This company structures its business around global platforms, managing interests in more than 50 countries while upholding the highest international standards of governance and risk management.
What is Mubadala?
Mubadala’s own Google-like platform that acts as an intelligent expertise locator.
What is Discover?
Mubadala ensures compliance and protection of personal data by enforcing this framework.
What is data governance framework?
UAE Investments, Private Equity, Credit & Special Situations and Real Assets.
Which are Mubadala’s 4 Business Units?
This platform captures and curates deal-related knowledge and partner interactions.
What is DealCloud?
This is a core pillar of Mubadala, ensuring data is treated as a strategic asset.
What is data governance?
According to the Acceptable IT Usage Policy, every device and account must have this basic line of defense.
What is password protection?
This Business Unit focuses on accelerating the UAE’s economic transformation by building world- class local champions, fostering vibrant industrial and commercial clusters, and engaging with global partners.
What is UAE Investments?
This document standardizes almost 1,000 business terms & their definitions across the organization (such as “Asset,” “Mubadala Group,” or “Deal vs. Investment”).
What is the Mubadala Business Glossary?
Employees use this Outlook button to report suspicious messages.
What is 'Report Phishing MIC'?
These roles are responsible for authorizing access to restricted information.
Who are Data Domain Owners?
He serves as Mubadala’s current Chairman.
Who is His Highness Sheikh Mansour bin Zayed Al Nahyan?
This digital AI assistant gives centralized access to Human Capital, D&TS, and Ethics & Compliance policies and resources allowing users to ask questions and receive instant support across these domains.
What is M Assist?
Mubadala’ email security tools block thousands of these harmful messages each year — often carrying viruses or malicious attachments.
What is malware?
This policy permits limited personal use of IT systems but forbids peer-to-peer activities.
What is the Acceptable IT Usage Policy?