According to Zebra, the new programme unifies its previous channel programme, following its acquisition of Motorola Solutions’ Enterprise business in 2014.
GBM appointed as first Apple authorised systems integrator
Gulf Business Machines (GBM) has been appointed as the first Apple Authorised Systems Integrator (AASI) in the UAE.
Getting a grip on cloud security
Cloud use continues to grow rapidly in the enterprise and has unquestionably become a part of mainstream IT – so much so that many organisations now claim to have a “cloud-first” strategy.

Canon opens showroom in Tunisia
Canon Central and North Africa (CCNA), a division of Canon Middle East, opened in Tunisia, the largest B2B and B2C showroom in the region in partnership with its local partner, Media Diffusion.

IBM announces ‘Watson for Cyber Security’
IBM Security has announced ‘Watson for Cyber Security,’ a new cloud-based version of the company’s cognitive technology trained on the language of security as part of a year-long research project.

The blind spot
Data at rest is data at risk, as the old saying goes. We take a look at different database strategies that can help organisations fight back against any cyber threats.

Building a secure DNS architecture for NFV
Dilip Pillaipakkamnatt, Vice President, Service Provider Business, Infoblox, discusses the need for an intelligent securIty approach when it comes to virtualised environments.

FireEye study reveals impact of a cyberattack on consumer loyalty
A recent study carried out by FireEye revealed that data breaches significantly dent consumer trust in major brands.

Infoblox, Fortinet to jointly host security seminar
Infoblox and Fortinet have announced that a security seminar entitled ‘Together We Protect’ at the Four Seasons Hotel in Riyadh, Saudi Arabia on 30th May, which the two companies will jointly host.

F5 introduces new software-based solutions
F5 Networks has introduced a new range of software-based solutions to enable its customers seamlessly integrate availability and security services, simplify device management, and better orchestrate IT infrastructure.