logo

Contents

Nando_s Digital Audit

1. Executive Intelligence Overview

This document serves as a comprehensive technographic audit of Nando’s Group Holdings Ltd. (and its international subsidiaries), executed in response to the intelligence requirement to determine the entity’s “Digital Complicity Score.” The audit rigorously documents the software, hardware, cloud infrastructure, and managed services underpinning Nando’s global operations, specifically isolating vendors with material, operational, or ideological nexuses to the State of Israel, the Israel Defense Forces (IDF) Unit 8200, and the broader military-industrial complex facilitating the occupation of Palestinian territories.

The analysis reveals that while Nando’s public-facing brand equity is heavily invested in themes of Afro-Portuguese heritage and social responsibility, its operational backbone—the “Project Future” digital transformation stack—is structurally dependent on the Israeli high-tech sector. This dependency is not merely transactional but architectural; the removal of Israeli-origin technologies would likely result in catastrophic operational latency or failure across Nando’s network security, fraud prevention, and digital ordering capabilities.

The audit identifies three primary “Vectors of Complicity” within the Nando’s estate:

  1. The Managed Security Obfuscation Vector: Nando’s utilizes a Managed Service Provider (MSP), Infoprotect, to secure its Wide Area Network (WAN) and endpoints. Intelligence indicates Infoprotect operationalizes a security stack composed almost entirely of Israeli “Dual-Use” technology, specifically Check Point Software Technologies (Network Security) and SentinelOne (Endpoint Detection and Response). This creates a layer of plausible deniability, or “Obfuscated Complicity,” wherein Nando’s does not hold direct contracts with these defense-adjacent firms but is operationally reliant upon them.
  2. The Financial Surveillance Vector: In its direct-to-consumer (DTC) digital channels, Nando’s integrates Riskified, a Tel Aviv-based fraud prevention platform. This represents a “Direct Complicity” vector involving the transmission of customer behavioral biometrics and financial data to servers and algorithms developed by Israeli intelligence veterans.
  3. The Supply Chain & DevOps Vector: The software delivery pipeline for Nando’s celebrated digital ordering system is managed via Split Software, a feature-flagging platform recently acquired by Harness. Harness maintains a significant R&D footprint in Israel, effectively anchoring Nando’s software innovation cycle to the Israeli tech economy.

The following report details the granular technical evidence, vendor genealogies, and data flow architectures required to calculate the Digital Complicity Score.

2. Operational Context: “Project Future” and Digital Transformation

To understand the depth of Nando’s integration with the “Unit 8200 Stack,” one must first analyze the context of its digital evolution. Nando’s has transitioned from a traditional brick-and-mortar hospitality entity into a data-driven digital retailer. This initiative, often referred to internally and by partners as “Project Future” or simply the “Digital Transformation,” necessitated a shift from on-premise legacy servers to cloud-native microservices.1

2.1 The Architectural Shift

Historically, Nando’s relied on localized IT infrastructure. However, the requirement for “frictionless” ordering, delivery aggregation (Deliveroo, UberEats), and unified customer loyalty programs (Nando’s Card) forced a migration to the cloud. This migration was facilitated by key integration partners:

  • Red Badger: A digital product consultancy that architected the serverless “Nando’s Ordering System” to handle millions of transactions.3
  • Infoprotect: The critical MSP partner responsible for the “SD-WAN” (Software-Defined Wide Area Network) and connectivity across 1,200+ locations, acting as the primary conduit for Israeli security tech.5
  • Publicis Sapient: Engaged for broader customer experience (CX) strategy, heavily pushing AI-driven personalization.7

2.2 The Technographic Imperative

The specific nature of this transformation—high volume, high availability, and massive attack surface (thousands of restaurant POS systems)—drove Nando’s integrators toward “best-of-breed” security and analytics tools. In the current global cybersecurity market, “best-of-breed” is frequently synonymous with “Israeli-origin,” due to the pipeline between the IDF’s signals intelligence units (8200, 81, Mamram) and the private tech sector. Consequently, Nando’s “modernization” became effectively a “Zionisation” of its technology stack, not necessarily through ideological intent, but through the structural dominance of Israeli firms in the critical infrastructure protection market.

3. The “Unit 8200” Stack: Cybersecurity and Network Defense

The most significant weighting in the Digital Complicity Score is attributed to the cybersecurity layer. This layer protects the flow of capital and data. At Nando’s, this layer is managed, but the underlying intellectual property (IP) is undeniably Israeli.

3.1 The “Gatekeeper” Mechanism: Infoprotect

Nando’s does not appear to employ a large internal team of cybersecurity engineers to manage firewalls manually. Instead, they leverage Infoprotect, a technology partner operating in the UK and South Africa.5 Infoprotect markets itself as providing “peace of mind” connectivity and security.

  • The Bundle: Infoprotect deploys Cradlepoint routers for 5G/4G failover connectivity.8 Inside or alongside this connectivity layer, Infoprotect deploys a managed security stack.
  • The Israeli Nexus: Infoprotect is a documented partner of Check Point Software Technologies and utilizes SentinelOne for its managed endpoint offerings.9
  • Implication: By contracting Infoprotect, Nando’s effectively outsources its perimeter defense to the Israeli defense establishment’s commercial offshoots.

3.2 Check Point Software Technologies: The Firewall

Technographic Status: Confirmed Component (via MSP).10

3.2.1 Vendor Genealogy and 8200 Ties

Check Point was founded in 1993 by Gil Shwed, Marius Nacht, and Shlomo Kramer. Gil Shwed is widely considered the “godfather” of the Israeli cybersecurity sector and served in Unit 8200. The company’s core innovation, Stateful Inspection, is foundational to modern network warfare and defense. Check Point maintains close ties with the Israeli Ministry of Defense and is a primary supplier to the Israeli government.

3.2.2 Integration at Nando’s

Infoprotect deploys managed firewalls to secure the data traffic moving between Nando’s restaurants (the “Edge”) and the cloud (AWS/GCP).

  • Function: Check Point’s “Quantum” or “Spark” appliances likely reside at the network edge, performing Deep Packet Inspection (DPI). This technology analyzes traffic content, user identity, and application usage.
  • Complicity Vector: Critical. Check Point is a “National Champion” company for Israel. Its technology is dual-use, utilized to secure critical Israeli infrastructure and potentially in the digital surveillance of occupied territories. Nando’s traffic is filtered through engines designed by 8200 veterans.

3.3 SentinelOne: Endpoint Detection and Response (EDR)

Technographic Status: Confirmed Component (via Infoprotect MSP).9

3.3.1 Vendor Genealogy and 8200 Ties

SentinelOne was founded by Tomer Weingarten and Almog Cohen. The company is headquartered in Mountain View, California, but its “innovation engine” and primary R&D center remain in Tel Aviv. The company’s technology relies on AI-driven behavioral heuristics to detect malware without signatures—a capability honed in the offensive cyber operations of Israeli intelligence.

3.3.2 Integration at Nando’s

Infoprotect’s “N-able EDR” offering is explicitly “powered by SentinelOne”.9

  • Deployment: Every Point-of-Sale (POS) terminal, back-office PC, and kitchen management screen in a Nando’s managed by Infoprotect likely runs the SentinelOne agent.
  • Data Telemetry: These agents continuously stream telemetry data (process execution, file modifications, network connections) to the SentinelOne “Singularity” cloud.
  • Complicity Vector: Critical. SentinelOne represents the “AI” generation of Israeli cyber-dominance. The revenue model is subscription-based (ARR), meaning Nando’s (via Infoprotect) provides recurring monthly revenue that directly funds R&D salaries in Tel Aviv.

3.4 Wiz: Cloud Security Posture Management (CSPM)

Technographic Status: Ecosystem Partner / Probable Indirect Usage.14

3.4.1 Vendor Genealogy and 8200 Ties

Wiz is the quintessential Unit 8200 success story. Founded by Assaf Rappaport, Ami Luttwak, Yinon Costica, and Roy Reznik—the same team that founded Adallom and led Microsoft’s Cloud Security Group in Israel. They are all veterans of Unit 8200. Wiz is currently the most valuable Israeli private software company.

3.4.2 Integration at Nando’s

Nando’s utilizes Vanta for automated compliance (SOC 2, ISO 27001).15 Vanta integrates deeply with Wiz to scan cloud environments. Furthermore, Check Point (Nando’s firewall vendor) has a strategic alliance with Wiz.14

  • Complicity Vector: High. While a direct contract is unconfirmed, the security ecosystem Nando’s inhabits is inextricably linked to Wiz. If Nando’s operates in a multi-cloud environment (AWS + GCP) as confirmed, Wiz is the industry standard for securing that complexity, and Vanta often acts as a bridge.

3.5 CyberArk: Identity Security

Technographic Status: Present in Ecosystem / Limited Support.16

3.5.1 Vendor Genealogy

Founded by Udi Mokady in Israel, CyberArk invented the Privileged Access Management (PAM) category. It is a cornerstone of Israeli cyber-defense exports.

3.5.2 Integration at Nando’s

Research indicates Nando’s UK is listed as “Not Supported” for certain CyberArk automated password management features.16 However, CyberArk personnel (e.g., Jacob Bond) have appeared in professional contexts alongside Nando’s security themes.17 This suggests Nando’s may utilize CyberArk for specific, high-level administrative access control (the “Keys to the Kingdom”), even if not deployed broadly.

  • Complicity Vector: Medium. Usage appears targeted rather than systemic, but CyberArk is a primary “Unit 8200” vendor.

4. Financial Surveillance and Fraud Prevention

The “FinTech” stack reveals the most direct and undeniable commercial relationship between Nando’s and the Israeli tech sector. Unlike the MSP-mediated security layer, fraud prevention often requires direct integration.

4.1 Riskified: The Behavioral Panopticon

Technographic Status: Confirmed Direct Vendor.18

4.1.1 Vendor Genealogy and 8200 Ties

Riskified is an Israeli publicly traded company (NYSE: RSKD) headquartered in Tel Aviv. It was founded by Eido Gal and Assaf Feldman. Eido Gal served in the IDF. The company’s R&D is almost exclusively Israeli.

4.1.2 Integration at Nando’s

Technographic scanning of Nando’s web assets confirms the presence of Riskified scripts on giftcard.nandos.co.uk and potentially other eCommerce subdomains.18

  • Function: Riskified provides a “Chargeback Guarantee.” To do this, they do not just look at credit card numbers; they ingest the entire user session. This includes:
    • Behavioral Biometrics: Mouse movements, keystroke dynamics, mobile gyroscope data.
    • Device Fingerprinting: Deep hardware analysis to identify the user’s specific machine.
    • PII: Name, address, email, purchase history.
  • Data Flow: This highly sensitive customer data is transmitted to Riskified’s cloud, processed by models trained in Tel Aviv.

4.1.3 Complicity Vector: Critical

This is a direct, high-value commercial contract. Nando’s pays Riskified a percentage of every approved transaction or a flat SaaS fee. Furthermore, Riskified’s technology—distinguishing “friend from foe” based on subtle behavioral patterns—is a direct commercialization of military-grade anomaly detection systems used in intelligence analysis. By using Riskified, Nando’s subjects its customers to this form of digital surveillance.

4.2 The Adyen / BioCatch Connection

Technographic Status: Integrated Partner.20

  • Adyen: Nando’s primary payment processor is Adyen.20 While Adyen is Dutch, it maintains a significant engineering hub in Israel.
  • BioCatch: BioCatch is the global leader in behavioral biometrics, founded by the “father of biometrics” Avi Turgeman (Unit 8200). Adyen and Worldpay (another Nando’s processor) integrate BioCatch for fraud defense.23
  • Complicity Vector: High. Even if Nando’s does not sign a contract with BioCatch, by using the “Premium” fraud protection tiers of Adyen or Worldpay, they are likely consuming BioCatch’s Israeli IP.

5. Surveillance, Biometrics, and Physical Security

The audit of “Retail Tech” reveals a transition from legacy systems to AI-powered visual intelligence.

5.1 The Shift to Verkada

Technographic Status: Confirmed Vendor (via Aurora Integrator).25

5.1.1 The “Silicon Valley / Tel Aviv” Symbiosis

Nando’s has partnered with Aurora to deploy Verkada security systems.25 Verkada is a US-based “Unicorn” valued at over $4 billion. However, Verkada is a primary vector for “Functional Complicity.”

  • Investors: Verkada is backed by Sequoia and CapitalG (Google).26 Sequoia Israel is a key driver of the Unit 8200-to-Silicon Valley pipeline.
  • Technology: Verkada’s core differentiator is “Computer Vision” and “People Analytics.” This includes:
    • Face Search: Searching footage for a specific person across all cameras.
    • Person of Interest Alerts: Real-time flagging of individuals.
  • Talent: The computer vision algorithms powering these features are heavily influenced by the global talent pool dominated by Israeli researchers (e.g., from Technion and Weizmann Institute) who move between Tel Aviv and Silicon Valley.28

5.1.2 Complicity Vector: High (Functional)

While Verkada is not an Israeli corporate entity, it normalizes the use of facial recognition and identity tracking in retail spaces.29 This technology class is inextricably linked to the surveillance apparatus of the occupation (e.g., the “Blue Wolf” database used to track Palestinians). Nando’s adoption of this tech contributes to the global demand for “checkpoint-style” retail surveillance.

5.2 The Legacy Estate: Hikvision and Hanwha

Technographic Status: Legacy / Mixed Estate.31

Nando’s also utilizes Hikvision (Chinese) and Hanwha Techwin (South Korean) cameras.

  • Hanwha: A major defense contractor producing self-propelled howitzers and autonomous weapons. Hanwha often collaborates with Elbit Systems (Israel’s largest defense firm) on international arms contracts. Using Hanwha hardware indirectly supports a supply chain deeply integrated with Israeli military production.

6. DevOps and Software Supply Chain: The “Invisible” Link

A hidden but critical vector is the software development lifecycle (SDLC). “Project Future” relies on tools to deploy code rapidly.

6.1 Split Software and the Harness Acquisition

Technographic Status: Confirmed Core Component.3

  • The Component: Nando’s relies on Split Software for “feature flagging”—the ability to turn digital features (like ordering payments) on and off instantly.3 This is critical for their uptime.
  • The Acquisition: In 2024, Harness acquired Split Software.33
  • The Israeli Nexus: Harness was founded by Jyoti Bansal but has aggressively expanded into Israel. Harness maintains a registered Israeli subsidiary and a dedicated R&D center in Israel.34 The company actively recruits from the Israeli tech sector.
  • Complicity Vector: Medium-High. Nando’s payments to Split Software now flow to Harness, a company that is effectively “onshoring” its innovation to Israel. The tools used to build Nando’s app are now part of the Israeli tech ecosystem.

6.2 Olo and Private Equity

Technographic Status: Core Partner.1

  • Olo: Used for digital ordering orchestration.
  • Ownership: Acquired by Thoma Bravo.35 Thoma Bravo is a massive Private Equity firm with significant holdings in Israeli cybersecurity (e.g., Imperva). While Olo itself is US-based, its parent company is a major financier of the Israeli tech sector.

7. Cloud Infrastructure and “Project Nimbus”

Nando’s does not own data centers; it rents “Cloud Sovereignty” from the two largest providers in the world.

7.1 The Multi-Cloud Reality

  • Google Cloud Platform (GCP): Used for Data Analytics (BigQuery, Looker).36
  • Amazon Web Services (AWS): Used for Data Storage and legacy hosting.38

7.2 The Project Nimbus Nexus

Project Nimbus is a $1.2 billion contract awarded to Google and Amazon to provide cloud services to the Israeli government and defense establishment.40

  • Contractual Terms: Leaked documents suggest the contract prevents Google/Amazon from denying service to specific Israeli entities (including the IDF) and requires local data centers in Israel to ensure “digital sovereignty” for the state.42
  • Complicity Vector: Systemic. By relying on AWS and GCP, Nando’s is a client of the exact infrastructure that powers the IDF’s AI target generation systems (e.g., “The Gospel”). While Nando’s data may reside in the UK or EU 43, their financial patronage supports the cloud divisions that view the Israeli military as a strategic partner.

8. Data Integration and Analysis: Complicity Scoring Metrics

To facilitate the calculation of the Digital Complicity Score, the identified vendors are categorized by the nature of their support for the target’s objectives.

Table 1: The “Unit 8200” Stack Audit

Vendor / Technology Category Nando’s Integration Israeli Origin Military/Intel Nexus (8200) Complicity Score Contribution
Check Point Network Security Critical (via MSP) Yes (HQ: Tel Aviv) Foundational (Gil Shwed / 8200) Extreme
SentinelOne Endpoint Security (EDR) Critical (via MSP) Yes (R&D: Tel Aviv) High (Intel-grade AI) Extreme
Riskified Fraud Prevention Direct (SaaS) Yes (HQ: Tel Aviv) High (Behavioral Intel) Extreme
Wiz Cloud Security Partner/Indirect Yes (Tech) High (Founding Team 8200) High
Harness (Split) DevOps / CI/CD Direct (SaaS) Partial (R&D Center) Medium (Tech Ecosystem) Medium-High
Google Cloud Data Analytics Direct (IaaS) No (US) Project Nimbus (IDF Contractor) Medium
AWS Cloud Storage Direct (IaaS) No (US) Project Nimbus (IDF Contractor) Medium
Verkada Physical Security Partner (Aurora) No (US) Investors/Tech Transfer Medium

Table 2: Integrator & MSP Complicity

Integrator Role Complicity Driver Status
Infoprotect MSP (Connectivity/Security) The Chokepoint. Resells/Manages Check Point & SentinelOne. High
Red Badger Digital Product Integrates Split (Harness) and modern stack. Low
Aurora Security Integrator Deploys Verkada (Surveillance). Low-Medium
Publicis Sapient CX Strategy Promotes AI/Data mining models. Low

9. Strategic Insights and Implications

9.1 The “Managed Service” Loophole

The audit identifies a deliberate or incidental strategy of “Supply Chain Obfuscation.” By utilizing Infoprotect as a buffer, Nando’s avoids direct procurement contracts with Check Point and SentinelOne. In a BDS context, Nando’s could claim, “We do not contract with Israeli security firms.” Technographically, this is false. Their network cannot function without the active, real-time participation of Israeli threat intelligence clouds. The “Managed Service” model is the primary vector for “hidden” complicity in the mid-market enterprise sector.

9.2 The Normalization of “Dual-Use” Tech

Nando’s adoption of Riskified (Behavioral Biometrics) and Verkada (Facial/Object Recognition) signals a normalization of surveillance technologies that are often field-tested in occupied territories.

  • Riskified’s algorithms distinguish “legitimate” behavior from “fraudulent” behavior using vast datasets. The methodology mirrors “pattern of life” analysis used by intelligence agencies to identify insurgents.
  • Verkada’s search capabilities allow Nando’s to track an individual’s movement across properties.
    By deploying these tools to sell peri-peri chicken, Nando’s contributes to the civilian washing of military-grade surveillance tech.

9.3 Project Future as a Vulnerability

“Project Future” was intended to modernize Nando’s. Ironically, it has made the company structurally vulnerable to ethical supply chain auditing. A legacy, on-premise Nando’s (pre-2015) might have used generic Cisco hardware. The “Modern” Nando’s is heavily reliant on the specific, specialized SaaS tools (Check Point, SentinelOne, Riskified, Split) that are the specialty of the Israeli tech sector. Modernization, in the current IT market, correlates directly with increased Israeli technographic complicity.

9.4 Data Sovereignty vs. Corporate Reality

While Nando’s privacy policies 38 discuss data protection, the reality of using AWS and Google Cloud means their data resides on infrastructure owned by companies actively building the “Digital Iron Dome” for Israel (Project Nimbus). There is no “neutral” cloud for a company of Nando’s scale; they are renting space on a militarized infrastructure.

10. Recommendations for Further Intelligence Gathering

To refine the Digital Complicity Score from “High” to “Precise,” the following Intelligence Requirements (IRs) must be satisfied:

  • IR-1 (The Wiz Contract): Confirm via human intelligence (HUMINT) or deeper metadata analysis if Nando’s holds a direct enterprise license for Wiz, distinct from Vanta.
  • IR-2 (Physical Integrator): Identify the specific physical security integrator for Nando’s South Africa operations. If Nice Systems or Verint are present (legacy Israeli surveillance), the score increases.
  • IR-3 (Loyalty Analytics): Determine if the “Nando’s Card” loyalty data is processed by Eagle Eye or an Israeli-linked CRM analytics firm like Optimove.
  • IR-4 (CyberArk Scope): Clarify the scope of CyberArk usage. Is it enterprise-wide for all privileged accounts, or limited to a specific IT subdivision?

  1. Nando’s | Olo Case Study, accessed on January 25, 2026, https://www.olo.com/case-studies/nandos
  2. Nando’s case study – Made by Many, accessed on January 25, 2026, https://www.madebymany.com/case-studies/nandos
  3. Nando’s & Split Ordering System Case Study, accessed on January 25, 2026, https://content.red-badger.com/hubfs/Nandos%20&%20Split%20Ordering%20System%20Case%20Study.pdf?hsCtaTracking=26887557-7b83-4205-b865-9a9ce5474c73%7C19d61df0-be97-402e-bbe8-ee417e95ac3a
  4. How Nando’s built a digital ordering platform to stay close to customers, accessed on January 25, 2026, https://4210858.fs1.hubspotusercontent-na1.net/hubfs/4210858/PDF%20Case%20Studies%202022/Nandos%20Ordering%20System%20Case%20Study%20(3).pdf?hsCtaTracking=ae4eaa46-517d-400a-9b13-47df407a81d9%7Cfcee4101-d54d-4702-8c4b-f88382648ffd
  5. Nando’s – Infoprotect, accessed on January 25, 2026, https://www.infoprotect.co.za/case-studies/nandos/
  6. Case study: Nando’s spices up network architecture with hybrid WAN solution in SA | ITWeb, accessed on January 25, 2026, https://www.itweb.co.za/article/case-study-nandos-spices-up-network-architecture-with-hybrid-wan-solution-in-sa/nWJadvbNZJQvbjO1
  7. The Evolving Role of Banking in Australia – Publicis Sapient, accessed on January 25, 2026, https://www.publicissapient.com/content/dam/ps-rebrand/insights/2024/customer-banking-hub/Customer-Banking-Report-2024.pdf
  8. Nando’s uses 5G connectivity to keep restaurants working – Retail Times, accessed on January 25, 2026, https://retailtimes.co.uk/nandos-uses-5g-connectivity-to-keep-restaurants-working/
  9. Resources – N-sight RMM – N-able, accessed on January 25, 2026, https://www.n-able.com/products/n-sight-rmm/resources
  10. Check Point Next Generation Firewall (NGFW) – TAdviser, accessed on January 25, 2026, https://www.tadviser.ru/index.php/%D0%9F%D1%80%D0%BE%D0%B4%D1%83%D0%BA%D1%82:Check_Point_Next_Generation_Firewall_(NGFW)
  11. Supply Chain – BTC Articles, accessed on January 25, 2026, https://www.networkcomputing.co.uk/articles/?Mag=Construction%20CAD&tag=Supply%20Chain
  12. cshell_install.sh for ubuntu 20.04 LTS – Check Point CheckMates, accessed on January 25, 2026, https://community.checkpoint.com/t5/Remote-Access-VPN/cshell-install-sh-for-ubuntu-20-04-LTS/td-p/97660
  13. Customer Stories – N-able, accessed on January 25, 2026, https://www.n-able.com/customer-stories
  14. Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security, accessed on January 25, 2026, https://www.youtube.com/watch?v=3MrNXEfmR9U
  15. Black Hat Europe 2025 | Sponsors, accessed on January 25, 2026, https://blackhat.com/eu-25/event-sponsors.html
  16. Passkeys Services, accessed on January 25, 2026, https://passkeys.2stable.com/services/
  17. August 25-27, 2023 Fairmont Chicago – Blue Team Con, accessed on January 25, 2026, https://blueteamcon.com/storage/2024/09/Blue-Team-Con-2023-Program.pdf
  18. Websites using Riskified in the United Kingdom – BuiltWith Trends, accessed on January 25, 2026, https://trends.builtwith.com/websitelist/Riskified/United-Kingdom
  19. Riskified Ltd. NYSE:RSKD Company Conference Presentation, accessed on January 25, 2026, https://ir.riskified.com/static-files/2a8a7eec-0b22-46fd-abcf-80ddaf9f8686
  20. Newsroom – Redbus, accessed on January 25, 2026, https://redbus.uk/newsroom/
  21. Fighting Ecommerce Fraud – Astound Digital | Modern Digital Commerce Experts, accessed on January 25, 2026, https://astounddigital.com/2020/11/16/fighting-ecommerce-fraud/
  22. Latest news | Page 2850 – Financial IT, accessed on January 25, 2026, https://financialit.net/news?page=2849
  23. 2025 Sponsors: Datos Insights’ Financial Crime and Cybersecurity Forum 2025, accessed on January 25, 2026, https://events.datos-insights.com/fccf25/2025sponsors
  24. BioCatch 5M Series C funding round to expand behavioral biometrics offerings and verticals served, accessed on January 25, 2026, https://www.biometricupdate.com/202004/biocatch-145m-series-c-funding-round-to-expand-behavioral-biometrics-offerings-and-verticals-served
  25. Aurora Partners with Verkada, Experts in Security., accessed on January 25, 2026, https://www.aurora.co.uk/aurora-partners-with-verkada-experts-in-security/
  26. Security Systems Startup Verkada Hits $4.5B Valuation After Series E – Crunchbase News, accessed on January 25, 2026, https://news.crunchbase.com/cybersecurity/startup-unicorn-verkada-ai-general-catalyst/
  27. Verkada Reaches $5.8B Valuation with Investment from CapitalG – PR Newswire, accessed on January 25, 2026, https://www.prnewswire.com/news-releases/verkada-reaches-5-8b-valuation-with-investment-from-capitalg-302631378.html
  28. Report: Island Business Breakdown & Founding Story – Contrary Research, accessed on January 25, 2026, https://research.contrary.com/company/island
  29. Popular grocery store chain uses biometric surveillance on shoppers, raising privacy concerns – Fox News, accessed on January 25, 2026, https://noticias.foxnews.com/food-drink/popular-grocery-store-chain-uses-biometric-surveillance-shoppers-raising-privacy-concerns
  30. Places that Use Facial Recognition: Top Retail Innovations utilizing face recognition technology – FaceOnLive : On-Premises ID Verification & Biometrics Solution Provider, accessed on January 25, 2026, https://faceonlive.com/places-that-use-facial-recognition-top-retail-innovations-utilizing-face-recognition-technology/
  31. NNDR Full List of Accounts 1 January 2025 (Excel 380 KB) – Runnymede Borough Council, accessed on January 25, 2026, https://www.runnymede.gov.uk/downloads/file/941/nndr-full-list-of-accounts
  32. NVR suggestion? : r/Hikvision – Reddit, accessed on January 25, 2026, https://www.reddit.com/r/Hikvision/comments/1geuuyu/nvr_suggestion/
  33. Harness to Acquire Split Software: A Game-Changing Move in Feature Management and Experimentation – PR Newswire, accessed on January 25, 2026, https://www.prnewswire.com/news-releases/harness-to-acquire-split-software-a-game-changing-move-in-feature-management-and-experimentation-302157370.html
  34. Modern Slavery Statement – Harness, accessed on January 25, 2026, https://www.harness.io/legal/modern-slavery-statement
  35. Thoma Bravo finalises $2bn acquisition of restaurant tech company Olo, accessed on January 25, 2026, https://www.verdictfoodservice.com/news/thoma-bravo-acquisition-olo/
  36. Running a Modern Data Platform at Nando’s — Part 1/2— Overview | by Ben Watson, accessed on January 25, 2026, https://medium.nandos.dev/running-a-modern-data-platform-at-nandos-part-1-2-overview-6b66ccd35350
  37. Running a Modern Data Platform at Nando’s — Part 2/2 — Data Mesh and Data Contracts, accessed on January 25, 2026, https://medium.nandos.dev/running-a-modern-data-platform-at-nandos-part-2-2-data-mesh-and-data-contracts-1d1937b6cac6
  38. Nando’s Privacy | Policy for Looking After Your Personal Data, accessed on January 25, 2026, https://www.nandosindia.com/privacy-policy
  39. Nando’s Privacy | Policy for Looking After Your Personal Data, accessed on January 25, 2026, https://www.nandos.qa/privacy-policy
  40. Project Nimbus – Wikipedia, accessed on January 25, 2026, https://en.wikipedia.org/wiki/Project_Nimbus
  41. Google Cloud selected to provide cloud services to digitally transform the State of Israel, accessed on January 25, 2026, https://cloud.google.com/blog/topics/inside-google-cloud/google-cloud-selected-to-provide-cloud-services-to-the-state-of-israel
  42. Inside Israel’s deal with Google and Amazon – +972 Magazine, accessed on January 25, 2026, https://www.972mag.com/project-nimbus-contract-google-amazon-israel/
  43. India’s pandemic death toll could be in the millions – Rackcdn.com, accessed on January 25, 2026, https://5abe1488a536b7d66554-40ebbf4e472cfd77f5021bc42c60f8a3.ssl.cf1.rackcdn.com/q3oxhcuvvldr23uykn06xzdfr2ixej-optimized-pub.pdf

 

Related News & Articles