Device advice

Mobile is the new endpoint in IT. Getting the job done using mobile devices as you move around has brought in its wake many benefits and improved productivity to organisations in the Middle East. Here is how to protect mobile devices and data.

Security made simple

Harish Chib, VP-MEA, Sophos, tells us why synchronised security, which enables endpoints and network security components to directly share information, will revolutionise threat detection.

Evolving rules of security

Harish Chib, Vice President Middle East and Africa, Sophos, shares insights on the way channel business in network and IT security is set to develop in the era of third platform technologies.

Bulwark reinforces security portfolio at GISEC

The company, represented by its team of local experts and key vendors, showcased an integrated range of security solutions and services for the IT Security industry including details of its track record of successful ventures across the Middle East region.

Combatting cyber threats

Regional organisations need to have robust cybersecurity solutions in place to be prepared to face threats that are increasingly growing according to recent reports. Reseller ME investigates how channel partners can maximise opportunities present here.

Bring your own decision

As mobility becomes essential in business operations, enterprises need to decide how to handle their employee base when it comes to device usage in the workplace. Be it employer-provided devices or BYOD, enterprise mobility plans need to be both robust and adaptive.

Lessons learned

2014 has already gone down in history as the year of the data breach. As we move into the new year, what have we learned from our past that will aid us in the futures.

Future fears

The threat intelligence market, and the world of IT security more generally, may be the fastest growing and changing aspects of the technology industry. The gap between those in the know and those still desperately trying to catch up in terms of security know-how is growing ever wider.

Hacker headspace

With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.

A safe bet

The OS wars are nothing new. Every user has a laundry list of reasons why their operating system is king. One of the key points in determining which OS reigns supreme is security. CNME investigates the security successes and pitfalls of the most commonly used operating systems.

Staying ahead of the game

Channel players say a holistic perspective is lacking when it comes to deploying BYOD solutions in the region. Reseller ME discusses how partners can make the most in this space.

Virtual lock down

Virtualisation has made the data centre a more flexible and agile place. However, the trade-off in this software-defined shift is a measure of complexity when it comes to protecting our data. Enterprises must reconsider their protection strategy to reflect the new, virtualised world.

The death of Internet privacy

In the age of constant connection, internet users are sharing more and more sensitive information online. As hackers become more organised and the amount of data stored in the cloud increases, the potential for leaks of sensitive data becomes magnified.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines