Brocade: Virtualisation top EMEA trend

According to research conducted by Brocade,, virtualisation, has emerged as the top customer trend and network complexity and bandwidth provisioning are the top two customer pain points.

Monetising mobility

Matteo Masserini, Regional Sales Manager, Mobility, Middle East & Africa, Citrix, describes how Enterprise Mobility Management (EMM) solutions will move beyond the device.

Ericsson: 9 in 10 to have mobile phone by 2020

The latest edition of the Ericsson Mobility Report, an update on mobile trends leveraging Big Data from live networks worldwide, launches today and reveals that proliferation of mobile technology is continuing at a rapid pace.

Nutanix announces ME expansion

Web-scale converged infrastructure firm Nutanix has announced it is expanding its presence in the Middle East with investment in its local pre-sales and support teams.

Road to simplicity

As a prelude to CNME’s fifth annual ICT Achievement Awards, Dell partnered with CPI to host a roundtable discussion on Software-Defined Networking. Chief Information Officers from a range of verticals gathered to share their thoughts on the futuristic technology.

Sage strategy

With over a decade’s experience in the banking industry, Faizal Eledath knows that great results don’t come overnight. The National Bank of Oman Chief Information Officer has learned the value of comprehensively understanding a business and its employees before making rash decisions.

The pursuit of partners

Value-added distributor, Granteq is seeking channel partners in the enterprise segment as it introduces IT solutions for the healthcare and finance verticals in the region.

EMC: 88 percent of UAE values third platform

EMC has released the findings of a survey that asked I.T. decision makers in UAE for their perspective on I.T.’s role as an enabler of business change during the shift towards the megatrends of cloud, mobile, social and Big Data.

Expanding horizons

Taj ElKhayat, Managing Director, Middle East, Turkey, North, West, and Central Africa at Riverbed Technology, explains how to overcome challenges in location-independent computing.

Chink in the armour

IT security professionals have to find frailties in external security systems before cybercriminals – who can attack at an increasingly fast pace – seek to exploit them. With that in mind, it is paramount that security professionals are aware of common weak points.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines