Westcon-Comstor Middle East has announced that it will be hosting IMAGINE Middle East, a two-day virtual summit for IT resellers and integrators.
Change is in the air! Join the Westcon-Comstor #IMAGINE Middle East Event to explore futuristic technologies and solutions! Watch this …
In the first part of the latest edition of DigiTalks featuring BeyondTrust Regional Vice President for Middle East John Hathaway, …
Decision-makers are doubling-down on their investments for digital technologies with 97 percent claiming that the COVID-19 crisis has accelerated their digital transformation strategies.
5G has the potential to boost consumer and enterprise market bringing a series of benefits such as high speeds, lower latency and more bandwidth.
Mimecast Limited has announced that Jonathan Corini has been appointed the new Senior Vice President of Global Channel Sales.
David Shi, President of Enterprise Business Group, Huawei Middle East, delves into how new connectivity, computing, platforms, and ecosystems will set the course towards an ‘Intelligent World.’
Dell Technologies has announced the launch of Dell Financial Services in UAE and Saudi Arabia, to provide additional support to the company’s partners and customers.
NetApp has announced enhancements to the cloud-connected NetApp ONTAP data management software.
Tenable has announced new Tenable Lumin innovations that empower customers to align business objectives with cybersecurity initiatives.
BeyondTrust has announced that BeyondTrust Privilege Management for Windows is fully integrated with the company’s flagship Privileged Password Management solution Password Safe.
Riverbed has opened registrations for the Riverbed Global User Conference 2020, a free one-day virtual event on 17th November 2020.
Paul Ducklin, Principal Research Scientist at Sophos, offers some tips for keeping IoT devices and other connected computers secure at home – especially if you are working from home as well.
The study highlighted that, in particular, the confidence of IT managers and their approach to battling cyber-attacks differ significantly depending on whether or not their organisation has been attacked by ransomware.