Brand

Blogs

Microsoft expert: Sales can surge in the digital age

The Arabian Gulf region is teeming with innovation. Government and private-sector initiatives are seizing the promise of the Fourth Industrial Revolution and, as a result, entire economies are taking significant forward leaps, says Karim Talhouk, Dynamics 365 Lead, Microsoft Gulf. Digital transformation – the power to engage customers, empower employees, optimise operations and revolutionise products […]


Digital transformation leads to the rise of the ‘Super CIO’

In the age of digital transformation, the first point of transformation must be the CIO. “Meet the ‘Super CIO’,” says Luc Serviant, Vice President, Middle East and Africa, Orange Business Services. We can all see it with our own eyes but now it’s official – the UAE is ready for change. KPMG’s 2017 Change Readiness […]


Streamlining data centre operations through commissioning

Article by: Gary Williams, Director of Commissioning at AESG Applications and data are the lifeblood of business today and modern data centres are expected to deliver near 100% availability while remaining highly efficient to meet cost and ‘green IT’ objectives. While enterprises in the Middle East invest heavily in designing their data centres and fitting […]


Ensuring ‘Availability’ for the energy sector in the Middle East

Countering Threats and Enabling Transformation in the Industry By Gregg Petersen, Regional Sales Vice President, MEA, Veeam Software Perhaps more than any other industry, oil and gas companies in the Middle East face overwhelming pressure to cut costs and increase operational efficiency. As natural resources prices remain low, incremental efficiency improvements can have a huge […]


Digital Shadows expert on the impact of the Equifax breach

By Rick Holland, VP Strategy at Digital Shadows What we know about the Equifax breach  A cybersecurity incident at Equifax has had the potential to impact 143 million U.S. consumers. To put this in context, at this time, this incident is almost seven times larger than the Office of Personnel Management breach of 2015. Equifax […]


Aruba expert on the six latest technology trends in Higher Education

Jose Vasco, Regional Director, MEMA at Aruba, a Hewlett Packard Enterprise company, says six trends have emerged in the field of higher education this year: IoT Spreads Institution-Wide – IoT is swiftly expanding beyond student devices. The onslaught ranges from connected lights, door locks and sprinkler systems to laboratory sensors, classroom instruction and student laundry […]


Veeam announces Veeam Availability Suite for VMware Cloud on AWS

By Peter McKay, Co-CEO and President, Veeam Cloud adoption is soaring. According to IDC, worldwide spending on public cloud computing will increase from $67 billion in 2015 to $162 billion in 2020, attaining a 19% CAGR (Compound Annual Growth Rate) . The cloud is here to stay, and it’s only going to become more important. As […]


Mimecast expert: New email exploit ROPEMAKER threatens security

A new email exploit called ROPEMAKER can result in a malicious actor changing the content of an email already in your in-box says Matthew Gardiner, Senior Product Marketing Manager, Mimecast. Most people live under the assumption that email is immutable once delivered, like a physical letter.  But a new email exploit, dubbed ROPEMAKER by Mimecast’s […]


Ciena expert: Autonomous networks of the future are set to be ‘self driving’

Easier to run and more responsive to customer needs the network of the future is coming, Ravi Mali, of Ciena, tells us. Communications service providers (CSPs) share a near universal goal: to drive down network costs and increase profitability. This goal boils down to three basic elements: reducing capital and operating expenditures, while improving the […]


82% of ITSM professionals believe future IT roles will become more challenging

ManageEngine, the real-time IT management company who will be exhibiting at GITEX 2017, has announced the results of its ‘IT Service Management Future Readiness’ survey. The survey, which was conducted in collaboration with ITSM.tools, consisted of ten questions that focused on the opportunities and challenges ITSM will see in the future. It was presented to […]


Cybercrime finds a way, the limited impact of AlphaBay and Hansa’s demise

Rick Holland, VP Strategy at Digital Shadows, says: “Our analysis of the broader cybercriminal ecosystem suggests that the impact of the AlphaBay and Hansa closures will be somewhat short-lived.” By Rick Holland, VP Strategy at Digital Shadows The law enforcement operations that took down the AlphaBay and Hansa marketplaces were meant to strike a sizable […]


Digital Guardian: Data classification should drive security strategy

If you haven’t identified what data is sensitive to your business, where it resides and how it’s being used, how can you hope to protect it? Thomas Fischer, Threat Researcher and Global Security Advocate at Digital Guardian, discusses why getting to grips with data should be the first step in any effective security strategy. There […]


Inflobox: Why we should let our walls down when it comes to cybersecurity

By Ashish Gupta, Executive Vice President and Chief Marketing Officer at Infoblox which operates in the Middle East and Africa With digital threats growing more rampant across the world, the idea of building ‘walls’ for cyber defence and protection can seem appealing. But even in this age of hackers relentlessly penetrating our networks, in the […]


Could Dubai be the next Silicon Valley?

Could we see a Silicon Valley-like culture emerge in the Middle East enabled by technology? Luc Serviant, of Orange, a partner in the Dubai Smart City Accelerator programme, certainly thinks so. He argues that Dubai stands to become a model of how businesses (large and small) will thrive in the 21st century. The UAE is […]


Comment: Data lakes define the future of healthcare

By Roberta Katz, Director, Dell EMC Global Solutions, Healthcare – Life-Sciences We are all part of the ‘Information Generation’ a growing community of digital citizens that puts the world’s information at our fingertips. As both patients and consumers of healthcare information, our expectations for preventative care and wellness, diagnosis speed and treatment, and disease management […]


Optimised management helps deliver more reliable container operation

By Andreas Neeb, Chief Architect Financial Services Vertical at Red Hat In just a short space of time, container technologies have carved out a place in enterprises in the development and operation first and foremost of new applications. An important factor in increasing their prevalence is high-performance management, enabling containers to be used efficiently and […]


After the disappearance of Alphabay: What will happen next?

By Rick Holland, VP Strategy at Digital Shadows The AlphaBay dark web marketplace has been inaccessible since July 5. With no substantive explanation from the site’s owners, users have speculated that either an exit scam (where administrators steal user cryptocurrency deposited to the marketplace and shut down the services) or law enforcement action has taken […]


Machine learning – taking your security team to the next level

By Raj Samani, Head of Strategic Intelligence, McAfee LLC Machine learning is all around us, enriching our online lives everyday. We see it with our own eyes when search engines accurately predict what we’re looking for after we type only a few letters. We feel it protecting our bank accounts, evaluating credit card transactions for […]


Death to passwords: identity management in the modern age

By Deepak Narain, Regional Presales Manager – MENA, VMware, one of the world’s leading enablers of digital transformation. Who are you? And can you prove it? These are the two questions your technology asks you every morning. And we now have a variety of ways to answer them: from typing complex, though hopefully memorable, passwords, […]


Securing IoT: know your network, protect your network

Article by Jose Vasco, Regional Director, MEMA at Aruba, a Hewlett Packard Enterprise company. Do you think about the need to secure IoT? It could be a patient monitor, a security camera or a lighting system; every connection to the network is a potential route for attackers. This is quite a new concept to many, […]