Canon launches UV cheque scanner

With this new device, retailers, banks and financial institutions can identify fraudulent documents and ensure payments are processed with greater security.

Cyber-crime will not stop for Christmas

Threats lurk within networks, endpoints or devices, often hidden in poorly configured settings or permissions, ineffective data governance, access management and usage policies. These unseen threats come from all perimeters of the organisation and major trends such as BYOD, big data, cloud, and mobile apps have increased the challenge faced by IT leaders.

Dell jumps into enterprise mobility management

Dell Software yesterday introduced a suite of software and services for enterprise mobility management, including a ‘secure workspace’ for mobile devices that lets enterprise IT managers separate work from data apps.

Through the looking glass

And it was all going so well. As vendors began to build more comprehensive cloud-based product roadmaps, Middle Eastern users were beginning to see just how cloud services can streamline their businesses. According to a Gartner report from earlier in the year, cloud adoption was due to grow monumentally in the region up to 2016. This was largely due to issues surrounding security and compliance being ironed out.

How to simplify your infrastructure

It’s a cold, hard fact that enterprises are putting more strain on their networks now than ever before. On top of this, never before has the risk of downtime been more pertinent―businesses simply can’t afford for their networks to be down, even momentarily, meaning the pressure is on CIOs to ensure that all services are up-and-running all of the time.

Arbor: average Middle East attack is 2.376Gbps

Arbor Networks’ 2013 research of DDoS activity in the Middle East has revealed that the average size of attacks in the region is 2.376Gbps and the average duration of an attack exceeds an hour and ten minutes.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines