Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > Tackling Middle East Cybersecurity Threat To Meet Data Sovereignty Rules
    Technology

    Tackling Middle East Cybersecurity Threat To Meet Data Sovereignty Rules

    Tackling Middle East Cybersecurity Threat To Meet Data Sovereignty Rules

    Published by Jessica Weisman-Pitts

    Posted on August 19, 2021

    Featured image for article about Technology

    By Dave Waterson, CEO, SentryBay

    Governments in the Middle East are tackling unprecedented political, social and technological changes that have prompted remedial actions, particularly when it comes to data sovereignty.

    Throughout the Middle East, the influence of digital transformation on social infrastructure, public services and the financial sector has transformed citizen’s lives, but the flipside to this is an increased exposure to cyberattacks. In June of last year the UAE’s National Computer Emergency Response Team repelled more than 100,000 cyberattacks against Federal Government entities in the month of June alone.

    To mitigate this, several governments in the area have focused on keeping citizen’s data within their national borders and introduced data sovereignty laws authorising both national and global organisations to store data locally.

    Where these laws are most zealously being enforced, challenges are arising for internationally focused organisations. Instead of being able to transfer data securely across global borders, or even to use data centres strategically positioned to serve the needs of several nations simultaneously, pressure is mounting to build facilities in each separate country and stop data from being transferred at all.

    VDI delivers granular control

    The pandemic has only served to exacerbate the situation, especially for executives forced to work outside the country in which their organisation is headquartered. The oil and gas industries in Middle Eastern countries have been particularly hard hit. To help manage this, many companies have turned to Virtual Desktop Infrastructure (VDI), a popular choice for delivering granular control over secure remote access to virtual desktops, applications and data when employees are outside the corporate (and in this case national) perimeter.

    When it comes to data sovereignty, businesses can still support information sharing across borders using VDI primarily because users are not downloading potentially sensitive data and can only see what is displayed on their screen, which can be watermarked to prevent data theft.

    VDI utilises a secure gateway (such as Citrix NetScaler, VMware UAG or F5), which provides multi-factor authentication and proxies the session traffic to the backend systems. This works well, however, to ensure companies are not at risk of attack or breaching data sovereignty rules, they must consider the security of their employees’ devices. If these are unmanaged, not only are they at risk, but the corporate network is rendered vulnerable too.

    The most significant threat to data is from screen scraping and keylogging malware, and worryingly any hacker adept at writing code can capture confidential data. Zeus variants using browser attacks can also exploit the logon process of remote access systems to gain entry. Other threats come from configuration files (such as ICA files) being intercepted either in flight or from the endpoint device’s file system and re-used in a timely fashion elsewhere, RDP Double-hop or VNC attacks, and even the Windows printing sub-system can be manipulated.

    While VDIs do deliver a high degree of security, and remote access environments in general are not disproportionately vulnerable to risk, this depends very much on the devices that they are being connected to. Unmanaged endpoints are notoriously easy for malicious actors to attack, which is why they result in 70% of breaches according to research.

    Mitigating risks

    The main issues arise from the lack of control that the corporate entity has over the security posture, operating system level or application versions being used before accessing VDI platforms.

    In an effort contain risks and remain compliant with data sovereignty guidance, organisations are   providing secure corporate laptops for employees to use when accessing VDI platforms, but once outside the corporate perimeter, these endpoints are still challenging to manage. Some businesses implement compliance checks which enforce the use of an agent which can be supplied and configured by the gateway that is connecting to the VDI client. Pre- and post-authentication access policies can also be used to check for minimum system or application levels or versions and this gives a degree of assurance before granting access. If compliance, such as with data sovereignty is essential to an organisation, however, these do not guarantee an endpoint is secure which means compliance regulation audits will not be satisfied. While endpoint compliance checks generate support overhead and require additional licencing, they can add value.

    Additionally, companies can use bootable USB devices with ‘thin’ operating systems that can provide a secure environment to access the VDI. To be effective a physical device must be issued to each employee, and they must boot the operating system from the USB on their own PC or laptop, but there is no control over how the BIOS is configured. Challenges can arise logistically because the employee must remain connected to the VDI platform and cannot use their own device for any other activity unless they disconnect.

    Securing the VDI, meeting data sovereignty laws

    Organisations working in Middle Eastern countries can successfully reinforce their VDI platforms if they use solutions designed precisely to protect endpoint devices. These build a shield around the VDI client defending it from malware such as keylogging and screen scraping and at the same time, protect the browser and the logon process.

    They should research the leading, ideally patented, technology that secures endpoints, regardless of their security status when a VDI session is running. This ensures uncompromising confidentiality, allows the user to have full access to their normal desktop by easily switching, without having to close the VDI session, and gives the organisation a high level of control.

    With the right kind of security solution in place, companies will also find they benefit from constant updates, which means that browser and VDI client compatibility issues are addressed.

    The cybersecurity threat in the Middle East is growing, and with it the increased focus on enforcing data sovereignty regulations. Protecting VDI deployment with solutions that are fit-for-purpose creates armour that is difficult to penetrate and puts companies on the right side of the law.

    Dave Waterson, CEO, SentryBay

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostLeveraging SaaS partners to enhance the value for your customers and business
    Next Technology PostMonopolisation of cloud market will hinder chances of tackling environment issues

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts