Q&A with Maliha Aqeel, Director of Global Communications at Fix Network World

MEDIA 7 | January 16, 2020

marketing metrics
Maliha Aqeel, Director of Global Communications at Fix Network World is an award-winning, communication and marketing professional who helps companies harness the power of their brand to drive engagement and achieve measurable business results. 

She has developed and led content and marcomm programs for B2B companies in the financial and professional services sectors in her over 15 years of industry experience.

MEDIA 7: When did you start working and what was it?
MALIHA AQEEL:
I started my career in 1996 right after high school, freelancing as a journalist and features writer for a magazine in Dubai, UAE. Over time, I expanded my services to include scriptwriting for corporate videos and TV productions, writing and designing client newsletters and promotional collateral.

M7: What made you want to pursue a career in branding and marketing communications? What aspect about your role brings you the most joy?
MA: I didn’t consciously decide to pursue a career in marketing and communication as my plan was to become a filmmaker. However, I had great curiosity about what makes people prefer one brand over the other when a feature-by-feature comparison didn’t show a huge difference between similar products or services. I had taken a few advertising courses during university and it broadened my understanding of how powerful brand experiences and storytelling can drive business objectives. That balance of strategy and creativity is what I enjoy most about what I do and why I’ve continued to find purpose in my career.


"Marketing professionals have to act as conveners, and connect the dots so that there is alignment between stakeholders like sales and operation teams and executive leadership on what products and services will drive growth in any given quarter."

M7: How has branding changed over the years to become what it is today? What marketing metrics do you value most for brand management?
MA:
Branding used to be focused on the tactical: aesthetics of an ad, wordsmithing copy and “selling” a vision that was less about what the customer needed and more about what the brand wanted you to purchase. Much of this was driven by the rise of a consumerist society in the 1980s and part of the 1990s. But the new millennium witnessed boom-bust economic cycles, changing demographics and technological advances at a relentless pace than ever before. Gradually, the brand’s point of view started to become less relevant and empowered consumers took back control of their brand experience and their buyer journey.

Now brands have to look outward, focusing on the needs, behaviors and motivations of their end customers. They’re also recognizing that purpose and having an impact on society in a positive way is what will drive their enterprise value instead of share price alone. The institutional investors are also taking notice and aligning their investment criteria and evaluation accordingly. This was one of the outcomes of the Embankment Project for Inclusive Capitalism, a multi-year initiative that looked into making capitalism more dynamic, sustainable, inclusive and trusted. As a result, the brand metrics that I value most are outcome-focused like contribution to reputation value, net promoter score, brand perception (a combination of brand recall and service delivery) and employee engagement/advocacy scores.


"One of the most common mistakes companies make is implementing a brand strategy that isn’t aligned to the organization’s overall business goal."

M7: What are the common mistakes that companies make when implementing their brand strategies?
MA:
One of the most common mistakes is implementing a strategy that isn’t aligned to the organization’s overall business goal. This can be challenging in large corporations where there are multiple competing priorities, but marketing professionals have to act as conveners, and connect the dots so that there is alignment between stakeholders like sales and operation teams and executive leadership on what products and services will drive growth in any given quarter. And then create and implement holistic marketing campaigns that drive specific results that support the key performance indicators (KPIs) that the executives are measured on.

A second mistake is running campaigns that are not aligned from a macro or micro environmental perspective. For example, an oil company runs a social media campaign on their corporate citizenship initiatives at a time when the industry (not necessarily the company) is under regulatory scrutiny for bad environmental practices. The timing, not necessarily the content, of the campaign can appear tone deaf and unsympathetic to sentiment in society. Another instance is if a company runs an employer branding campaign about its great culture at a time when it might be going through litigation for a workplace harassment issue. To counter this, marketing and communication professionals need to create business partnerships across all layers and functions of the company so that they’re planning and executing brand strategies that are contextually appropriate and reputationally sound.


"Marketing and communication professionals need to create business partnerships across all layers and functions of the company so that they’re planning and executing brand strategies that are contextually appropriate and reputationally sound."

M7: Which strategies do you count on to help leaders understand the value of communications?
MA:
I’m a huge advocate of data-driven decision making and offering informed insights and recommendations. C-suite executives see data analytics as a distinct competitive advantage for their business, and it can be the main strategy we use to help them understand our value. Gut instinct has a role to play in planning and execution, but to convince others and demonstrate our importance, we need to have a common understanding of business goals and use language that senior leaders will understand. Examples of this include showing how strategic communications resulted in cost efficiencies, margin improvement and contribution to revenue or increase in sales. These are tangible financial results that any executive function will recognize and appreciate. In addition to the above, I also use benchmarking data (internal and external) and forecasting as part of my communication and resource planning so that I have a framework for reporting to leadership on communication-driven outcomes.

M7: With over 15 years of progressive experience in strategic communication, what advice do you have for leaders who are trying to improve their performance?
MA:
My advice is to bring the brand promise and purpose into your decision-making process. Often, not always, performance is directly impacted by the culture of an organization. And your culture is a reflection of your purpose. It conveys why what the organization does matters; make evangelists out of your customers and convince employees to be part of the journey not just show up for a pay cheque. Research by Gallup found that highly engaged teams are 21% more productive, but low employee engagement results in 65% lower share price over time.

Communication professionals are enablers of the brand. As strategic advisors, we have to help make the connection between culture and business performance—between the intangible and the tangible. The cost of getting it wrong can have a negative impact on reputation capital, share price and even the balance sheet. Research from the Engagement Institute showed that disengaged employees cost US businesses up to $550 billion a year, which is a little over half the nominal GDP of The Netherlands in 2019 ($900 billion). That’s not a comparison that you want someone making at your annual general meeting of shareholders.

ABOUT FIX NETWORK WORLD

The Fix Network global family of brands includes collision repair franchise networks Fix Auto and Pro Color, glass repair and replacement brand NOVUS Glass and mechanical shops Speedy Auto Service, as well as the full suite of SRP glass products. With more than 2,100 points of service in over 40 countries worldwide, Fix Network is the global aftermarket services leader. The Network continues to grow internationally, thanks to a solid foundation based on entrepreneurship and innovation. For more information, visit Fixnetwork.

More THOUGHT LEADERS

Futurex’s Adam Cason advises, ‘To look at your data security posture with a critical eye’

Media 7 | December 1, 2021

Adam Cason, Vice President of Global and Strategic Alliances at Futurex speaks about some major cybersecurity developments retailers need to look out for in the next 5 years. Read on for his thoughts on the top security needs of brands and retailers....

Read More

'Data is the answer to a more effective digital transformation,' says SonicWall's Diane Walker

Media 7 | November 23, 2021

In this interview with Diane Walker, Senior Director of Demand Generation at SonicWall, we had the opportunity to peek into SonicWall's latest high-performance firewall models that are aimed to combat the unprecedented surge of malware and ransomware resulting from a rise in remote and hybrid workforces across enterprises. She shared meaningful insights into SonicWall's vision of cybersecurity, and how modern-day marketers need to reflect on the different levels of the digital buyer journey. Read on to discover effective approaches towards marketing to drive business growth....

Read More

No backup can land companies in serious trouble, warns Tinesh Chhaya, Founder at Decipher Cyber

Media 7 | November 15, 2021

With only a few weeks till the launch of Jenny 2.0, Tinesh Chhaya, Founder at Decipher Cyber, explores the different ways Jenny makes searching and analyzing cybersecurity vendors and service providers easier for businesses who are looking to upgrade their security systems, in this interview with Media 7. Read on to find out how businesses can make digital transformations and hybrid work environments safer from cyber-attacks....

Read More

Futurex’s Adam Cason advises, ‘To look at your data security posture with a critical eye’

Media 7 | December 1, 2021

Adam Cason, Vice President of Global and Strategic Alliances at Futurex speaks about some major cybersecurity developments retailers need to look out for in the next 5 years. Read on for his thoughts on the top security needs of brands and retailers....

Read More

'Data is the answer to a more effective digital transformation,' says SonicWall's Diane Walker

Media 7 | November 23, 2021

In this interview with Diane Walker, Senior Director of Demand Generation at SonicWall, we had the opportunity to peek into SonicWall's latest high-performance firewall models that are aimed to combat the unprecedented surge of malware and ransomware resulting from a rise in remote and hybrid workforces across enterprises. She shared meaningful insights into SonicWall's vision of cybersecurity, and how modern-day marketers need to reflect on the different levels of the digital buyer journey. Read on to discover effective approaches towards marketing to drive business growth....

Read More

No backup can land companies in serious trouble, warns Tinesh Chhaya, Founder at Decipher Cyber

Media 7 | November 15, 2021

With only a few weeks till the launch of Jenny 2.0, Tinesh Chhaya, Founder at Decipher Cyber, explores the different ways Jenny makes searching and analyzing cybersecurity vendors and service providers easier for businesses who are looking to upgrade their security systems, in this interview with Media 7. Read on to find out how businesses can make digital transformations and hybrid work environments safer from cyber-attacks....

Read More

Related News

PLATFORM SECURITY,SOFTWARE SECURITY

Vipre Security Group’s New Endpoint Detection & Response Technology for SMEs

VIPRE Security Group | January 19, 2023

VIPRE Security Group, an award-winning data, cybersecurity, privacy, and user protection company, recently announced the launch of its latest cybersecurity product, VIPRE Endpoint Detection & Response (EDR). VIPRE EDR is built to assist small and medium-sized businesses including their IT partners navigate the intricacies of EDR management with a single, simple-to-use console. VIPRE EDR provides a sophisticated high-performance, cloud-based solution while overcoming the problems users typically expect from an EDR solution. . This advanced technology detect better and uncovers more unusual behavior than a standalone antivirus file, process, and networking analysis solutions, while offering investigation and remediation tools to accelerate response times. The VIPRE EDR solution is based on the fundamental pillars of Detection, Investigation, Containment, and Remediation, transforming threats into intelligence and suggesting next steps for security professionals, as simply detecting a threat is insufficient. Advantages of VIPRE's Endpoint Detection and Response (EDR) System: Exploit prevention – It helps to prevent network threats with built-in DNS , intrusion protection and in-browser exploit prevention EPP/Next-generation Antivirus - VIPRE EDR, constantly scans processes, files, and network activity for known and undiscovered threats Correlated Behavior Engine - Examine endpoint behavior in greater depth to identify emergent or suspicious behavior connected across all engines Endpoint Isolation – Quickly isolates an afflicted device to prevent threat spreading Threat Incident Visualization – View and respond to all threat activity from a central location. Understand all aspects of endpoint activity related to the threat, including every user, process, file, and network activity Remote Shell - VIPRE EDR's click-button reporting enables admins instant remote access to the endpoint for a deeper look Suspicious file/link sandboxing - Detonates files and links in a private cloud sandbox for comprehensive examination and forensic investigation Integrated Vulnerability Management - App scanning and vulnerability management to close potential security gaps Built on the foundation of VIPRE's top-ranked Endpoint Security Cloud (EPP) platform, protection begins with extensive monitoring and automated blocking of malicious behavior across all endpoint processes, files, and network activity. This protection includes web, DNS and network monitoring, as well as AI-driven hostile process behavior detection. About VIPRE Security Group A part of Ziff Davis, Inc., VIPRE Security Group is a global organization specializing in cybersecurity, privacy, and data protection. It protects millions of people and businesses globally, including some very well-known brands. . For nearly 30 years, VIPRE Security Group's primary mission has been to provide easy solutions to protect against existing and potential internet threats in an ever-expanding, digitally connected world.

Read More

PLATFORM SECURITY,SOFTWARE SECURITY,END POINT PROTECTION

Wallarm Announces the Early Release of Its Enhanced API Security Technology

Wallarm | January 23, 2023

Wallarm, a leading end-to-end API security provider, has recently announced the early release of the Wallarm API leak management solution, an improved API security technology designed to assist organizations in identifying and remediating attacks exploiting leaked API keys and secrets while also providing ongoing protection against hacks in the event of a leak. Given the recent increase in hacks involving leaked API keys and other API secrets, Wallarm developed the API leak management solution in order to give a comprehensive solution for this issue by automatically detecting leaked API keys and secrets, implementing controls to prevent their use, and protecting against any follow-on attacks. As a result, it prohibits unwanted access to sensitive data within enterprises while also protecting their internal operations and customers from unauthorized use of that data. With the average cost of an API leak incident being $1.2 million per year, protecting API keys is a security and financial need. However, as locating and revoking API keys is both time-consuming and resource-intensive, Wallarm's proactive API leak management solution focuses on automated detection, remediation, and control using a three-pronged approach: Detect - Wallarm automatically searches public sources for leaked API secrets, which hackers can discover and exploit in under a minute. Remediate - Regardless of protocol, Wallarm immediately blocks requests that use compromised API secrets across the entire API portfolio. Control - Wallarm also continuously monitors and prevents the use of leaked API secrets. The Wallarm API leak management solution is the first of its kind in the API security space and is coupled with other Wallarm capabilities such as API threat prevention, API discovery and cloud-native WAAP. Wallarm’s API security platform provides customers with full-spectrum visibility, detection, and security for their entire web application and API portfolio, regardless of protocol or environment. This minimizes tool sprawl and costs while also increasing risk management and fostering innovation. About Wallarm Wallarm, founded in 2016, provides End-to-End API Security solutions to safeguard web applications, APIs, microservices, and serverless workloads in cloud-native environments. With its commitment to developing the cybersecurity industry, it has designed a new security platform to defend tech firms and Global 2000 enterprises throughout their journey from their legacy apps to APIs in cloud-native infrastructures. Hundreds of Security and DevOps teams use Wallarm to discover all of their web apps and API endpoints, traffic flows, and sensitive data consumption for total visibility, secure their whole API portfolio against emerging risks, and respond to incidents automatically for better risk management.

Read More

ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Nozomi Networks Introduces the Industry’s First OT and IoT Endpoint Security Sensor

Nozomi Networks | January 25, 2023

On January 24, 2023, Nozomi Networks Inc., one of the leaders in OT and IoT security, announced Nozomi ArcTM, the industry's first IoT and OT endpoint security sensor, intended to accelerate time to full operational resilience exponentially. Nozomi Arc is designed to automatically deploy across a large number of locations and devices anywhere a company needs visibility, and it provides vital data and insights about essential assets and network endpoints. This data is utilized to better analyze and prevent attacks, as well as correlate user behavior, without straining existing resources or interrupting mission-critical networks. Arc is a game-changer in terms of comprehensive asset visibility, deployment speed, and network coverage across complex and remote OT and IT networks. Nozomi Arc is designed to: Be deployed remotely Analyze endpoint vulnerabilities Accelerate monitoring deployments in mission-critical systems; and Identify compromised hosts Nozomi Networks Co-founder and CPO, Andrea Carcano, said, "Operational resiliency is the top business priority for critical infrastructure organizations, which can only be achieved by lowering cyber risks and increasing security." He added, "Nozomi Arc accelerates time to resiliency by transforming every computer on the network into an OT security sensor. It quickly extends visibility to attack surfaces and threats inside endpoint hosts and their local networks. With Nozomi Arc, users can quickly corollate more information from more sources for better diagnostics and faster time to response." (Source – GlobeNewswire) With Nozomi Arc, users get the following advantages: Faster time to resiliency: Nozomi Arc removes time, resource, geographic, and internal policy limits from network-based deployments. Lower cyber risk and increased security: The only OT solution in the market that can identify malicious hardware. Extended visibility and context: In addition to illuminating additional assets, devices, and possible vulnerabilities, Arc detects process irregularities and questionable user behavior. Lower operational overhead: Because Arc can be remotely deployed through a software download, Nozomi Arc does not need extensive network adjustments to be implemented anywhere in the world, even in the most remote locations. About Nozomi Networks Nozomi Networks, with headquarters in San Francisco, California, accelerates digital transformation by defending the world's critical infrastructure, industrial enterprises, and government enterprises from cyber-attacks. Its technology provides OT and IoT environments with superior network and asset monitoring, threat detection, and analytics. As a result, customers rely on the company's solution to reduce risk and complexity while increasing operational resiliency. In addition, the organization provides zero-trust security by delivering contextual data for policy decisions, such as endpoint posture checks, baseline monitoring, and device role data.

Read More

PLATFORM SECURITY,SOFTWARE SECURITY

Vipre Security Group’s New Endpoint Detection & Response Technology for SMEs

VIPRE Security Group | January 19, 2023

VIPRE Security Group, an award-winning data, cybersecurity, privacy, and user protection company, recently announced the launch of its latest cybersecurity product, VIPRE Endpoint Detection & Response (EDR). VIPRE EDR is built to assist small and medium-sized businesses including their IT partners navigate the intricacies of EDR management with a single, simple-to-use console. VIPRE EDR provides a sophisticated high-performance, cloud-based solution while overcoming the problems users typically expect from an EDR solution. . This advanced technology detect better and uncovers more unusual behavior than a standalone antivirus file, process, and networking analysis solutions, while offering investigation and remediation tools to accelerate response times. The VIPRE EDR solution is based on the fundamental pillars of Detection, Investigation, Containment, and Remediation, transforming threats into intelligence and suggesting next steps for security professionals, as simply detecting a threat is insufficient. Advantages of VIPRE's Endpoint Detection and Response (EDR) System: Exploit prevention – It helps to prevent network threats with built-in DNS , intrusion protection and in-browser exploit prevention EPP/Next-generation Antivirus - VIPRE EDR, constantly scans processes, files, and network activity for known and undiscovered threats Correlated Behavior Engine - Examine endpoint behavior in greater depth to identify emergent or suspicious behavior connected across all engines Endpoint Isolation – Quickly isolates an afflicted device to prevent threat spreading Threat Incident Visualization – View and respond to all threat activity from a central location. Understand all aspects of endpoint activity related to the threat, including every user, process, file, and network activity Remote Shell - VIPRE EDR's click-button reporting enables admins instant remote access to the endpoint for a deeper look Suspicious file/link sandboxing - Detonates files and links in a private cloud sandbox for comprehensive examination and forensic investigation Integrated Vulnerability Management - App scanning and vulnerability management to close potential security gaps Built on the foundation of VIPRE's top-ranked Endpoint Security Cloud (EPP) platform, protection begins with extensive monitoring and automated blocking of malicious behavior across all endpoint processes, files, and network activity. This protection includes web, DNS and network monitoring, as well as AI-driven hostile process behavior detection. About VIPRE Security Group A part of Ziff Davis, Inc., VIPRE Security Group is a global organization specializing in cybersecurity, privacy, and data protection. It protects millions of people and businesses globally, including some very well-known brands. . For nearly 30 years, VIPRE Security Group's primary mission has been to provide easy solutions to protect against existing and potential internet threats in an ever-expanding, digitally connected world.

Read More

PLATFORM SECURITY,SOFTWARE SECURITY,END POINT PROTECTION

Wallarm Announces the Early Release of Its Enhanced API Security Technology

Wallarm | January 23, 2023

Wallarm, a leading end-to-end API security provider, has recently announced the early release of the Wallarm API leak management solution, an improved API security technology designed to assist organizations in identifying and remediating attacks exploiting leaked API keys and secrets while also providing ongoing protection against hacks in the event of a leak. Given the recent increase in hacks involving leaked API keys and other API secrets, Wallarm developed the API leak management solution in order to give a comprehensive solution for this issue by automatically detecting leaked API keys and secrets, implementing controls to prevent their use, and protecting against any follow-on attacks. As a result, it prohibits unwanted access to sensitive data within enterprises while also protecting their internal operations and customers from unauthorized use of that data. With the average cost of an API leak incident being $1.2 million per year, protecting API keys is a security and financial need. However, as locating and revoking API keys is both time-consuming and resource-intensive, Wallarm's proactive API leak management solution focuses on automated detection, remediation, and control using a three-pronged approach: Detect - Wallarm automatically searches public sources for leaked API secrets, which hackers can discover and exploit in under a minute. Remediate - Regardless of protocol, Wallarm immediately blocks requests that use compromised API secrets across the entire API portfolio. Control - Wallarm also continuously monitors and prevents the use of leaked API secrets. The Wallarm API leak management solution is the first of its kind in the API security space and is coupled with other Wallarm capabilities such as API threat prevention, API discovery and cloud-native WAAP. Wallarm’s API security platform provides customers with full-spectrum visibility, detection, and security for their entire web application and API portfolio, regardless of protocol or environment. This minimizes tool sprawl and costs while also increasing risk management and fostering innovation. About Wallarm Wallarm, founded in 2016, provides End-to-End API Security solutions to safeguard web applications, APIs, microservices, and serverless workloads in cloud-native environments. With its commitment to developing the cybersecurity industry, it has designed a new security platform to defend tech firms and Global 2000 enterprises throughout their journey from their legacy apps to APIs in cloud-native infrastructures. Hundreds of Security and DevOps teams use Wallarm to discover all of their web apps and API endpoints, traffic flows, and sensitive data consumption for total visibility, secure their whole API portfolio against emerging risks, and respond to incidents automatically for better risk management.

Read More

ENTERPRISE SECURITY,PLATFORM SECURITY,SOFTWARE SECURITY

Nozomi Networks Introduces the Industry’s First OT and IoT Endpoint Security Sensor

Nozomi Networks | January 25, 2023

On January 24, 2023, Nozomi Networks Inc., one of the leaders in OT and IoT security, announced Nozomi ArcTM, the industry's first IoT and OT endpoint security sensor, intended to accelerate time to full operational resilience exponentially. Nozomi Arc is designed to automatically deploy across a large number of locations and devices anywhere a company needs visibility, and it provides vital data and insights about essential assets and network endpoints. This data is utilized to better analyze and prevent attacks, as well as correlate user behavior, without straining existing resources or interrupting mission-critical networks. Arc is a game-changer in terms of comprehensive asset visibility, deployment speed, and network coverage across complex and remote OT and IT networks. Nozomi Arc is designed to: Be deployed remotely Analyze endpoint vulnerabilities Accelerate monitoring deployments in mission-critical systems; and Identify compromised hosts Nozomi Networks Co-founder and CPO, Andrea Carcano, said, "Operational resiliency is the top business priority for critical infrastructure organizations, which can only be achieved by lowering cyber risks and increasing security." He added, "Nozomi Arc accelerates time to resiliency by transforming every computer on the network into an OT security sensor. It quickly extends visibility to attack surfaces and threats inside endpoint hosts and their local networks. With Nozomi Arc, users can quickly corollate more information from more sources for better diagnostics and faster time to response." (Source – GlobeNewswire) With Nozomi Arc, users get the following advantages: Faster time to resiliency: Nozomi Arc removes time, resource, geographic, and internal policy limits from network-based deployments. Lower cyber risk and increased security: The only OT solution in the market that can identify malicious hardware. Extended visibility and context: In addition to illuminating additional assets, devices, and possible vulnerabilities, Arc detects process irregularities and questionable user behavior. Lower operational overhead: Because Arc can be remotely deployed through a software download, Nozomi Arc does not need extensive network adjustments to be implemented anywhere in the world, even in the most remote locations. About Nozomi Networks Nozomi Networks, with headquarters in San Francisco, California, accelerates digital transformation by defending the world's critical infrastructure, industrial enterprises, and government enterprises from cyber-attacks. Its technology provides OT and IoT environments with superior network and asset monitoring, threat detection, and analytics. As a result, customers rely on the company's solution to reduce risk and complexity while increasing operational resiliency. In addition, the organization provides zero-trust security by delivering contextual data for policy decisions, such as endpoint posture checks, baseline monitoring, and device role data.

Read More