Marco Landi, Polycom President, EMEA, discusses how today’s workspace is evolving in terms of the adoption of unified communications and consumer solutions.

Marco Landi, Polycom President, EMEA, discusses how today’s workspace is evolving in terms of the adoption of unified communications and consumer solutions.
Veeam Software has announced a 24 percent year-on-year (YoY) growth in total bookings revenue for Q1 2016.
Reseller Middle East’s enterprise channel networking event, Reseller MEet, returns this April with more than 150 participants scheduled for one-to-one meetings.
Maan Al-Shakarchi, Networking Lead, Europe and AMEA, Avaya, discusses the recent breach experienced by the Bangladesh Central Bank and shares insights on the importance of having a good network security in place.
Maan Al-Shakarchi, Networking Lead, Europe and AMEA, Avaya, discusses the recent breach experienced by the Bangladesh Central Bank and shares insights on how similar situations could be avoided.
This is the age of the web. With technology advances in cloud, mobile and social, the paradigm shifts in information management have and are moving fast – to the web. Web-based capture will be a game-changer for growth and survival of organisations in the Middle East. The advantages are huge!
Redington Gulf has been appointed as Microsoft’s Tier-2 partner for the Cloud Solution Provider (CSP) Indirect programme for the South Gulf region covering the UAE, Qatar, Oman, Bahrain and Kuwait.
At its 2016 conference, Ellucian offered 8,500 attendees a look at the new technology platform it’s building to support campus modernisation and innovation.
Patching, backups, firewall configuration… when it comes to security, make sure you take care of your infrastructure before you invest in next-level tools.
Harish Chib, VP-MEA, Sophos, tells us why synchronised security, which enables endpoints and network security components to directly share information, will revolutionise threat detection.
There has been a dramatic increase in cyberattacks on critical infrastructure but regional organisations remain unprepared.
According to Symantec’s Internet Security Threat Report (ISTR), Volume 21, cybercriminals are now adopting corporate best practices and establishing professional businesses in order to increase the efficiency of their attacks against enterprises and consumers.
Information security audits are on the rise, as organisations look to not only bolster their security postures, but demonstrate their efforts to other parties such as regulators. We bring you some suggestions on how to conduct an effective security audit.
Cisco has announced that it will be conducting a university outreach programme in the UAE to help prepare the next generation workforce.
Hybrid cloud implementations are becoming standard for companies building next-generation cloud applications. Here are three key questions that need to be considered to be able to run and manage database operations that support both environments.
As IT systems become more complex, so do the quality of service demands from customers. People are now demanding better performance and speedier response times from enterprises. How can the second wave of virtualisation enhance a company’s business model?
Worldwide PC shipments totaled 64.8 million units in the first quarter of 2016, a 9.6 percent decline from the first quarter of 2015, according to preliminary results by Gartner, Inc.
BT has recently announced a contract with Panalpina to transform and manage its global communications infrastructure.
Your employees are undoubtedly bringing their own devices to work, whether or not you have a BYOD policy in place. Rhonda Chicone, Faculty Member, Kaplan School of Business and Information Technology, explains why you should start settling on a BYOD policy now.
Reseller ME examines the importance of systems integration in today’s business and how SIs can evolve to meet customer expectations.