UAE upgrades its security systems

In News

The Telecommunications Regulatory Authority, TRA, has announced the completion the Federal Network, FEDNet, security systems upgrade in a step aimed at protecting more than 35 federal entities against ‘advanced persistent threats’ in their various forms. This step comes in line with TRA’s efforts to enhance protection against cyber-breaches, as well as protecting the digital environment of smart transformation in the country.

Hamad Obaid Al Mansoori, Director-General at TRA said, “Cyber risks and threats are persistently finding ways to reach their goals. Therefore, the provision of electronic security and protection needs to keep pace with these risks by using the latest cyber protection technologies.”

According to Al Mansoori a new generation of advanced cyber-attacks have arisen in recent years. “The TRA monitors these risks, and protect against them through advanced procedures, including the provision of protection to the federal government entities involved in the FEDNet, without loading them any additional financial or administrative burdens,” he added.

The FEDNet serves as a common infrastructure for federal entities. It allows interconnection and data exchange between all local and federal government entities. Under these security modifications, the upgraded security system will verify the pattern of any e-content, whether email or website, and assess if the pattern is acting suspiciously in dealing with data or communicating with suspicious external websites. This method is effective in protecting against Zero Day Attacks.

Saeed Belhoul, Director of eGovernment Operations at TRA, said, “This project is part of our ongoing effort to provide security for government entities connected to the network, and we have started working on these updates early this year. The first step was examining and testing the devices by TRA’s Computer Emergency Response Team, aeCERT, and coordination with all connected government entities to highlight the importance of these security solutions and the internal changes required by each side to make the best use of them. In later stages, we conducted comparative studies and tests, and then activated the service after ensuring its readiness.”

Comments

You may also read!

Whose job is it to manage cybersecurity?

Paul Proctor, Distinguished VP Analyst at Gartner explains that one should stop pointing at the CIO when it come

Read More...

Vectra acquires Siriux Security Technologies

Vectra AI announced the acquisition of Siriux Security Technologies, a leading provider of identity and software as a service (SaaS) posture management.

Read More...

Safe Security in strategic collaboration with Infosys

Safe Security announced a strategic collaboration with Infosys to combine its SaaS platform SAFE with Infosys’s capabilities in quantitative cyber risk

Read More...

Leave a reply:

Your email address will not be published.

58 + = 60

Join Our Newsletter!

Love SecurityMEA? We love to tell you about our new stuff. Subscribe to newsletter!

Mobile Sliding Menu