We took Samsung’s latest flagship device for a spin and found that it has everything an average user will desire for. From a well-crafted design to features such as a heart rate monitor and water resistant body.

Prudent policy
Recognising the need to reduce its reliance on paper-based processes, Kingdom of Saudi Arabia’s Wafa Insurance opted to deploy an enterprise content management solution to streamline its operations.

Samsung signs Gulf Islands Group as UAE distributor
Samsung has appointed Gulf Islands Group as the official distributor of its office automation services in the United Arab Emirates.

The shifting face of power
Harshul Joshi, Senior Vice President of Cyber Governance, Risk and Compliance, DarkMatter, gives his take on how cybersecurity is transforming cities, nations, and companies in a growing digital environment.
Device advice
Mobile is the new endpoint in IT. Getting the job done using mobile devices as you move around has brought in its wake many benefits and improved productivity to organisations in the Middle East. Here is how to protect mobile devices and data.

Palo Alto Networks firewall receives ‘recommended’ rating from NSS Labs
Palo Alto Networks has announced that its next-generation firewall has earned a ‘recommended’ rating by NSS Labs. According to the DCIPS Test Report, the PA-7050 appliance achieved a 100 percent effectiveness rating against all evasion techniques tested.

HID Global identifies top trends for secure identity
HID Global has released a mid-year update to its top 2016 security trends, based on customer insights into key market developments across enterprise, healthcare, banking and government markets.

Accenture releases ‘The state of cybersecurity and digital trust’ report
A recent study by Accenture and HfS, underscored that insider data theft and malware attacks top the list of the most significant concerns for enterprise security executives.

Veeam Availability Suite 9.5 to integrate Windows Server 2016
Veeam Software has announced that the new Veeam Availability Suite 9.5, available later this year, will fully integrate with Windows Server 2016 and Hyper-V technologies used in the data centre.

STC deploys Juniper Networks Contrail
Juniper Networks has announced that Saudi Telecom Company (STC) has deployed Juniper Networks Contrail Networking to create automated cloud services for its customers.

Review: Samsung Galaxy S7
We took Samsung’s latest flagship device for a spin and found that it has everything an average user will desire for. From a well-crafted design to features such as a heart rate monitor and water resistant body.

Define digital
How ‘digitalised’ are this region’s telecom services and will future demand be dictated by consumers or providers?

Allied forces
In most companies, individual departments or teams believe they hold the key to understanding customer needs more than other areas of the business. The reality is that different departments simply have a different view into customer expectations and none has an all-encompassing view.

The future of elder care
While not a panacea, new Smart Home technologies promise to enable the elderly population to function freely and safely in their homes.
A10 Networks signs distribution agreement with Shifra
A10 Networks has signed a distribution deal with Shifra, that will enable the distributor’s regional channel partners to offer the vendor’s technology solutions to enterprise customers across the Middle East.

Gartner names Fujitsu as ‘leader’ in data centre outsourcing
Fujitsu has announced that it was recognised as a leader in the Gartner Magic Quadrant for Data Centre Outsourcing (DCO) and Infrastructure Utility Services (IUS), Europe for the fourth year in a row.

Qualys supports new Cisco Threat-Centric NAC
Cisco has announced its new Rapid Threat Containment offering, which integrates Qualys solutions to enable ISE to retrieve Common Vulnerability Scoring System (CVSS) classifications from Qualys VM.

How to perform a risk assessment
Defending risks without knowing what those risks are is like playing a round of paintball with your eyes closed — you’ll keep missing your opponent. A risk assessment gives the enterprise a specific, more finely narrowed field of targets for which to aim.
Arrow Electronics offers new solutions from NetScout Systems
Arrow Electronics has introduced a new range of portable network analysis and troubleshooting tools in the Middle East, from NetScout …

Resilient networks
The growing complexities of the IT landscape and sophistication of cyber-attacks across the globe are compelling enterprises to adopt in-depth defence strategies to protect their systems and digital assets.