Category: IoT

  • HP Launches ‘Sure Access Enterprise’’ to Protect Users’ access to Data

    HP Launches ‘Sure Access Enterprise’’ to Protect Users’ access to Data

    HP Inc., a multinational information technology company, has announced enhancements to its HP Wolf Security endpoint protection portfolio through the launch of Sure Access Enterprise (SAE), which protects users with the right to access sensitive data, systems, and applications.  

    SAE safeguards against attackers from hijacking these privileged sessions; regardless of whether the users’ endpoint device is compromised, access to high-value data and systems remains safe. This prevents modest endpoint compromises from escalating into significant security problems. The program utilizes HP’s unique task isolation technology to operate each privileged access session within its own hardware-enforced virtual machine (VM). The program is available for both HP and non-HP devices.

    In addition, the application safeguards the privacy and authenticity of the data by separating it from any malicious software running on the Operating endpoint system. Users can safely perform privileged, non-privileged, and personal activities from a single computer. This improves the user experience, lowers IT costs and increases security.

    Ian Pratt, Global Head of Security for Personal Systems at HP Inc., said, “Securing access to the device of a privileged user is a vital stage in the attack chain.” An attacker can scrape credentials, elevate privileges, move laterally, and exfiltrate sensitive data from this point. “Sure Access Enterprise is a unique solution that prevents escalation and thwarts attackers.”

    Read also: Africa Data Centre Joins Force With IXPN Nigeria

    Significant importance of SAE to organizations

    In organizations, several users may regularly need access to privileged information, systems, and applications,  ranging from IT administrators and IoT/OT support employees to customer service representatives and accounting professionals. There is a high degree of vulnerability in allowing these users to carry out privileged and non-privileged tasks on the same PC.

    If the endpoint is hacked, attackers may be able to hijack privileged sessions, acquire sensitive data and credentials, or inject malicious code and instructions (for instance, through injected keystrokes, clipboard capture, or memory scraping). This can still occur even if a Privileged Access Management (PAM) system is used to manage access to privileged systems.

    The standard protocol has always been to provide privileged’ users with unique Privileged Access Workstations (PAW) with which they can perform only specified activities. However, this causes difficulties for end users and raises IT costs due to the necessity to purchase and manage two different systems.

    The program can also secure critical assets

    SAE creates protected VMs leveraging sophisticated hardware-enforced virtualization that is segregated from the desktop operating system and thus cannot be accessed, manipulated, or controlled by it. Hence, without the operational expense and complexity of issuing a separate PAW, the confidentiality and integrity of the application and data within the protected VM can be secured.

    Pratt elaborates, “Sure Access Enterprise breaks the attack chain by isolating tasks in protected VMs, which are transparent to the end user.” “As well as protecting System Administrators accessing high-value servers, SAE can be used to protect other sensitive assets – for example, protecting credit card details accessed by customer support at a retailer, patient data access at a healthcare provider, or connections to an Industrial Control System at a manufacturer.”

    Sure Access Enterprise is now available. Highlighted below are its features:

    • Strong Integrations with Privileged Access Management (PAM) solutions (e.g., CyberArk, BeyondTrust), IPSec remote access tunnels and Multifactor Authentication (MFA).
    • Centralized Management enables separation of duties and flexible policy options – such as locking connections to specific PCs or users or requiring HP Sure View activation for privacy.
    • Hardware root of trust, supported by the latest Intel® technologies, to prevent malware from bypassing security controls
    • Encrypted, tamper-resistant session logging to track access without recording sensitive data or credentials, easing compliance.

    About HP Wolf Security

    HP Wolf Protection is new endpoint security from the makers of the world’s most secure PCs and printers. HP’s portfolio of hardware-enforced security and endpoint-focused security services is intended to assist enterprises in protecting PCs, printers, and people from cyber predators. HP Wolf Security offers full endpoint protection and resilience, beginning with hardware and extending to software and services.

  • Tanzania-China 5G Partnership Boosts Digital Economy

    Tanzania-China 5G Partnership Boosts Digital Economy

    The digital economy of Tanzania stands to benefit from China’s support in promoting ICT (information and communication technologies). The two parties have signed a partnership agreement that will promote the adoption and development of fifth-generation (5G) mobile technology in the country.

    The government of China has shown its readiness to allow investment in 5G network trials as a catalyst for its digital economy drive since Tanzania aims to build a digital economy achieved to spur development and increase employment, especially for young people through technological innovation.

    The agreement was signed by Tanzania’s Minister of Information and Communication Technology, Nape Nnauye, and the Chinese Ambassador to Tanzania, Chen Mingjian.
    The partnership shows that Tanzania recognizes that the backbone of the digital economy is hyper-connectivity, which means the growing inter-connectedness of people, organizations, and machines that results from the Internet, mobile technology, and the Internet of Things (IoT).

    Tanzania’s Economic Growth History

    Tanzania’s economy reflects sustained macroeconomic stability that has supported growth, in addition to the country’s rich natural endowments and strategic geographic position.
    Following two decades of sustained growth, Tanzania reached an important milestone in July 2020, when it formally graduated from low-income country to lower-middle-income country status. This growth is set to improve with China’s partnership.

    More About The 5G Partnership Talk

    This partnership came after the Tanzanian authorities allowed investments in 5G, as a sigh of relief for companies like Vodacom, which has been advertising its ambitions for this technology since 2020.

     

    Read Also : Telkom Kenya Plans Credit Program For SMEs

     

    Speaking on the partnership, China’s ambassador to Tanzania, Chen Mingjian, said; “We will continue to motivate investors in the telecommunications sector in our country so that they can deliver these services as stated by the minister (Nnauye),”

    While acknowledging that the issue of cyber security poses a number of challenges that China has been facing every waking hour, Ambassador Chen stressed that they still see the need to work with Tanzania to ensure cyber security is guaranteed by setting the environment and infrastructure that will enable Tanzania to respond to cyber threats.

    Tanzania’s Minister of Information and Communication Technology, Nape Nnauye said in response to the ambassador, “Basically we have also agreed to further improve the issue of online security, especially in the area of capacity building for our ICT experts, exchange technology programmes that will enable the development of cross-sectorial economic development sectors such as agriculture, health, internet business and so on.”

    China’s ambassador to Tanzania, Chen Mingjian, also assured the minister that she would send a message to other countries to support Tanzania in vying for the position which will see 13 African countries selected for ITU positions at the Bucharest conference in Romania to be held in September and October this year.

    Tanzania will therefore benefit from the experience and expertise of Chinese technology companies such as ZTE for the deployment of 5G and related technologies.
    In parallel, China supported Tanzania’s bid for membership in the International Telecommunication Union (ITU), while taking the opportunity to ask Tanzania for its support in various aspiring positions.

    The talks also focused on deploying telecommunications services in inaccessible areas, especially in rural areas, where China agreed to continue cooperating with Tanzania to ensure that the goal is achieved.

  • AIMS (Ghana) and Google (Africa) have teamed up to conduct cooperative research in Africa.

    AIMS (Ghana) and Google (Africa) have teamed up to conduct cooperative research in Africa.

    The African Institute of Mathematical Sciences—Ghana (AIMS Ghana) has signed a Masters Sponsored Research Agreement (MSRA) with Google Research to advance the boundaries of scientific research in areas of speciality such as artificial intelligence. The agreement aims to strengthen collaboration between the two institutions as part of their ongoing efforts to collaborate and improve computing and technology in Africa.

    “We are delighted about this cooperation since it will allow our researchers and students to strengthen their work with scientists at Google Research.” AIMS is Africa’s largest network of postgraduate training centres in mathematical sciences and applications.

    We are passionate about empowering talented young Africans to be innovative leaders in science and technology. We ensure that our students and graduates are in touch with reality and hungry for greatness in addressing Africa’s significant challenges. — AIMS Chief Executive Officer Lydie Hakizimana

     

    Google’s Support For AIMS

    Google supported the institution as one of the founding partners of the African Masters in Machine Intelligence (AMMI) Program in 2018, which has successfully trained over 100 students in AI and data science. Many people think that the AMMI programme is the best way to teach Artificial Intelligence (AI) in Africa. It has been successfully used in three AIMS Centres: Rwanda, Senegal, and Ghana.

     

    Read Also : Major Telcos Join Huawei to Release IntelligentRAN

     

    “Our collaboration with AIMS began in 2018, with the African Master’s in Machine Intelligence launch, which we are pleased to continue financing.” I was reminded of Africa’s great potential during my visit to the Ghana Campus last week, and we’re excited to deepen our collaboration with AIMS by signing the Master Sponsored Research Agreement, which will enable research and leadership sponsored programmes to develop young tech-talent in Africa.

     

    AIM’s AI and Machine Learning

    “AI is a magnificent instrument that provides us with the ability to change our world and will assist us in building in Africa, for Africa, and the globe. – Prof. Yossi Matias, Vice President of Engineering and Research at Google

    Over the last three years, Google Research’s AI Lab in Accra has hosted various AIMS researchers, including some AMMI programme alumni, shaping the usage of machine learning technology in Africa.

    Among these alumni is Abigail Annkah, who joined Google Research in Accra as a Research Software Engineer after graduating from our AMMI Program. Because of what she did to help improve GoogleMaps, millions of buildings and square kilometres of roads that had not been mapped before are.

  • IoTFA 2022 : Johannesburg Gears up for the 5th IoT Forum Africa

    IoTFA 2022 : Johannesburg Gears up for the 5th IoT Forum Africa

    IoTFA 2022 is here, in the past few years, organizations of all sizes have had to adapt to a proliferation of new technologies such as artificial intelligence (AI), cloud computing, blockchain, 5G, and the Internet of Things (IoT).

    As a result, policymakers have come to conclude that, for IoT to function effectively, it will need more than just infrastructure – it will also need innovative solutions to ensure its sustainability and security. And while there is a real hype surrounding IoT, very few enterprises know how to actually make the most of it.

    This is why Johannesburg is gearing up for the fifth Internet of Things Forum Africa ( IoTFA 2022). This two-day hybrid conference is set to take place from 29 to 30 March 2022 at The Maslow Hotel, Johannesburg, South Africa.

    Under the theme, “Enabling Enterprise Transformation with IoT”, #IOTFA2022 will see hundreds of Africa’s top tech heavyweights become equipped with the knowledge and tools needed to plan and implement successful IoT projects going forward.

    The forum will also look into IoT, AI, and big data convergence, as well as sustainable ecosystems that can truly tap into this connected technology.
    This event will push for the evolution of IoT from the project stage into real-world production as soon as possible.

    Johannesburg Gears up for the 5th IoT Forum Africa
    The Speakers confirmed for IoTFA 2022 include:

    • Paul Morley– Enterprise Data Executive at Nedbank, Mathew Bernath – Head of Data Analytics at Rand Merchant Bank, Abe Wakama – Chief Executive Officer at IT News Africa
    • Maritza Curry– Data & Analytics Professional at RCS Group (South Africa)
    • Maciej Kaliszka – Head: Analytics (Corporate Investment Banking at Pan Africa)
    • Jawad Raza – SVP Head of Data Analytics, Big Data, AI at Meezan Bank Limited
    • Ian Oppermann – NSW Government Chief Data Scientist and Industry
    • Sarah Gadd – Head of Data and Artificial Intelligence at Credit Suisse
    • Hartnell Ndungi – Chief Data Officer (CDO) at ABSA Bank Kenya PLC
    • Amer Hussain – Senior Vice President Integrated Supply Chain Leader: India & International at Jubilant Foodworks Ltd (India), Alejandro Correa Bahnsen – PhD, Chief Artificial Intelligence Officer at Rappi (Colombia), Vukosi Sambo – Head of Data Solutions at Medscheme.

    Enabling Enterprise Transformation with IoT

    Internet of Things Forum Africa is the premier African event on the Internet of things. It pushes the narratives and boundaries of how IoT can deliver unprecedented intelligence to drive performance, growth, and profitability.

    The forum provides an opportunity for industry stakeholders to engage with 600+ executives, entrepreneurs, and solution providers in Johannesburg – for an event entirely focused on the Internet of Things.

    Read Also Vodacom Announces Africa’s First Amazon Web Services Innovation Lab

    Furthermore, the amount of data created by connected devices is a growing concern for businesses, and this year’s IOTFA2022 will discuss and assess new technologies and processes that will allow organisations to keep up with this huge influx of data. The forum will look into IoT big data convergence, management, processing, and building sustainable technological ecosystems.


    IoTFA 2022: Benefit to Attendees

    Attendees will learn from some of the most powerful brands, mavericks, and visionaries that are setting the pace for change and driving disruption in retail. Speakers will showcase their thought-leadership and share insights and experiences that shape solutions to critical business challenges. Exhibitors will reinforce their position as leading providers of technology solutions.

    Attendees will interact with world leaders in this sphere and learn how they have successfully implemented their IoT. They will learn more about the advancement in the Industrial Internet of Things


    They will connect digitally with hundreds of IoT decision-makers, vendors, analysts, and developers and find out the future of IoT in Africa. They will learn from real-world case studies and hear discussions about lessons learned and challenges faced in Africa’s drive towards Smart City, Industrial, and Enterprise IoT Implementations and prepare their organisation for a technology-powered future.

    Read Also : US digital bank, Mercury restricts African Startups accounts

    The highly anticipated conference is targeted at academics, specialists, thought leaders, IoT ecosystem participants, and experts, and will create a platform for all players to share their knowledge of real-world IoT trends, challenges, and solutions.

    For those looking for maximum exposure, sponsorship, and exhibition packages, this forum offers a great opportunity to showcase their brands, speak and present solutions to a select audience. Packages are available for all budgets, but spots are limited.