February 20, 2020
3 ways to avoid getting phone hacked
Mobile phones are becoming a fruitful and surprisingly easy target for hackers. It used to be that businesses issued their executives work phones that used only business applications. But today, our phones are just as likely to hold intellectual property memos as they are to be used for listening to music.
February 19, 2020
Trend Micro launches Channel Partner Program in AMEA
Underpinning the program are several key initiatives designed to help channel partners generate more margins, capture new revenue streams, and drive tighter alignment with Trend Micro in the field by taking a customer-centric approach.
February 17, 2020
Orange Egypt builds horizontal cloud on Red Hat Technologies
Orange Egypt wanted to use the latest in hybrid cloud and network functions virtualization (NFV) innovation to be able to respond in real-time to market dynamics and network conditions to best serve its customers. As part of this initiative, Orange Egypt looked to virtualize its mobile packet core, which had been running standalone functions on dedicated appliances.
February 12, 2020
Extreme Networks investments increase in the Middle East
Extreme Networks is also placing emphasis on strengthening relationships with its regional distributors and engaging new channel partners. As a channel-centric organization, Extreme is committed to providing both VAR and MSP end-users in the META region with cloud-based, end-to-end networking solutions that meet their needs—and those of their customers.
February 10, 2020
Gartner CIO survey identifies key challenges for governments
Governments are struggling in many areas, following disruptions including changes in leadership, reorganizations and funding shortfalls. For many government CIOs, disruption will affect their IT budget growth, and the funding and launch of new business initiatives will suffer,” said Alia Mendonsa, senior research director at Gartner.
February 5, 2020
Threat actors pivot toward more targeted attacks, SonicWall
Cybercriminals are honing their ability to design, author and deploy stealth-like attacks with increasing precision while growing their capabilities to evade detection by sandbox technology,” said SonicWall President and CEO Bill Conner.
February 4, 2020
Shadow IoT devices a threat for Corporate Networks, Infoblox
Shadow IT devices are defined as IoT devices or sensors in active use within an organisation without IT’s knowledge. Shadow IoT devices can be any number of connected technologies including laptops, mobile phones, tablets, fitness trackers or smart home gadgets like voice assistants that are managed outside of the IT department.