Carrier Ethernet is projected to broaden its penetration in telecom networks as the ubiquitous technology for broadband access, cloud interconnect and wide area medium.

Carrier Ethernet is projected to broaden its penetration in telecom networks as the ubiquitous technology for broadband access, cloud interconnect and wide area medium.
Sophos has launched Intercept X, an endpoint security product for zero-day malware, unknown exploit variants and stealth attacks, and includes an advanced anti-ransomware feature that can detect previously unknown ransomware within seconds.
Sophos has launched Intercept X, an endpoint security product for zero-day malware, unknown exploit variants and stealth attacks, and includes an advanced anti-ransomware feature that can detect previously unknown ransomware within seconds.
Sophos also plans to highlight its vision of ‘Synchronised Security’, showcase its extensive portfolio of endpoint, network and encryption security solutions, and hold product demonstrations.
Sophos has announced its participation in GITEX Technology Week 2016 where it plans to highlight its vision of ‘Synchronised Security’, showcase its extensive portfolio of endpoint, network and encryption security solutions, and hold product demonstrations.
According to a recent report from Kaspersky Lab, large businesses that struggle to attract sufficiently skilled IT security experts end up paying up to three times more to recover from a cybersecurity incident.
Focus Softnet has announced that it will be showcasing its next generation ERP-in-cloud product – Focus 8 Ready for Cloud at Gitex Technology Week 2016.
From the Dead Sea to the Dalai Lama, Suhayeb Jaabo has taken in a lot in his career. The Magnolia RM Investment Group Head of IT has developed a fresh outlook on business and life, through an impressive CV that has spanned several of the Middle East’s prime locations.
The Oracle Cloud: Opening up the Road to Industry 4.0 report has found that from robotics to artificial intelligence, businesses view the cloud as a blank canvas upon which to build their innovation strategies.
Intel Security, has released its McAfee Labs Threats Report: September 2016, which assesses the growing ransomware threat to the healthcare industry.
The annual Data Centre Build roadshow visited Riyadh, Dubai and Doha for the fourth year running last month. Reporting from Dubai, the event saw a host of IT-decision makers turn out to reflect on what the future holds for data centres.
Genetec has announced Mission Control, a Decision Support System (DSS) for situational intelligence, system visualisation, and incident management.
FireEye has recently held a conference for its partners in the Kingdom of Saudi Arabia, on the 24th of August at the Ritz-Carlton Riyadh.
A10 Networks has announced that it will showcase the its A10 Harmony solution architecture during its participation at GITEX Technology Week 2016.
Dell Technologies has announced completion of the acquisition of EMC Corporation, creating a unique family of businesses that provides the “essential infrastructure for organisations to build their digital future.”
Dell Technologies has announced completion of the acquisition of EMC Corporation, creating a unique family of businesses that provides the “essential infrastructure for organisations to build their digital future, transform IT and protect their most important asset information.
As ThreatQuotient’s first regional partner, Help AG has achieved the Gold Partner status under the vendor’s Threat Alliance Program (TAP) and will offer the ThreatQ threat intelligence platform.
Booz Allen Hamilton has highlighted the most significant threats to Industrial Control Systems (ICS) in 2016 and 2017 in a recent report titled Industrial Cybersecurity Threat Briefing.
CMCS has recently announced that it has entered into a reseller partnership with TimeXtender (TX), a provider of Data Warehouse Automation (DWA) software for Microsoft SQL Server.
In May this year, we posted results of our ‘network protection survey’, which looked – among other things – at best practices in companies that were highly successful at network security.