Dublin City Council launches new Electric Waste Vehicles

Dublin City Council has launched the first of 30 new electric vehicles to be used by the Waste Management section.

The launch took place on the forecourt of the Mansion House.

The new vehicles are the first Fully Electric Cage Body Vehicles to be used by the Waste Management section and will be rolled out throughout the year.

The Lord Mayor of Dublin, Cllr Ray McAdam, said, “If Dublin is serious about climate action, it must start with how the city itself operates. These new electric waste vehicles are a clear signal that the capital is leading by example, cutting emissions while carrying out the essential work that keeps our streets clean. They will help us build an even cleaner Dublin that we can all celebrate together.”

Dublin is one of 112 cities selected under the EU Mission 100 Climate Neutral and Smart Cities, a pioneering initiative designed to accelerate systems change and deliver climate neutrality by 2030.

In line with national requirements, Dublin City Council’s Climate Action Plan contributes to:

  • A 51% reduction in greenhouse gas emissions by 2030 (compared to 2018 levels)
  • Climate neutrality before 2050, at the latest

Climate Neutral Dublin 2030 responds directly to these commitments with a comprehensive Climate Action Plan (CAP) and associated Investment Plan that sets a clear roadmap for transformative change across the city.

However, the Council emphasises that delivering on these targets requires more than policy, it demands whole-of-society behavioural change. Sustainable choices must become the easiest and most convenient options for residents, workers, and visitors alike.

To make inroads into our targets we are delighted to showcase our brand new Fully Electric Cage Body Vehicles from our Waste Management section. Not only does the Waste Management section keep Dublin physically clean, the vehicles they are using improve the environment by using electric vehicles as part of the operation! Over 50 Waste Management Drivers have already been trained to use these new zero emission vehicles.

Dublin City Council will continue to work with the Department of Transport Zero Emission Vehicles Ireland office to identify funding streams and capacity building measures to support the transition and facilitate the installation of Electric Vehicle chargers.

Dublin City Council will work closely with the ESB and other stakeholders to enable and facilitate an increase in the number of EV charge points across the city.

AI, Data and BEVs Power a New Model for European Long-Haul Transport

Scania Ventures, LOTS Group and JUNA Technologies, together with carrier HAWA, operate one of Europe’s longest electric truck routes, demonstrating that high utilisation, long-haul battery-electric transport is commercially viable already today.

By combining LOTS Group’s AI-based platform Pathfinder with JUNAS’s electrified vehicle solutions and Hawa’s operational logistics expertise, the partners are creating a scalable model for electrified long-distance logistics in Europe. The 1,250-kilometre corridor is already operating in daily commercial service across central Europe. The partnership prioritises operational quality and cost efficiency, demonstrating how intelligent planning, effective asset utilisation, and robust daily operational management can help customers minimise their CO₂ emissions.

LOTS uses Pathfinder to analyse routes, charging requirements and shipment data to design and optimise electric long-haul operations under real-world conditions. This enables the partners to simulate various scenarios, minimise operational risk and adjust routes prior to broader deployment.

At the same time, the setup is designed to be scalable. By analysing operational data over time, the corridor can adapt to new transport flows and be expanded to include additional zero-emission capacity as infrastructure and customer needs evolve.

JUNA provides access to electric truck capacity via a pay-per-use model, thereby reducing barriers to entry for battery-electric long-haul transport. The partners have together created a fully integrated, end-to-end electric corridor that functions in day-to-day operations.

“With Pathfinder, we can design and run electric routes that meet customer requirements and real-world road conditions. The platform enables us to simulate different scenarios, reduce risk and optimise flows before moving into full-scale operations,” says Johan Palmqvist, Managing Director at LOTS Group Europe.

“For JUNA Technologies, this corridor proves that electric long-haul transport is not a pilot project but a viable, day-to-day solution,” says Johan Kjellner, Managing Director and COO at JUNA Technologies. “By integrating our electric truck capacity into a data-driven, AI-optimised network, we can deliver reliable, zero-emission transport at scale”

Electric long-haul road transport is often portrayed as a solution that will only become commercially viable around 2030. This corridor challenges that narrative by demonstrating that heavy battery-electric vehicles can reliably run demanding inter-city stretches with tight delivery deadlines, and ensure year-round utilisation.

 

Building Cyber Resilience in the AI era: Five ways Irish organisations can stay ahead

Artificial intelligence (AI) is rapidly reshaping the cybersecurity landscape across Ireland. While it’s unlocking new efficiencies and accelerating innovation, it’s also giving cybercriminals new evasive tools to launch faster and more sophisticated attacks. Across Ireland, organisations are navigating a new era of cyber risk defined by speed, sophistication, and AI.

As Dell Technologies continues to work closely with Irish businesses to modernise their digital infrastructure, it’s clear that cybersecurity must evolve in tandem, as a strategic enabler of trust and resilience. Threat actors are using AI to enhance ransomware, zero-day vulnerabilities, Distributed Denial of Service (DDoS) all making advanced spear-phishing much harder to identify, outpacing conventional security measuresAccording to the latest Dell Technologies Innovation Catalyst Study, 84% of Irish organisations view security as a key part of their business strategy, yet many continue to struggle with balancing innovation and security.

Almost all respondents (96%) admitted that integrating security into wider business strategies is proving difficult. These figures highlight that organisations must rethink their cybersecurity strategies to adopt proactive, intelligent, and resilient approaches that keep pace with the evolving threat environment.

Here are five ways to stay resilient against cyber threats:

1.Adopt zero trust for AI Security 

As threat actors use AI to scout, steal credentials and adapt attack techniques, traditional perimeter-based defenses fall short.

That’s why more Irish organisations are adopting a Zero Trust model built on the principle of “never trust, always verify” ensuring that every user, device, and application is continuously authenticated, regardless of location.

The benefits are clear, latest Innovation Catalyst Study revealed a 100% increase in confidence levels among Irish organisations that have adopted zero trust principles, underscoring its growing value as a security framework. By implementing zero trust principles organisations can help reduce risk by continuously verifying every access request and implementing strict authentication processes. Using role-based access controls (RBAC) and network segmentation, organisations can minimize the risk of an attack and reduce the impact radius if an attack occurs.

Zero trust is more than a security philosophy. It’s a unified and adaptive strategy for identity and access management. Through a zero trust approach, organisations not only reduce their attack surface, but also strengthen their ability to detect, respond to and contain threats.

2.Reduce the attack surface

In an environment where AI-powered threat actors are constantly probing for weaknesses, reducing the attack surface is a critical line of defense. Every exposed endpoint, unsecured API, or overlooked supply chain vulnerability represents an opportunity for adversaries to infiltrate systems, deploy malware and exfiltrate sensitive data.

To mitigate these risks, Irish organisations should begin with assessing and understanding their attack surface and related vulnerabilities. From there, they should have a layered defense strategy focused on securing entry points and minimising exposure. This includes strengthening authentication, encrypting data, regularly testing for vulnerabilities and actively monitoring endpoints. Keeping systems patched and devices hardened further limits risks.

By reducing the attack surface, organisations make themselves a harder target, thereby decreasing the likelihood of an attack.

3.Continuously detect and respond to threats

AI-powered attacks are capable of mimicking legitimate behavior and evading traditional security tools, and organisations need to combine advanced threat detection with rapid response capabilities.

Leveraging AI and machine learning, organisations can monitor operational data, detect anomalies, and trigger automated responses in real time.

This AI-powered threat intelligence system builds upon itself, making it smarter and better able to identify and address attacks.

For many Irish organisations who need assistance scaling threat detection and response. Partnering with a trusted third-party provider offers round-the-clock monitoring, faster reaction times, and support in managing complex security operations. Dell Technologies continues to invest in AI-driven security solutions that help Irish organisations stay ahead of emerging threats while simplifying operational complexity.

4.Plan an incident response and recovery plan

While prevention is often the first step to a cybersecurity strategy. A strong cybersecurity strategy includes not only prevention, but also a well-defined plan for response and recovery.

Organisations here in Ireland need to create and routinely practice a robust Incident Response and Recovery (IRR) plan that outlines how to detect, contain, communicate and recover from cyber incidents. The plan should outline departmental roles and responsibilities, internal and external contacts and partners, communication protocols and include regular testing. Preapproved messaging templates and routine plan updates are also essential to maintaining operational continuity during a crisis.

Backing up critical data and applications offline or separated from production workloads helps guard it against ransomware attacks and ensures business continuity.

By preparing for disruption, Irish organisations can restore critical functions with resilience, speed, and confidence.

5.Empower employees as a first line of defense

Technology alone isn’t enough; employees remain the most critical line of defense.  Organisations here in Ireland needs to create a culture of vigilance through employee awareness programmes that integrates continuous education, open communication, real-world simulations, and a culture of shared accountability. For example, incorporating attack simulations that reflect AI-specific threats like advanced phishing and deepfakes helps equip employees to recognise and respond to evolving threat actor tactics.

Collaboration across the technology ecosystem also plays a vital role in strengthening cyber resilience. Dell Technologies, together with partners like NVIDIA, is helping organisations better understand how AI-driven attacks evolve.

NVIDIA’s new AI Kill Chain Framework reimagines the traditional Cyber Kill Chain for the AI era, outlining how adversaries target AI systems through stages such as Recon, Poison, Hijack, Persist, and Impact — often cycling through these stages to adapt and escalate their tactics. This framework offers valuable insights into how attackers’ probe, manipulate, and maintain access within AI ecosystems, helping defenders anticipate and disrupt evolving threats before they lead to broader compromise.

As threat actors evolve using AI to launch increasingly sophisticated attacks, organisations must respond with equal force and foresight. Traditional defenses alone are insufficient. A modern cybersecurity strategy demands a proactive, layered approach that integrates advanced technologies, incident response planning, and a vigilant workforce.

As we mark Cybersecurity Awareness Month, it’s an important reminder that AI is transforming both the opportunities and the risks facing Irish businesses, making it more critical than ever to invest in continuous vigilance, awareness, and adaptation. By embedding resilience at every level of their cybersecurity strategy, Irish organisations can better safeguard their operations and lead with confidence in an increasingly AI-driven world.

Key Concepts and Benefits of Zero Trust Network Access

The way organizations secure their networks has undergone significant changes in recent years. The traditional idea of a perimeter, where everything inside a corporate network could be trusted, is no longer valid. Cloud-first strategies, hybrid work models, and the widespread use of personal devices have blurred that boundary. As a result, businesses can no longer rely on firewalls and VPNs alone to keep their assets safe.

At the same time, the cyber threat landscape has become more sophisticated. Remote work has introduced new risks, and insider threats have grown more prominent. Cybercriminals now utilize advanced tools to exploit even the smallest vulnerabilities. This is why enterprises are moving toward a Zero Trust approach. Zero Trust Network Access (ZTNA) is at the forefront of this shift, offering a model where trust is never assumed but always verified. It is rapidly becoming the new standard for secure connectivity in modern IT ecosystems.

What Is Zero Trust Network Access (ZTNA)?

ZTNA is a security model designed to ensure that users and devices are verified before being granted access to applications or data. Unlike older approaches that trusted users inside a network, ZTNA operates on the principle of “never trust, always verify.” This means that every access attempt, whether from an employee in headquarters or a contractor working remotely, must be authenticated and authorized before any resources are made available.

The fundamental concept of ZTNA differs significantly from traditional VPNs and perimeter-based models. VPNs typically grant users broad access to the corporate network once they are authenticated, creating opportunities for attackers to move laterally if their credentials are compromised. In contrast, ZTNA provides application-level access, limiting exposure and making it much harder for threats to spread. This distinction is why ZTNA is increasingly viewed as the safer, smarter option for organizations looking to protect sensitive systems.

For enterprises adopting hybrid work strategies, ZTNA is a critical model for remote access security, as it enables secure, identity-based connections that adapt to context, devices, and policies. By focusing on granular access control and continuous verification, businesses can minimize risks while enabling flexible, productive remote work environments.

Key Concepts of ZTNA

Identity-Centric Security

Identity sits at the core of ZTNA. Before a user can connect, the system verifies their identity. Multi-factor authentication (MFA), combined with integration into identity providers, ensures that stolen passwords alone are not enough for attackers to gain entry. This focus on identity strengthens defenses against the most common entry points for cyberattacks.

Least-Privilege Access

ZTNA enforces the principle of least privilege, granting users only the specific permissions needed to perform their tasks. This reduces the potential attack surface by limiting exposure to it. If a single account is compromised, the damage is contained because the attacker cannot access more than what was explicitly granted.

Continuous Verification

Unlike older systems, where access is checked once and then trusted, ZTNA continuously monitors user activity to ensure ongoing trust. Authentication decisions adapt to risk levels, such as changes in device posture or unusual behavior. For example, if a user logs in from a new location or device, additional verification can be required before granting access.

Application-Level Segmentation

ZTNA enables organizations to segment applications, restricting access to specific resources rather than the entire network. This segmentation not only limits the blast radius of potential breaches but also helps organizations meet compliance standards by ensuring sensitive systems are isolated and better protected.

Core Benefits of ZTNA for Organizations

Reduced Attack Surface

By exposing applications only to authenticated and authorized users, ZTNA minimizes the number of entry points that attackers can target. Resources remain invisible to the public internet, lowering the likelihood of discovery and exploitation.

Stronger Remote and Hybrid Workforce Security

ZTNA is designed for today’s work environment, where employees, contractors, and third parties often access systems remotely. It ensures consistent security regardless of where users connect from, making it far more effective than VPNs in protecting distributed teams.

Improved User Experience

Traditional VPNs often slow down connections and frustrate users. ZTNA, by contrast, delivers faster and more seamless access to applications, without unnecessary overhead. This improves productivity while maintaining high levels of security.

Simplified IT and Policy Management

Centralized policy management enables IT teams to easily oversee access across diverse environments easily. Instead of dealing with complex network-level configurations, administrators can manage access policies at the application level, simplifying operations significantly.

Regulatory and Compliance Alignment

ZTNA helps organizations align with data protection and privacy regulations such as GDPR, HIPAA, and PCI DSS. By enforcing least-privilege access and logging every interaction, ZTNA provides the transparency and control required for compliance.

ZTNA in Action – Industry Applications

ZTNA is versatile and applies to multiple industries. In finance, it helps secure sensitive transactions and customer data while minimizing the risk of fraud. In healthcare, it plays a vital role in safeguarding telehealth platforms and connected medical devices that handle patient data. For educational institutions, ZTNA ensures that both students and faculty can access learning platforms securely from anywhere, providing a secure and seamless learning experience. In manufacturing, ZTNA protects IoT devices and industrial control systems that are increasingly being targeted by cybercriminals.

Industry insights from organizations such as the National Institute of Standards and Technology (NIST) underscore the importance of Zero Trust principles for critical sectors. Their published guidance emphasizes the use of adaptive and context-aware controls to protect both IT and OT systems.

Challenges in Adopting ZTNA

Despite its benefits, ZTNA adoption comes with challenges. Integrating it with legacy systems can be complex, especially in industries that rely heavily rely on outdated infrastructure. User resistance is another hurdle; employees may initially find the verification process inconvenient compared to familiar VPN setups. Vendor lock-in also poses a risk, as businesses may become too dependent on a single provider, limiting their flexibility. These challenges can be managed with careful planning, phased rollouts, and clear communication about the long-term benefits.

Best Practices for Successful ZTNA Implementation

A successful ZTNA strategy starts with identifying the most critical applications and systems, then extending Zero Trust protections to those first. Integrating ZTNA with existing identity and access management tools ensures seamless user experiences while strengthening security. Deploying in phases allows IT teams to test and refine policies without disrupting operations. Continuous monitoring and policy refinement help organizations adapt to evolving threats.

Additional resources from the Cybersecurity & Infrastructure Security Agency (CISA) highlight the importance of ongoing monitoring and security hygiene in Zero Trust deployments, reinforcing the need for constant vigilance.

The Future of ZTNA

ZTNA continues to evolve in tandem with the broader Zero Trust ecosystem. Artificial intelligence and machine learning will increasingly play a role in adaptive access control, enabling real-time adjustments to policies based on context and behavior. Deeper integration with Secure Access Service Edge (SASE) frameworks will unify networking and security into a seamless cloud-delivered service. Moreover, small and medium-sized businesses are expected to adopt ZTNA at higher rates as cost-effective, scalable cloud-based solutions become widely available.

Reports from Gartner predict that ZTNA adoption will become a default requirement for enterprises moving to cloud-native architectures, with more organizations shifting away from VPNs entirely.

Conclusion

Zero Trust Network Access is no longer just a trend; it has become an essential part of modern cybersecurity strategies. By reducing the attack surface, providing stronger remote workforce security, simplifying policy management, and aligning with compliance needs, ZTNA empowers businesses to thrive in the digital era.

As enterprises face increasing threats and shifting work models, adopting ZTNA proactively is not just about protecting systems-it is about enabling innovation and resilience. Organizations that embrace ZTNA will be better positioned to safeguard their future in a constantly evolving cyber landscape.

FAQs

  1. How does ZTNA improve security compared to VPNs?

ZTNA offers application-specific access rather than network-wide access, reducing the potential for lateral movement and minimizing risks compared to VPNs.

  1. Is ZTNA suitable for small businesses?

Yes, cloud-based ZTNA solutions make it affordable and scalable for small and mid-sized businesses, not just large enterprises.

  1. Can ZTNA help with compliance requirements?

Absolutely. By enforcing least-privilege access, logging all activity, and segmenting applications, ZTNA supports compliance with GDPR, HIPAA, PCI DSS, and other regulatory frameworks.

Building a Zero Trust Architecture: Key Considerations

Cybersecurity has become a major concern for businesses of all sizes. With the rise of sophisticated attacks, you’ve probably heard the term “Zero Trust” being thrown around. It’s not just a trend in the industry. It’s a shift in how we think about protecting our systems and data. The traditional approach, which assumed everything inside the network was safe, is no longer effective. In today’s world, threats can come from anywhere. So, instead of blindly trusting what’s inside, Zero Trust operates on the principle of “never trust, always verify.”

This article explores key considerations when building a Zero Trust architecture and how it can help protect your business in an ever-evolving threat landscape.

1. Understanding the Need for Zero Trust

In today’s threat environment, cyberattacks have become more complex. Organizations can no longer rely on the old method of building a strong perimeter and assuming everything inside is safe. The rise of insider threats and more advanced attack methods demand a more thorough approach.

One reason Zero Trust has gained so much attention is that attackers are increasingly targeting key identity systems. Common attacks on Active Directory (AD), for example, are on the rise. AD holds essential identity information, making it a high-value target for cybercriminals. Attackers often exploit weaknesses in privileged access management to breach systems. Once inside, they move laterally across the network, often gaining full control of the environment. This makes securing Active Directory critical when considering Zero Trust.

By implementing a Zero Trust model, businesses can better protect their identity systems, such as AD, by ensuring that every action, whether it’s a login or access to a resource, is verified continuously.

2. Identity and Access Management (IAM) at the Core

At the heart of any Zero Trust architecture is Identity and Access Management (IAM). IAM ensures that only the right people, devices, and applications can access your systems, and it does so by verifying them continuously, not just once. In the past, a user would log in and, once inside, be trusted until they logged out. Zero Trust changes that by constantly checking if the user should still be granted access.

One critical element of IAM is multi-factor authentication (MFA). MFA requires users to verify their identity through more than one method, such as a password and a mobile app confirmation. Relying on passwords alone is risky, as passwords can be stolen, guessed, or reused across multiple accounts.

Zero Trust takes identity management a step further by ensuring that users only have access to what they need, nothing more. This limits the scope of potential damage in the event of a breach.

3. Microsegmentation: Controlling Access to Network Resources

Microsegmentation is another key principle in a Zero Trust environment. In simple terms, it means breaking your network into smaller, more secure segments. This way, even if an attacker gains access to one part of your network, they can’t easily move to another part. Each segment acts like a locked room that the attacker would need additional verification to enter.

This approach helps limit lateral movement, a common tactic used by cybercriminals once they’ve breached a network. By limiting what users and devices can access, you make it much harder for attackers to navigate and compromise other parts of your environment.

Microsegmentation also works hand-in-hand with the idea of least-privilege access. Users and systems should only be granted access to the resources they absolutely need to do their job and nothing more. By applying this concept, you reduce the chances of attackers gaining access to critical resources even if they breach a less important part of the network.

4. Monitoring and Logging Everything

In a Zero Trust architecture, monitoring and logging play a critical role. Continuous monitoring allows organizations to track every request, transaction, and action happening on the network. This ensures that nothing goes unnoticed, and any suspicious behavior can be caught and responded to quickly.

Logging is equally important. By keeping detailed logs of all network activity, security teams can trace the steps of an attacker and better understand how they gained access and what they did once inside. This information is invaluable for both preventing future attacks and improving your current security measures.

Advanced monitoring tools can also help by sending real-time alerts when something unusual happens. For example, if a user suddenly tries to access a part of the network they’ve never accessed before, a security team can be notified immediately and take action to verify whether it’s legitimate.

5. Enforcing Least Privilege Access

“Least privilege” is a core principle of Zero Trust. This means that users and systems should only have the access they need to perform their tasks and nothing more. If a user needs temporary access to a resource, they should be given it for the time required and then have that access revoked.

By limiting the scope of access, even if an attacker gains control of an account, they can’t use it to access critical systems or sensitive data. Regularly reviewing access permissions is important to ensure that users aren’t sitting on permissions they no longer need.

Admins are especially important to monitor. Admin accounts often have access to sensitive data and system controls, making them prime targets for attackers. Ensuring that admin privileges are tightly controlled helps minimize the risks of a breach.

6. Protecting the Network Edge

In today’s remote work world, the network edge has expanded beyond the physical office. Employees are accessing company resources from home, cafes, and various other locations. With this in mind, Zero Trust needs to protect not just the internal network but also the devices and users accessing the network from the outside.

This means verifying users and devices every time they connect, no matter where they are. Whether it’s a cloud service, a remote worker, or an external partner, Zero Trust ensures that access is always verified, regardless of the location or device being used.

7. The Role of Automation in Zero Trust

Automation can play a significant role in enforcing a Zero Trust architecture by handling the heavy lifting of continuous verification. In a Zero Trust environment, every action, login attempt, and data access request requires validation. With hundreds or even thousands of users making requests every minute, managing these processes manually is not just inefficient—it’s practically impossible. This is where automation steps in to streamline the workload.

Automation tools can be programmed to enforce security policies consistently, ensuring that no exceptions or mistakes slip through the cracks. For instance, they can instantly revoke access for users exhibiting unusual behavior, preventing potential threats from escalating. Additionally, automated systems can monitor for known attack patterns, like credential stuffing or lateral movement, and block such actions before they cause damage.

Building a Zero Trust architecture may seem like a big task, but it’s one of the best ways to protect your organization in today’s threat landscape. By focusing on identity verification, limiting access, and constantly monitoring activity, you can secure your network without relying on outdated assumptions of trust.

As cyberattacks continue to evolve, so should your approach to security. Zero Trust offers a modern, proactive way to defend against attackers, making it an essential strategy for businesses looking to protect their data and systems effectively.

Yanmar Unveils Concept Model e-X1 for Zero Emission Agriculture

Yanmar Agribusiness Co., Ltd. (Yanmar AG), a subsidiary of Yanmar Holdings, has revealed its e-X1 concept, an electric drive compact electric agricultural machine designed to achieve zero emissions in agriculture.

Within the Yanmar Group, the YANMAR GREEN CHALLENGE 2050 initiative is driving efforts toward realizing a sustainable society. Electric agricultural machines not only offer environmental performance but also the superior quietness and environmental friendliness of electric motors, promising improved working conditions for nighttime, suburban farming, and operations within greenhouses. Yanmar AG has unveiled a prototype of a small electric agricultural machine at a stakeholder event, with a view to commencing market monitoring by 2025.

The machine can accommodate various implements such as rotary tillers and grass cutters at the front and rear, enabling tasks like weeding, snow removal, and cultivating. Opting for crawlers instead of wheels ensures stable operation on slopes and uneven terrain. With no driver’s seat, the machine guarantees operator safety during agricultural tasks through remote control. The incorporation of autonomous driving features is also under consideration.

Yanmar AG plans to initiate market monitoring in 2025 and actively progress toward mass-production through rigorous design and testing, with the goal of contributing to the decarbonization of the agricultural sector.

Compact electric concept e-X1

Model name e-X1
Powertrain Battery electric
Proposed operations Tilling, mowing, ridging, snow removal etc.
Release date Market monitoring is scheduled to start in 2025

 

Concept model of the e-X1 compact electric agricultural machine.

Dell Technologies introduces Project Fort Zero to Transform Security

Dell Technologies introduces Project Fort Zero to provide an end-to-end Zero Trust security solution for global organizations to protect against cyberattacks. The solution will be validated by the U.S. Department of Defense and is part of a Dell Security portfolio expansion.

Project Fort Zero builds on the momentum of Dell’s Zero Trust Center of Excellence and partner ecosystem to accelerate Zero Trust adoption. Leading an ecosystem of more than 30 leading technology companies, Dell will deliver a validated, advanced maturity Zero Trust solution within the next 12 months.

“Zero Trust is designed for decentralized environments, but integrating it across hundreds of point products from dozens of vendors is complex – making it out of reach for most organizations,” said Herb Kelsey, industry chief technology officer, government, Dell Technologies. “We’re helping global organizations solve today’s security challenges by easing integration and accelerating adoption of Zero Trust.”

Dell Project Fort Zero to deliver validated Zero Trust solution

The fully configured Project Fort Zero solution will lower the barrier to Zero Trust adoption. Dell will take on the technology integration and orchestration that typically falls to individual organizations across several vendors. In doing so, the estimated time for advanced Zero Trust adoption is reduced through a private cloud.

To achieve validation, a government assessment team will evaluate the Project Fort Zero solution for advanced maturity accreditation and certify compliance against the U.S. Department of Defense Zero Trust reference architecture, which is recognized around the world. This end-to-end solution will help global public- and private-sector organizations adapt and respond to cybersecurity risks while offering the highest level of protection.

Project Fort Zero can serve a variety of use cases including:

  • In on-premises data centers for organizations where data security and compliance are paramount.
  • In remote or regional locations like retail stores where secure, real-time analysis of customer data can deliver a competitive advantage.
  • In the field where a temporary implementation is needed in places with intermittent connectivity, like airplanes or vehicles, for operational continuity.

“Organizations are turning to Zero Trust to modernize their cybersecurity programs and keep pace with an evolving attack landscape. But determining where to start, the capabilities to prioritize and the actions needed to progress towards maturity can be complicated,” said John Grady, principal analyst, Enterprise Strategy Group. “Security and IT leaders need help planning their strategy and implementing the tools to support it. Project Fort Zero can help accelerate this process by delivering a repeatable blueprint for an end-to-end solution that is based on a validated reference architecture recognized around the world.”

Dell expands security services portfolio with launch of PSX for Backup

Along with Project Fort Zero, Dell is expanding its security portfolio with Product Success Accelerator (PSX) for Backup, a new service to help organizations protect and recover data in the event of disruption.

PSX for Backup simplifies the implementation and maintenance of backup environments to enable data recovery. It follows the recent release of PSX for Cyber Recovery, which implements and helps operationalize an isolated cyber recovery vault.

Organizations can choose from three levels of backup or cyber recovery based on their needs:

  • Ready includes planning workshops, configuration of a validated backup or vault environment, a success plan, a runbook and outcome-based skills training.
  • Optimize adds quarterly assessments, improvement recommendations and assisted restore test simulations.
  • Operate adds ongoing operational assistance to meet the solution’s performance objectives. Highly skilled experts monitor and investigate alerts, initiate corrective actions and help with restore tasks at the customer’s direction.

Availability

  • Project Fort Zero’s advanced maturity Zero Trust solution will be available to public- and private-sector organizations within the next 12 months.
  • Dell Product Success Accelerator for Backup is now available in locations across North America, Europe and Asia Pacific.
  • Dell Product Success Accelerator for Cyber Recovery expanded availability to locations in Europe, Latin America and Asia Pacific, in addition to North America.

NTA commences market consultation process for zero-emission ramp-accessible coaches

The National Transport Authority (NTA) has today commenced a market consultation process ahead of one or more procurement competitions for zero-emissions and/or ramp-accessible coaches.

Information obtained from interested parties that participate in this market consultation exercise will be used by the NTA for the purpose of informing the planned procurement(s).

It will also allow the NTA to progress actions within the Irish Government’s Climate Action Plan 2023 and National Sustainable Mobility Policy, relating to the development of a strategy for the transition of long-distance PSO and commercial bus services to low-emission technologies.

As part of its national statutory function to provide bus infrastructure and fleet, the NTA has, since 2017 procured new buses and coaches for use by its contracted bus operators in the provision of Public Service Obligation (PSO) bus services.

Since July 2019, the NTA has also, in line with Irish Government policy, purchased only low and zero-emission urban buses, and from 2023 onwards all urban buses purchased by the NTA will be zero-emission.

In addition, there have been significant advances in the design of new coaches purchased by the NTA in recent years, most notably ramp-accessible single-deck coaches incorporating a low-floor area within which a permanent wheelchair space is located.

However, it has proven challenging to procure coaches with lower exhaust and CO2 emissions than the EURO VI coaches that represent the NTA’s most recent purchases.

The NTA is therefore seeking to commence one or more procurement process(es) for zero-emission and/or ramp-accessible coaches.

”Zero-emission” means a coach that qualifies as a zero-emission heavy duty vehicle in accordance with the definition contained within DIRECTIVE (EU) 2019/1161.

Ramp-accessible” means a coach with a permanent wheelchair space within a low-floor area into which access from the exterior of the coach is effected solely via an integral folding ramp at a passenger doorway, such ramp being able to be traversed by the wheelchair without any mechanical lifting or raising of the wheelchair being necessary.

These zero-emission and/or ramp-accessible coaches are envisaged as the successors to the ramp-accessible single-deck and double-deck coaches procured by the NTA in recent years.

They are also potential future replacements for the traditional high-floor single-deck coaches operating longer-distance journeys.  However, for this potential application it will be essential to improve accessibility for persons with reduced mobility while also maintaining the established luggage capacity and passenger comfort requirements of long-distance coach travel.

For more information see:

https://irl.eu-supply.com/ctm/Supplier/PublicPurchase/235892/0/0?returnUrl=ctm/Supplier/publictenders&b=ETENDERS_SIMPLE

Investment App BUX Zero to introduce Fractional European ETFs

Beginning today, BUX clients will be the first in Europe to be able to invest in fractional European ETFs outside of an investment plan. In partnership with ABN AMRO Clearing Bank, BUX has built the technology that makes it possible to offer fractional investing in European ETFs. This new feature follows shortly after BUX introduced fractional investing to its clients in January 2022.

Fractional European ETF investing lowers threshold for monthly investing

With the introduction of fractional European ETFs, clients are now able to invest with an amount as little as €10. European ETFs with a higher price tag, such as the S&P 500 Index which typically costs €80, thus become more accessible to investors with a smaller budget. This allows all investors, regardless of budget, to invest in different ETFs monthly and minimises the investment risk by offering room to diversify portfolios further.

BUX introduces a total of 20 fractional European ETFs

In addition to the fractional European ETFs, BUX has also added an additional 95 new fractional U.S. stocks to its already existing offering. Well-known names among the U.S. stocks that are now also available to invest in fractionally include Mastercard, PepsiCo and IBM. In the future, fractional investing in European stocks will also become available.

“With the introduction of fractional European ETFs, we can offer more ways for our clients to build a portfolio that fits their needs and goals. Since introducing fractional investing to our clients at the beginning of the year, we have seen a great deal of interest and this demonstrates that the modern investor is embracing diverse investment options. As the economic climate continues to swing in uncertain directions, we want to offer Europeans a solution that allows them to put their money to work in an accessible way,” said Yorick Naeff, CEO of BUX.

“Fractional trading is trading made accessible for everyone. With our unique fractional trading service we are supporting  our clients to offer embedded investment solutions in capital markets, so all their clients can profit. Expanding this fractional trading service offering with European products will open up the EU capital markets for our clients and their investors to create embedded and efficient investment solutions as well,” said Jan Bart de Boer, CCO of ABN AMRO Clearing.

The modern investor at BUX opts for fractional investing

Fractional investing is quickly gaining popularity among clients at BUX. Internal research has shown that since the launch of fractional investing in January 2022, nearly 1 in 7 orders has been a purchase of a fractional share. The undisputed favorite among fractional U.S. stocks is Tesla. Among all age groups, the electric carmaker is the most purchased fractional stock since the beginning of the year. One notable difference is that among female investors, Beyond Meat (9) and Walt Disney (10) have a spot in the top 10 most purchased fractional stocks, while NVIDIA (9) and Shopify (10)  made the top 10 of the most purchased shares by males.