Mantraps, access control systems, bollards and surveillance. Your guide to securing the data centre against physical threats and intrusions.
Identifying the security pitfalls in SDN
While a software-defined network can improve application performance and help ease administrative tasks, it can also create new vulnerabilities. Experts offer advice for security teams.
Think Design
In an exclusive interview, the team leading the IBM Studios in Dubai gives CNME a low-down on the objectives of the company’s new venture in the region and the value-add it can give to its customers.
Looking ahead
Wael El Kabbany, Vice President, Middle East, North Africa and Eastern Mediterranean, shares his predictions about the technology landscape in 2016.
Nimble management
DevOps adoption has grown with the changes in product development lifecycles, but the expansion has not worked out well for companies using the Git code management system.
Betting on education
Richard Brown, Director EMEA Channels and Alliances, Arbor Networks, urges resellers to enhance their skillset to be the preferred partners to customers.
The new storage disruption
Storage-class memory (SCM), also known as persistent memory, may be one of the most disruptive storage technology innovations to look out for in the next decade. Scott Davis, Chief Technology Officer, Infinio, discusses the technology’s benefits.
Mobile dilemma
Jacob Chacko, Business Lead, SMB and Commercial, Middle East and Turkey, Aruba, a Hewlett Packard Enterprise Company, delves into the data security challenges that non-malicious threats such as mobile devices bring to finance industry players.
The big move
Whether you’re looking to move to the cloud, considering the diversification of your cloud portfolio or simply looking to compare performance and value across clouds, we give you five key questions before making any decision.
The right way, shape and form
Emad Sallam, Client Solutions Marketing Manager, Dell Middle East, discusses the importance of device form factor in getting the best out of employees.
Steering clear of insider threats
Almost all data breaches involve the use of legitimate login credentials. Guarding against these ‘insider threats’ requires the ability to detect when cybercriminals are using stolen credentials.
Training for change
Tony Bishop, VP Global Enterprise Strategy and Marketing, Equinix, takes us through the trends that are impacting the digital economy in a big way and how businesses and partners can better prepare to face this transformation.
Prime prints
Shadi Bakhour, General Manager, Canon Emirates, says the onus lies on channel partners to educate customers on the new trends and the possibilities digital printing technology can offer to businesses.
Green gadgets
Kenneth Neil, Director, UAskmE, discusses how we can securely and responsibly dispose of our old devices.