Vibin Shaju, VP Solutions Engineering EMEA at Trellix, explains how XDR is crucial for cybersecurity in GCC as organizations seek …
How organisations can detect and respond to compromised employee identities
Threat actors understand that people hold access to an organisation’s most critical data, and that many can easily be tricked into unknowingly putting the security of their organisation in jeopardy.
“The days of enterprise apps running in a single environment are drawing to a close” – Bart Salaets, F5
Bart Salaets, EMEA Field CTO at F5, explains how multi-cloud networking can be both straightforward and secure. The days of …
“For UAE government departments, it’s all about the experience” – Rany Tannouri, Avaya
In an exclusive op-ed for tahawultech.com, Avaya’s Rany Tannouri, outlines how government departments up and down the country are making …
The transformational power of video live agents in customer care
Video live agents empower businesses to establish direct and personalised connections with their customers. In contrast to traditional customer care methods characterised by lengthy waiting periods and impersonal interactions, video live agents facilitate real-time face-to-face communication.
Pure Storage CTO outlines the need to ‘strike the right balance’ with storage platform development
Alex McMullan, CTO International at Pure Storage, has outlined the need for CTOs and CIOs to strike the right balance …
“Businesses must learn to live with ransomware” – Edwin Weijdema, Veeam
Edwin Weijdema, Field CTO EMEA and Lead Cybersecurity Technologist at Veeam, said that businesses simply have to learn to live …
The significance of ECM & BPM in business transformation
BPM works in combination with ECM that enables the automation of various activities such as accounts payable, contract management, content management, information security and governance.
“Commercial data centres are under siege by cyber criminals” – Adrian Taylor, A10 Networks
Adrian Taylor, VP EMEA at A10 Networks, has penned an exclusive op-ed that highlights the issues facing commercial data centre …
“It is important to remember that AI is a double-edged sword” – Kinda Baydoun, Veeam
Kinda Baydoun, Head of Channel & Alliances – Middle East & CIS at Veeam, has penned a thought leadership article …
Four principles for creating a blueprint for secure software development
A recent study from Duke University found a stunning 85% of surveyed midsize companies across sectors reported their systems had been successfully penetrated at some point, despite many of these organisations potentially following long-established best practices.
Opinion: How can enterprises win the cybersecurity battle?
Zeki Turedi, CTO, EMEA at CrowdStrike has penned a thought leadership article which outlines how ‘identity’ holds the key to …
The power of AI in revenue management
Embracing AI as a strategic tool empowers revenue managers to make data-driven decisions, enhance customer satisfaction, and achieve new heights of success in today’s dynamic business landscape.
Why advanced NDR is a must-have for protecting against rising cyber attacks
Gaurav Mohan, VP, SAARC & Middle East, NETSCOUT explains how depending solely on endpoint detection is not enough to protect …