Find

June 21, 2021

How the disposable nature of tech is putting your businesses data at risk

Many people are now working from home and opting to use a personal computer to get work done. This is making the challenge of controlling and managing your organisations data near impossible. With data now sprawling across company and personal devices, there is no control over it, especially when it is sold on to its next home.
by | 3 min read
June 9, 2021

An Edge Computing Breakup: Out with the Old, and In with the New

Edge computing is defined loosely as a model that brings computational, data storage and connectivity resources closer to the locations where they’re needed, saving bandwidth and accelerating response times. Edge technologies power millions of IoT applications in industrial, retail, healthcare and smart cities environments, and, prior to 2020, analysts expected an additional bump from virtual reality and 5G in the coming years.
by | 4 min read
May 17, 2021

How organizations can protect against pandemic sleeper threats

Work computers have played many roles during the pandemic – hosting everything from social gatherings to workouts, online learning sessions, home shopping and Netflix streams. Family members have borrowed Mom’s computer to play online games, and passwords have been passed around. Cyber diligence has taken on a lower priority than it should have.
by | 4 min read
May 6, 2021

Multi-Cloud requires impeccable digital hygiene

According to Veeam’s Data Protection Report 2021, 50% of CXOs in Saudi and 52% in UAE said that the need to maintain operations during the pandemic had held back their strategic digital transformation initiatives. It is only now that we will see a shift as businesses move beyond the crisis stage of their Covid-19 response.
by | 3 min read
April 21, 2021

Digital Transformation is All About Trust

While our instincts are indeed powerful attributes, they can sometimes let us down. In the real world, this might be believing one of our friends when the story they are telling us is really a joke or accidentally driving towards the office on a Sunday because our brains are on autopilot.
by | 4 min read
April 12, 2021

Modernising data protection can get DX back on track

The inability to modernise data protection is undermining the ability to execute on DX for a significant number of EMEA businesses. The Veeam Data Protection Report 2021 found that over a quarter (28%) of organisations in the Middle East have slowed or halted their DX initiatives in the past year.
by | 3 min read
March 22, 2021

CXO Research: Data protection challenges are limiting DX initiatives

Respondents stated that their data protection capabilities are unable to keep pace with the DX demands of their organization, posing a threat to business continuity, potentially leading to severe consequences for both business reputation and performance.
by | 6 min read
February 24, 2021

Nutanix extends ransomware protections to help secure IT environments

The Nutanix cloud platform now delivers anomaly detection based on machine learning and IP reputation services with the company’s security networking operations and monitoring solution, Flow Security Central, a feature with Nutanix Flow.
by | 3 min read
February 8, 2021

Three ways the Raspberry Pi is sparking a digital learning revolution

2020 was a unique year for education. Schools across Middle East have at various stages had to close or pivot to virtual learning. This has meant parents and guardians have been responsible for ensuring children get the learning opportunities they need. As one would expect, this makes every child’s ‘lockdown learning’ experience unique.
by | 4 min read
February 1, 2021

Every day is a new Data Protection Day

With the pandemic, remote and agile working practices are now steadily in place. And with this comes an ongoing data protection conundrum for organisations across all industries. CIOs are challenged by the fact that their organisation’s data is now everywhere. Whereas previously, the physical location of data has been mainly restricted
by | 2 min read