With open arms

The benefits of open source are well known – software that is largely free of charge, constantly updated and prevents vendor lock-in. How trusting are Middle East organisations to open source when it comes to one of the most important parts of an IT strategy – the network?

Armed for the IoT revolution

Jack Waters, CTO, Level 3 Communications, discusses three network adjustments organisations should undertake for a smooth and secure transition towards …

ARM rebranded as Credence Security

ARM, the leading speciality distributor of cyber security and digital forensics solutions, announced yesterday that effective immediately, it will be rebranded as Credence Security.

A suit of armor

As various emerging technologies become popular in business environments, security is a prime concern for organisations. Reseller Middle East explores how partners can make the most of the opportunities present here.

Red Hat ARM Partner Early Access Programme expands

Launched in July 2014 with nine participants, the programme aims to deliver, via collaboration, a singular operating platform capable of supporting multiple partner-initiated system designs based on the 64-bit ARMv8-A architecture.

UK PM Cameron raises encryption alarm

Great Britain Prime Minister David Cameron has hinted that a future Conservative Government would challenge the developers of WhatsApp and SnapChat if they continue to use the sort of encryption that makes security service eavesdropping difficult.

Ingram Micro acquires majority interest in Armada

Ingram Micro has acquired a majority interest in Armada, the largest value-added technology distributor in Turkey with 2013 sales of over $280 million. Ingram Micro plans to make a mandatory tender offer for the remaining shares in accordance with Turkish capital markets regulations.

Chink in the armour

IT security professionals have to find frailties in external security systems before cybercriminals – who can attack at an increasingly fast pace – seek to exploit them. With that in mind, it is paramount that security professionals are aware of common weak points.

GET TAHAWULTECH.COM IN YOUR INBOX

The free newsletter covering the top industry headlines