IDG Reporter

Cyber-crime will not stop for Christmas

Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.

R&M: Middle East Telcos Require Foresight and Meticulous Planning to Protect FTTH Network Investments

High demand for superfast broadband and internet services by households across the region necessitates large scale rollout of FTTH networks. Field cabling or Outside Plant (OSP) cabling is now the biggest challenge in these deployments and the long term success of telecom operators will be decided by how they plan and deploy these networks today.

Dell jumps into enterprise mobility management

Dell Software yesterday introduced a suite of software and services for enterprise mobility management, including a ‘secure workspace’ for mobile devices that lets enterprise IT managers separate work from data apps.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines