits does it of- fer targeted customers? Riverbed SteelConnect EX seeks to propel mainstream SD-WAN adoption across enterprises and smaller businesses. Its routing stack ensures that Riverbed’s SD- WAN solution can co-exist and interoperate with legacy networks, while SD-WAN services enable organisa- tions to adopt hybrid and Internet-based topologies without compromise to operational efficiency or WAN reliability. Riverbed’s combination of SD-WAN, network security and appli- cation acceleration enables large organisations to deploy and operate SD-WAN at high scale (5,000 sites). SELLING POWER Khwaja Saifuddin, senior sales director, Middle East, Western Digital SELL IT TO ME Riverbed SteelConnect EX What is the product? Western Digital has introduced a range of purpose-built storage prod- ucts for NAS environments. The new products include the first-ever WD Red SSDs, designed to enhance performance and cache abilities in a hybrid NAS environment, as well as a 14TB capacity for the WD Red and WD Red Pro HDDs. Why is it important? With the increase in virtualisation, 10GbE (10 Gigabit Ethernet) and higher connectivity speeds are becoming an essential feature set in modern NAS systems. To help minimise a performance bottleneck, SSD speeds are crucial. To support the requirements of these environ- ments, storage device durability, speed and capacity remain heavily in demand. Why is it different? When utilised as a caching solution in a NAS system, the WD Red SA500 SSD helps to boost performance while the new higher capacity WD Red and WD Red Pro HDDs offer more storage space in the same NAS device. Creators or small businesses can work more efficiently to increase output and, as a result, potential income. // PRODUCT WATCH / // DECEMBER 2019 / NETWORK MIDDLE EAST / 39// WWW.NETWORKMIDDLEEAST.COM /Next >