The moving target

The advent of mobility and its infiltration on enterprise has birthed a whole new type of security risk, and as …

Clouded with uncertainty

The migration of enterprise applications to cloud infrastructure is becoming more and more of an inevitability. But whilst private cloud …

Under the microscope

You have a relationship with your partner that is working well for you now. However, how do you ensure that …

Next gen security

Firewalls are no longer what they used to be – and despite the fact they are low on the adoption …

A new era

With the advent of the BYOD phenomenon, the amount of threats businesses face have multiplied on an unprecedented scale. Ben …

What makes an ideal VAD

The value added distribution model is in vogue today. Some of the players are new, some are hybrid and some …

No entry

With the increasing pressure on compliance of IT goods to not reach into embargo countries we look at how channel …

Securing parameters

As our society mobilises and more individuals use smart devices to access corporate data, cyber criminals are developing more sophisticated …

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines