Under siege

CNME’s Enterprise Security 360 Roadshow, which covers Riyadh, Doha and Dubai, returned for its 2015 edition. We bring you the highlights of the security conference.

IFS Applications 9 launched

IFS has recently launched the IFS Applications 9, the new core version of its extended enterprise applications suite. IFS Applications 9 delivers customers true business agility by bringing them closer to their business and by providing them with the flexibility to capitalise on change.

CSFi partners with CNS

US Based CSF International (CSFi) has recently signed a new Master Value Added Reseller (MVAR) agreement with CNS (Computer Network Systems).

Huawei is offering a new trade-in programme for Saudi retailers

Huawei launches OS for IoT

As Huawei Technologies target smart homes, cars, wearables and more with its own operating system – Liteos. The Chinese tech company recently launched the OS to help third-party vendors break into the emerging Internet of Things space.

Brocade VDX 6740 switch

The Brocade VDX 6740 switch is an Ethernet Fabric Top of Rack (ToR) switch that is anticipated to redefine network visibility and agility with automation and simplicity for IP storage.

F5 launches cloud-based WAF service in EMEA

During F5 EMEA’s Agility 2015 conference in Edinburgh, F5 Networks has launched a new cloud-delivered managed service in EMEA to defend against web application attacks and ensure compliance across dynamic cloud and data centre environments.

Transforming together

Technology giant Huawei recently hosted its Middle East Channel Partner Summit at Atlantis, The Palm Dubai, bringing together an esteemed selection of channel partners and industry players to hear about how the company is redefining its regional Enterprise Business group channel strategy.

The spectrum conundrum

The rapid growth in mobile broadband means operators need access to a sufficient amount of spectrum and the right bandwidth to achieve the required quality of service.

Strength in numbers

It can be painful for an organisation to admit that their systems have been breached by a cyber-criminal. However, as cyber-attacks become more aggressive, it is essential that data on cyber-criminality is shared and analysed. It may be that sharing this data, even among competitors, will be the key to protecting our most sensitive information.

Ease of endpoints

As the oldest and of the most trusted banks in Saudi Arabia, there’s a lot riding on National Commercial Bank’s …

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines