{"id":2155,"date":"2025-09-19T09:12:17","date_gmt":"2025-09-19T09:12:17","guid":{"rendered":"https:\/\/www.newevol.io\/resources\/?p=2155"},"modified":"2025-09-19T09:15:09","modified_gmt":"2025-09-19T09:15:09","slug":"threat-intelligence-platforms-for-middle-eastern-enterprises","status":"publish","type":"post","link":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/","title":{"rendered":"Protecting Middle Eastern Enterprises with Threat Intelligence Platforms"},"content":{"rendered":"<p>Cyber attacks in the Middle East are rising, driven by both geopolitical tensions and rapid digital growth. Energy, banking, and government sectors are frequent targets, making security a top priority. Traditional defenses alone are not enough &mdash; enterprises need context and real-time insights. In 2023, data breaches in the Middle East averaged $8.07M&mdash;<a href=\"https:\/\/www.securityhq.com\/blog\/rising-cyber-threats-in-the-middle-east-a-virtual-battleground\/\" target=\"_blank\" rel=\"nofollow noopener\">nearly double the global $4.45M<\/a>&mdash;targeting oil &amp; gas, finance, and government sectors most.<\/p>\n<p><strong><a href=\"https:\/\/www.newevol.io\/product\/cyber-threat-intelligence.php\">Threat Intelligence Platforms (TIPs)<\/a><\/strong> provide that edge by turning raw threat data into actionable intelligence, helping security teams in the region detect, prioritize, and respond faster.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_66_1 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title ez-toc-toggle\" style=\"cursor: pointer\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0a0a0a;color:#0a0a0a\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0a0a0a;color:#0a0a0a\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Regional_threat_landscape_whos_attacking_and_why\" title=\"Regional threat landscape: who&rsquo;s attacking and why\">Regional threat landscape: who&rsquo;s attacking and why<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#What_is_a_Threat_Intelligence_Platform_TIP\" title=\"What is a Threat Intelligence Platform (TIP)?\">What is a Threat Intelligence Platform (TIP)?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Core_TIP_capabilities_%E2%80%94_what_to_expect\" title=\"Core TIP capabilities &mdash; what to expect\">Core TIP capabilities &mdash; what to expect<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Why_contextual_regional_intelligence_matters_for_ME_enterprises\" title=\"Why contextual, regional intelligence matters for ME enterprises\">Why contextual, regional intelligence matters for ME enterprises<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#How_TIPs_integrate_with_SOC_tooling_SIEM_SOAR_EDR_Data_Lake\" title=\"How TIPs integrate with SOC tooling (SIEM, SOAR, EDR, Data Lake)\">How TIPs integrate with SOC tooling (SIEM, SOAR, EDR, Data Lake)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#High-value_use_cases_for_Middle_Eastern_enterprises\" title=\"High-value use cases for Middle Eastern enterprises\">High-value use cases for Middle Eastern enterprises<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Operational_models_in-house_TIP_vs_Managed_CTI_services\" title=\"Operational models: in-house TIP vs. Managed CTI services\">Operational models: in-house TIP vs. Managed CTI services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Data_sources_feeds_that_matter_in_the_Middle_East\" title=\"Data sources &amp; feeds that matter in the Middle East\">Data sources &amp; feeds that matter in the Middle East<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Legal_privacy_and_compliance_considerations\" title=\"Legal, privacy, and compliance considerations\">Legal, privacy, and compliance considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Common_pitfalls_how_to_avoid_them\" title=\"Common pitfalls &amp; how to avoid them\">Common pitfalls &amp; how to avoid them<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Measuring_success_KPIs_ROI_for_TIP_deployments\" title=\"Measuring success: KPIs &amp; ROI for TIP deployments\">Measuring success: KPIs &amp; ROI for TIP deployments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#Quick_start_checklist_for_Middle_Eastern_CISOs\" title=\"Quick start checklist for Middle Eastern CISOs\">Quick start checklist for Middle Eastern CISOs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#How_NewEvol_Supports_Middle_Eastern_Enterprises_with_Threat_Intelligence\" title=\"How NewEvol Supports Middle Eastern Enterprises with Threat Intelligence\">How NewEvol Supports Middle Eastern Enterprises with Threat Intelligence<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#End_Note\" title=\"End Note\">End Note<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#FAQs\" title=\"FAQs\">FAQs<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#What_is_the_role_of_threat_intelligence_in_cybersecurity\" title=\"What is the role of threat intelligence in cybersecurity?\">What is the role of threat intelligence in cybersecurity?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#What_is_the_role_of_threat_intelligence_feeds_in_cybersecurity\" title=\"What is the role of threat intelligence feeds in cybersecurity?\">What is the role of threat intelligence feeds in cybersecurity?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#What_is_a_threat_intelligence_platform_in_cybersecurity\" title=\"What is a threat intelligence platform in cybersecurity?\">What is a threat intelligence platform in cybersecurity?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#What_is_the_role_of_threat_intelligence_when_defending_against_common_attack_techniques\" title=\"What is the role of threat intelligence when defending against common attack techniques?\">What is the role of threat intelligence when defending against common attack techniques?<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Regional_threat_landscape_whos_attacking_and_why\"><\/span><span style=\"color: #065c62;\">Regional threat landscape: who&rsquo;s attacking and why<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The Middle East faces a mix of <strong>state-sponsored, criminal, and hacktivist threats<\/strong>. Many campaigns are linked to geopolitical tensions, making enterprises prime targets even if they are not directly involved in conflicts.<\/p>\n<ul>\n<li><strong>State-aligned groups<\/strong> often target government, telecom, and energy sectors for espionage and disruption.<\/li>\n<li><strong>Cybercriminals<\/strong> focus on financial services, retail, and e-commerce, looking to steal data or disrupt payments.<\/li>\n<li><strong>Hacktivists<\/strong> target enterprises for political or ideological reasons, often using DDoS or defacement attacks.<\/li>\n<li><strong>Supply-chain compromises<\/strong> are growing, with attackers exploiting third-party vendors and IT providers to reach larger organizations.<\/li>\n<\/ul>\n<p>The common goal across these threats is clear: <strong>gain access, disrupt operations, and extract sensitive data.<\/strong> For enterprises in the region, especially those in critical infrastructure, ignoring these risks can mean significant financial and reputational damage.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_is_a_Threat_Intelligence_Platform_TIP\"><\/span><span style=\"color: #065c62;\">What is a Threat Intelligence Platform (TIP)?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A <strong>Threat Intelligence Platform (TIP)<\/strong> is a security tool that collects threat data from many sources, organizes it, and turns it into actionable insights for security teams. Instead of drowning in raw data &mdash; like IP addresses, malware signatures, or phishing domains &mdash; a TIP enriches and correlates that information so analysts know which threats matter most.<\/p>\n<p>In practice, a TIP:<\/p>\n<ul>\n<li><strong>Aggregates feeds<\/strong> from commercial providers, open sources, ISACs, and dark web monitoring.<\/li>\n<li><strong>Enriches data<\/strong> with context, such as who is behind the attack, what their targets are, and how urgent the threat is.<\/li>\n<li><strong>Integrates<\/strong> with SIEM, <strong><a href=\"https:\/\/www.newevol.io\/product\/security-orchestration-automation-response-soar.php\">SOAR<\/a><\/strong>, EDR, and firewalls, so intelligence directly strengthens detection and response.<\/li>\n<li><strong>Automates workflows<\/strong>, helping security teams block, hunt, or investigate threats faster.<\/li>\n<\/ul>\n<p>For Middle Eastern enterprises, this means security teams can focus on <strong>real, high-priority threats<\/strong> instead of wasting time on noise. Saudi Arabia&rsquo;s ECC, UAE&rsquo;s IA regulation, and PDPL require local data residency. TIPs must integrate with SOC tools, support incident reporting, and meet privacy and audit requirements.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Core_TIP_capabilities_%E2%80%94_what_to_expect\"><\/span><span style=\"color: #065c62;\">Core TIP capabilities &mdash; what to expect<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A modern <strong>Threat Intelligence Platform (TIP)<\/strong> goes beyond just collecting data. It provides the tools security teams need to act quickly and confidently:<\/p>\n<ul>\n<li><strong>Feed Aggregation<\/strong> &ndash; Pulls threat data from multiple sources (commercial, open-source, dark web, ISACs) into one place.<\/li>\n<li><strong>Data Enrichment<\/strong> &ndash; Adds context such as threat actor profiles, attack techniques, and relevance to your industry.<\/li>\n<li><strong>Prioritization &amp; Scoring<\/strong> &ndash; Helps analysts separate critical threats from low-level noise.<\/li>\n<li><strong>IOC &amp; TTP Management<\/strong> &ndash; Tracks indicators of compromise (like IPs\/domains) and attacker techniques for faster detection.<\/li>\n<li><strong>Automation &amp; Playbooks<\/strong> &ndash; Automates repetitive tasks like blocking malicious IPs or updating firewalls.<\/li>\n<li><strong>Seamless Integrations<\/strong> &ndash; Works with SIEM, SOAR, EDR, and data lakes so intelligence flows into existing defenses.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Why_contextual_regional_intelligence_matters_for_ME_enterprises\"><\/span><span style=\"color: #065c62;\">Why contextual, regional intelligence matters for ME enterprises<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Not all threat intelligence is created equal. For Middle Eastern enterprises, <strong>context is everything<\/strong>. Global feeds often highlight generic threats, but attackers targeting the region usually have <strong>specific motives tied to geopolitics, energy markets, or financial systems<\/strong>.<\/p>\n<p>PwC&rsquo;s 2025 survey shows <a href=\"https:\/\/www.pwc.com\/m1\/en\/publications\/documents\/2024\/2025-global-digital-trust-insights-middle-east-findings.pdf\" target=\"_blank\" rel=\"nofollow noopener\">47% of Middle Eastern organizations worry about hack-and-leak attacks<\/a>, and 55% prioritize digital risk, highlighting the need for tailored threat intelligence.<\/p>\n<ul>\n<li><strong>Language and tactics differ<\/strong> &mdash; local phishing lures or Arabic-language malware campaigns may go unnoticed in global feeds.<\/li>\n<li><strong>Sector focus is sharper<\/strong> &mdash; energy, oil &amp; gas, telecom, and government agencies are disproportionately targeted.<\/li>\n<li><strong>Geopolitical drivers<\/strong> &mdash; regional conflicts often trigger waves of cyber activity that are unique to the Middle East.<\/li>\n<\/ul>\n<p>A Threat Intelligence Platform (TIP) that supports <strong>regional data sources, local threat feeds, and contextual enrichment<\/strong> gives enterprises the visibility they need. Without this context, security teams risk chasing irrelevant alerts while missing the attacks that truly matter.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_TIPs_integrate_with_SOC_tooling_SIEM_SOAR_EDR_Data_Lake\"><\/span><span style=\"color: #065c62;\">How TIPs integrate with SOC tooling (SIEM, SOAR, EDR, Data Lake)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A Threat Intelligence Platform (TIP) delivers the most value when it connects seamlessly with the tools your <strong><a href=\"https:\/\/www.newevol.io\/solutions\/security-operations.php\">Security Operations Center (SOC)<\/a><\/strong> already uses. Instead of operating in isolation, a TIP becomes the <strong>intelligence engine<\/strong> that powers detection and response.<\/p>\n<ul>\n<li><strong>SIEM (Security Information and Event Management):<\/strong> A TIP enriches SIEM alerts with context (e.g., whether an IP is linked to a known attacker), reducing false positives and speeding up investigations.<\/li>\n<li><strong>SOAR (Security Orchestration, Automation, and Response):<\/strong> TIP-driven intelligence triggers automated playbooks &mdash; like blocking a malicious domain or isolating a compromised endpoint &mdash; without manual intervention.<\/li>\n<li><strong>EDR (Endpoint Detection &amp; Response):<\/strong> Threat indicators from the TIP feed directly into endpoint tools, helping detect malware, ransomware, or suspicious processes before they spread.<\/li>\n<li><strong>Security Data Lake:<\/strong> TIPs ensure raw telemetry in data lakes is enriched with threat context, making hunting, analytics, and anomaly detection more effective.<\/li>\n<\/ul>\n<p>In short, the TIP acts as a <strong>force multiplier<\/strong> &mdash; it doesn&rsquo;t replace SOC tools, but makes each of them smarter and more effective by supplying real-time, contextual intelligence.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"High-value_use_cases_for_Middle_Eastern_enterprises\"><\/span><span style=\"color: #065c62;\">High-value use cases for Middle Eastern enterprises<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Threat Intelligence Platforms (TIPs) become especially valuable when applied to the sectors and risks that matter most in the Middle East:<\/p>\n<ul>\n<li><strong>Critical Infrastructure (Energy &amp; Utilities):<\/strong> TIPs help detect state-sponsored campaigns targeting oil &amp; gas operations, industrial control systems, and power grids.<\/li>\n<li><strong>Financial Services:<\/strong> Real-time feeds on phishing kits, fraud campaigns, and payment system exploits allow banks to block attacks before customers are hit.<\/li>\n<li><strong>Government &amp; Telecom:<\/strong> TIPs provide visibility into espionage-driven campaigns, protecting sensitive data and national communication systems.<\/li>\n<li><strong>Supply Chain Security:<\/strong> By tracking compromised vendors, rogue domains, and dark-web chatter, TIPs help enterprises avoid indirect breaches through third parties.<\/li>\n<li><strong>Brand &amp; Reputation Protection:<\/strong> Monitoring social media, underground forums, and defacement campaigns allows organizations to detect early signs of targeted hacktivism.<\/li>\n<\/ul>\n<p>For Middle Eastern enterprises, these use cases are not optional &mdash; they directly impact <strong>business continuity, compliance, and national security<\/strong>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Operational_models_in-house_TIP_vs_Managed_CTI_services\"><\/span><span style=\"color: #065c62;\">Operational models: in-house TIP vs. Managed CTI services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Enterprises in the Middle East can adopt Threat Intelligence Platforms in two main ways &mdash; building and running them internally or relying on a managed service. Each model has trade-offs:<\/p>\n<p><strong>In-House TIP<\/strong><\/p>\n<ul>\n<li>Full control over data sources, integrations, and workflows.<\/li>\n<li>Best suited for large organizations with mature SOC teams and dedicated threat analysts.<\/li>\n<li>Higher costs for licensing, skilled staff, and continuous tuning.<\/li>\n<li>Slower to scale if new feeds or capabilities are needed quickly.<\/li>\n<\/ul>\n<p><strong>Managed CTI Services<\/strong><\/p>\n<ul>\n<li>Provides access to ready-made TIP capabilities without heavy upfront investment.<\/li>\n<li>Comes with curated regional threat feeds, analyst support, and 24\/7 monitoring.<\/li>\n<li>Ideal for mid-sized enterprises or those lacking specialized cyber intelligence staff.<\/li>\n<li>Faster to deploy and easier to keep up to date.<\/li>\n<\/ul>\n<p>For many Middle Eastern enterprises, a <strong>hybrid model<\/strong> works best &mdash; maintaining an internal TIP for sensitive data while using a <strong>Managed CTI service<\/strong> for broader coverage and regional expertise.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Data_sources_feeds_that_matter_in_the_Middle_East\"><\/span><span style=\"color: #065c62;\">Data sources &amp; feeds that matter in the Middle East<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>A Threat Intelligence Platform (TIP) is only as good as the feeds it consumes. For Middle Eastern enterprises, relying solely on generic global sources isn&rsquo;t enough. The most effective TIP deployments combine <strong>global intelligence with regional context<\/strong>:<\/p>\n<ul>\n<li><strong>Commercial Threat Feeds:<\/strong> Paid providers offering curated data on malware, phishing domains, ransomware campaigns, and state-sponsored groups.<\/li>\n<li><strong>Open-Source Intelligence (OSINT):<\/strong> Community-driven feeds, security researcher reports, and GitHub repositories &mdash; useful but often noisy.<\/li>\n<li><strong>Government &amp; ISACs:<\/strong> Regional information-sharing groups and national cybersecurity centers (e.g., UAE&rsquo;s NESA, Saudi&rsquo;s NCA) provide sector-specific alerts.<\/li>\n<li><strong>Dark Web &amp; Underground Forums:<\/strong> Tracking chatter about stolen data, leaked credentials, or planned attacks targeting regional enterprises.<\/li>\n<li><strong>Industry-Specific Feeds:<\/strong> Energy, telecom, and finance-focused intelligence that aligns with the Middle East&rsquo;s critical industries.<\/li>\n<li><strong>Internal Telemetry:<\/strong> Logs, incidents, and IOCs collected within the enterprise itself, enriched with regional context for higher accuracy.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Legal_privacy_and_compliance_considerations\"><\/span><span style=\"color: #065c62;\">Legal, privacy, and compliance considerations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When deploying a Threat Intelligence Platform (TIP) in the Middle East, enterprises must balance security goals with local laws and regulatory requirements.<\/p>\n<ul>\n<li><strong>Data Residency:<\/strong> Many Middle Eastern countries, including Saudi Arabia and the UAE, require sensitive data to remain within national borders. TIPs must support local hosting or compliant cloud options.<\/li>\n<li><strong>Cross-Border Sharing:<\/strong> Sharing threat data with global partners may raise legal challenges; organizations need clear policies to avoid breaching national cybersecurity laws.<\/li>\n<li><strong>Privacy Regulations:<\/strong> Customer data collected during investigations must be handled in line with privacy mandates, such as UAE&rsquo;s Personal Data Protection Law (PDPL) or Saudi Arabia&rsquo;s PDPL.<\/li>\n<li><strong>Sector-Specific Compliance:<\/strong> Industries like finance and energy often have additional requirements from regulators (e.g., SAMA in Saudi Arabia, UAE Central Bank).<\/li>\n<li><strong>Audit &amp; Reporting:<\/strong> TIPs should provide clear reporting features to demonstrate compliance during audits.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Common_pitfalls_how_to_avoid_them\"><\/span><span style=\"color: #065c62;\">Common pitfalls &amp; how to avoid them<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While Threat Intelligence Platforms (TIPs) offer big advantages, Middle Eastern enterprises often run into challenges that limit their effectiveness.<\/p>\n<ul>\n<li><strong>Information Overload:<\/strong> Too many feeds create noise.<\/li>\n<p>Fix: Start with a few high-quality, region-relevant sources and expand gradually.<\/p>\n<li><strong>Lack of Context:<\/strong> Raw IOCs without regional or industry context waste analyst time.<\/li>\n<p>Fix: Prioritize feeds enriched with Middle East&ndash;specific intelligence.<\/p>\n<li><strong>Poor Integration:<\/strong> A TIP that doesn&rsquo;t connect with SIEM, SOAR, or EDR tools becomes siloed.<\/li>\n<p>Fix: Ensure your TIP supports seamless integration with existing SOC tooling.<\/p>\n<li><strong>Skill Gaps:<\/strong> Without trained analysts, intelligence isn&rsquo;t actionable.<\/li>\n<p>Fix: Invest in analyst training or use managed CTI services to fill expertise gaps.<\/p>\n<li><strong>Compliance Blind Spots:<\/strong> Cross-border data sharing or storage missteps can violate local laws.<\/li>\n<p>Fix: Deploy TIPs with data residency and privacy compliance in mind.<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Measuring_success_KPIs_ROI_for_TIP_deployments\"><\/span><span style=\"color: #065c62;\">Measuring success: KPIs &amp; ROI for TIP deployments<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>To prove the value of a Threat Intelligence Platform (TIP), enterprises should track measurable outcomes. The right KPIs show whether intelligence is improving security operations and delivering business value.<\/p>\n<ul>\n<li><strong>Time to Detect (TTD):<\/strong> How quickly new threats are identified after emerging.<\/li>\n<li><strong>Mean Time to Respond (MTTR):<\/strong> The speed at which incidents are contained once detected.<\/li>\n<li><strong>False Positive Reduction:<\/strong> Fewer irrelevant alerts mean analysts can focus on real threats.<\/li>\n<li><strong>Threats Blocked Automatically:<\/strong> Number of malicious IPs, domains, or files stopped before causing harm.<\/li>\n<li><strong>Incident Volume Trends:<\/strong> Whether the organization experiences fewer successful attacks over time.<\/li>\n<li><strong>Analyst Productivity:<\/strong> Hours saved by automation and enriched intelligence.<\/li>\n<li><strong>Regulatory Compliance Readiness:<\/strong> Ability to produce audit-ready reports with minimal effort.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Quick_start_checklist_for_Middle_Eastern_CISOs\"><\/span><span style=\"color: #065c62;\">Quick start checklist for Middle Eastern CISOs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Assess Threat Landscape:<\/strong> Map out top regional threats (APT groups, ransomware, supply chain attacks).<\/li>\n<li><strong>Define TIP Objectives:<\/strong> Decide if the priority is faster detection, threat hunting, or compliance support.<\/li>\n<li><strong>Select Trusted Feeds:<\/strong> Ensure coverage of local and regional intelligence sources (GCC, MEA).<\/li>\n<li><strong>Plan Integration Early:<\/strong> Align TIP with SIEM, SOAR, EDR, and existing SOC workflows.<\/li>\n<li><strong>Start with High-Value Use Cases:<\/strong> Focus on phishing, fraud prevention, and sector-specific threats (banking, oil &amp; gas, government).<\/li>\n<li><strong>Balance Data &amp; Context:<\/strong> Filter out noise; prioritize intelligence enriched with regional relevance.<\/li>\n<li><strong>Decide on Model:<\/strong> Evaluate in-house TIP deployment vs. managed CTI services.<\/li>\n<li><strong>Address Compliance:<\/strong> Factor in regional laws (<a href=\"https:\/\/www.sattrix.com\/blog\/cybersecurity-regulations-in-the-middle-east-2025\/\">UAE&rsquo;s PDPL<\/a>, Saudi NCA standards, Qatar DPL).<\/li>\n<li><strong>Set KPIs:<\/strong> Track MTTR, false positives reduced, and incident response improvements.<\/li>\n<li><strong>Run Pilot Before Scale:<\/strong> Test with a small use case, prove ROI, then expand.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"How_NewEvol_Supports_Middle_Eastern_Enterprises_with_Threat_Intelligence\"><\/span><span style=\"color: #065c62;\">How NewEvol Supports Middle Eastern Enterprises with Threat Intelligence<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Implementing and operationalizing a Threat Intelligence Platform can be challenging, especially with regional complexities. <strong><a href=\"https:\/\/www.newevol.io\/\">NewEvol<\/a><\/strong>&nbsp;simplifies the journey with:<\/p>\n<ul>\n<li><strong>Contextual Intelligence for MEA:<\/strong> Our platform curates and enriches threat feeds with region-specific context, ensuring intelligence is relevant to local attack patterns.<\/li>\n<li><strong>Seamless SOC Integration:<\/strong> NewEvol TIP integrates natively with <strong><a href=\"https:\/\/www.newevol.io\/product\/cyber-security-information-event-management.php\">NewEvol SIEM<\/a>, SOAR, and Security Data Lake<\/strong>, enabling faster detection, response, and hunting.<\/li>\n<li><strong>Managed CTI Services:<\/strong> For enterprises without in-house CTI expertise, NewEvol provides 24\/7 <strong>Managed Threat Intelligence<\/strong>, helping SOCs operationalize insights without adding headcount.<\/li>\n<li><strong>Compliance Readiness:<\/strong> Support for frameworks like <strong>UAE PDPL, NCA standards, and PCI DSS<\/strong>, with built-in reporting to ease audits.<\/li>\n<li><strong>Scalable Deployment:<\/strong> Whether you want a standalone TIP or a hybrid model with SIEM + Data Lake, NewEvol helps optimize performance and cost efficiency.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"End_Note\"><\/span><span style=\"color: #065c62;\">End Note<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Cyber threats in the Middle East are growing faster and more targeted. A Threat Intelligence Platform (TIP) helps enterprises move from reactive defense to proactive security, giving SOC teams context to detect, prioritize, and respond effectively.<\/p>\n<p>With the right TIP strategy&mdash;integrated with <strong>SIEM, SOAR, and <a href=\"https:\/\/www.newevol.io\/product\/data-lake-solutions.php\">Security Data Lake<\/a><\/strong>&mdash;organizations can strengthen security, stay compliant, and act confidently against evolving attacks.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"FAQs\"><\/span><span style=\"color: #065c62;\">FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>\n<h3><span class=\"ez-toc-section\" id=\"What_is_the_role_of_threat_intelligence_in_cybersecurity\"><\/span><span style=\"font-size: 70%;\">What is the role of threat intelligence in cybersecurity?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/li>\n<\/ul>\n<p>Threat intelligence provides actionable insights about emerging threats, helping security teams detect, prioritize, and respond faster.<\/p>\n<ul>\n<li>\n<h3><span class=\"ez-toc-section\" id=\"What_is_the_role_of_threat_intelligence_feeds_in_cybersecurity\"><\/span><span style=\"font-size: 70%;\">What is the role of threat intelligence feeds in cybersecurity?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/li>\n<\/ul>\n<p>Feeds supply real-time indicators like malicious IPs, domains, or malware signatures, enabling proactive defense against known threats.<\/p>\n<ul>\n<li>\n<h3><span class=\"ez-toc-section\" id=\"What_is_a_threat_intelligence_platform_in_cybersecurity\"><\/span><span style=\"font-size: 70%;\">What is a threat intelligence platform in cybersecurity?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/li>\n<\/ul>\n<p>A TIP collects, enriches, and organizes threat data from multiple sources, turning raw information into actionable intelligence for SOCs.<\/p>\n<ul>\n<li>\n<h3><span class=\"ez-toc-section\" id=\"What_is_the_role_of_threat_intelligence_when_defending_against_common_attack_techniques\"><\/span><span style=\"font-size: 70%;\">What is the role of threat intelligence when defending against common attack techniques?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<\/li>\n<\/ul>\n<p>It helps identify attack patterns, prioritize critical threats, and guide automated or manual responses to block attacks effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attacks in the Middle East are rising, driven by both geopolitical tensions and rapid digital growth. Energy, banking, and government sectors are frequent targets, making security a top priority. Traditional defenses alone are not enough &mdash; enterprises need context and real-time insights. In 2023, data breaches in the Middle East averaged $8.07M&mdash;nearly double the&hellip; <a class=\"more-link\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/\">Continue reading <span class=\"screen-reader-text\">Protecting Middle Eastern Enterprises with Threat Intelligence Platforms<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":2156,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,14],"tags":[],"class_list":["post-2155","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-threat-intel","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Threat Intelligence Platforms Protect Middle Eastern Enterprises<\/title>\n<meta name=\"description\" content=\"Discover how Threat Intelligence Platforms help Middle Eastern enterprises detect and respond to cyber threats faster, boosting security and compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Threat Intelligence Platforms Protect Middle Eastern Enterprises\" \/>\n<meta property=\"og:description\" content=\"Discover how Threat Intelligence Platforms help Middle Eastern enterprises detect and respond to cyber threats faster, boosting security and compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/\" \/>\n<meta property=\"og:site_name\" content=\"NewEvol\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NewEvolPlatform\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-19T09:12:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-19T09:15:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/09\/blog-post-ne-2_Artboard-1-copy-51.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1921\" \/>\n\t<meta property=\"og:image:height\" content=\"901\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krunal Medapara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@krunalpatel17\" \/>\n<meta name=\"twitter:site\" content=\"@NewEvolPlatform\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krunal Medapara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/\",\"name\":\"How Threat Intelligence Platforms Protect Middle Eastern Enterprises\",\"isPartOf\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/09\/blog-post-ne-2_Artboard-1-copy-51.jpg\",\"datePublished\":\"2025-09-19T09:12:17+00:00\",\"dateModified\":\"2025-09-19T09:15:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\"},\"description\":\"Discover how Threat Intelligence Platforms help Middle Eastern enterprises detect and respond to cyber threats faster, boosting security and compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#primaryimage\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/09\/blog-post-ne-2_Artboard-1-copy-51.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/09\/blog-post-ne-2_Artboard-1-copy-51.jpg\",\"width\":1921,\"height\":901,\"caption\":\"Threat Intelligence Platforms\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.newevol.io\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Middle Eastern Enterprises with Threat Intelligence Platforms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#website\",\"url\":\"https:\/\/www.newevol.io\/resources\/\",\"name\":\"NewEvol\",\"description\":\"Innovation in Motion\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.newevol.io\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680\",\"name\":\"Krunal Medapara\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"contentUrl\":\"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg\",\"caption\":\"Krunal Medapara\"},\"description\":\"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.\",\"sameAs\":[\"https:\/\/www.newevol.io\/\",\"https:\/\/x.com\/krunalpatel17\"],\"url\":\"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Threat Intelligence Platforms Protect Middle Eastern Enterprises","description":"Discover how Threat Intelligence Platforms help Middle Eastern enterprises detect and respond to cyber threats faster, boosting security and compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/","og_locale":"en_US","og_type":"article","og_title":"How Threat Intelligence Platforms Protect Middle Eastern Enterprises","og_description":"Discover how Threat Intelligence Platforms help Middle Eastern enterprises detect and respond to cyber threats faster, boosting security and compliance.","og_url":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/","og_site_name":"NewEvol","article_publisher":"https:\/\/www.facebook.com\/NewEvolPlatform\/","article_published_time":"2025-09-19T09:12:17+00:00","article_modified_time":"2025-09-19T09:15:09+00:00","og_image":[{"width":1921,"height":901,"url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/09\/blog-post-ne-2_Artboard-1-copy-51.jpg","type":"image\/jpeg"}],"author":"Krunal Medapara","twitter_card":"summary_large_image","twitter_creator":"@krunalpatel17","twitter_site":"@NewEvolPlatform","twitter_misc":{"Written by":"Krunal Medapara","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/","url":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/","name":"How Threat Intelligence Platforms Protect Middle Eastern Enterprises","isPartOf":{"@id":"https:\/\/www.newevol.io\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#primaryimage"},"image":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/09\/blog-post-ne-2_Artboard-1-copy-51.jpg","datePublished":"2025-09-19T09:12:17+00:00","dateModified":"2025-09-19T09:15:09+00:00","author":{"@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680"},"description":"Discover how Threat Intelligence Platforms help Middle Eastern enterprises detect and respond to cyber threats faster, boosting security and compliance.","breadcrumb":{"@id":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#primaryimage","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/09\/blog-post-ne-2_Artboard-1-copy-51.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2025\/09\/blog-post-ne-2_Artboard-1-copy-51.jpg","width":1921,"height":901,"caption":"Threat Intelligence Platforms"},{"@type":"BreadcrumbList","@id":"https:\/\/www.newevol.io\/resources\/blog\/threat-intelligence-platforms-for-middle-eastern-enterprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.newevol.io\/resources\/"},{"@type":"ListItem","position":2,"name":"Protecting Middle Eastern Enterprises with Threat Intelligence Platforms"}]},{"@type":"WebSite","@id":"https:\/\/www.newevol.io\/resources\/#website","url":"https:\/\/www.newevol.io\/resources\/","name":"NewEvol","description":"Innovation in Motion","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.newevol.io\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/7929a2b0ea108d69f18541bb94a98680","name":"Krunal Medapara","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.newevol.io\/resources\/#\/schema\/person\/image\/","url":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","contentUrl":"https:\/\/www.newevol.io\/resources\/wp-content\/uploads\/2022\/03\/krunal-mendapara-1-scaled.jpg","caption":"Krunal Medapara"},"description":"Krunal Mendapara is the Chief Technology Officer, responsible for creating product roadmaps from conception to launch, driving the product vision, defining go-to-market strategy, and leading design discussions.","sameAs":["https:\/\/www.newevol.io\/","https:\/\/x.com\/krunalpatel17"],"url":"https:\/\/www.newevol.io\/resources\/author\/krunal-medapara\/"}]}},"_links":{"self":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/comments?post=2155"}],"version-history":[{"count":3,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2155\/revisions"}],"predecessor-version":[{"id":2159,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/posts\/2155\/revisions\/2159"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media\/2156"}],"wp:attachment":[{"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/media?parent=2155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/categories?post=2155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.newevol.io\/resources\/wp-json\/wp\/v2\/tags?post=2155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}