Nirav Modi, Vice President and General Manager, Blue Planet, discusses key questions to address before making the leap to Software-Defined WAN.
What are the top cybercrime activities businesses need to watch out for, and what can be done to combat them?
By focusing on hardening the physical security systems we have to be sure that we have three elements: people, processes and systems, says Pierre Racz, President, Genetec.
While DNS infrastructure is inherently a vulnerable component for organisations, effective internal DNS security solutions can turn it into a great asset for securing an organisation’s networks and data.
IoT security challenges include weak authentication and authorisation protocols, insecure software, firmware with hard-coded back doors, poorly designed connectivity and communications, and little to no configurability.
Hemayun Bazaz, Regional Manager, Channel Sales, Middle East and Turkey at Aruba, a Hewlett Packard Enterprise company, elaborates on how SMEs are a growing target for cybercriminals in the Middle East and why specialisation can help partners be successful here.
Martin Percival, Senior Solutions Architect, Red Hat, on overcoming the challenges of hybrid cloud management.
Osama AlHaj-Issa, Regional Channel Director, Middle East and Turkey, Aruba, a Hewlett Packard Enterprise company, shares how partners can seize market opportunities to be successful.
Clinton Firth, MENA Cyber Leader, EY Africa, India and Middle East (AIM), on how organisations can build resilient systems to protect themselves against cyber threat actors.
Citrix’ 2016 Global Desktop-as-a-Service Market Report reveals that 70 percent of its service providers anticipate increased DaaS revenues in this year. Director for Technology Sales and Services, MEA, Arthur Dell, shares more highlights.
Bruce Zhou, CEO, Axilspot, explains how partners can overcome the challenges of IoT and the Internet worlds integrating.
Tarek Jundi, Managing Director, Middle East and North Africa, Intel Security, elaborates on the factors required to be a successful managed security service provider.
Developers are decoupling massive system architectures into small, independent functions that loosely work together to solve complex problems.
Having seen first-hand the damage that can be caused by malicious IoT devices during the Dyn attack in October, organisations must now consider what can be done to keep these clever things from causing harm.