Find

March 3, 2020

Evolution of Mobile Networks in the Era of 5G

Wireless carriers have invested billions into their networks to support the ongoing demand for faster network speeds. They must look for ways to increase revenue while delivering more value to the end user.
by | 3 min read
February 27, 2020

NTT Ltd. and Palo Alto Networks expand strategic partnership

The new offering will bring together NTT Ltd.’s ‘Secure by Design’ services with Palo Alto Networks Prisma™ Access and Cortex™ XSOAR technologies and focus on intelligent workplace, intelligent infrastructure, and intelligent cybersecurity.
by | 3 min read
February 25, 2020

Palo Alto Networks redefines security orchestration

Palo Alto Networks is redefining the security orchestration, automation and response category by making threat intelligence management a core component. By tightly integrating threat intelligence management with SOAR capabilities — such as unified case management, automation and real-time collaboration — customers are now able to fully operationalize threat feeds.
by | 2 min read
February 17, 2020

A10 Networks Delivers Virtual DDoS Defense Solution

The enhanced vThunder TPS provides 100 Gbps throughput in a single virtual appliance and can be expanded to 800 Gbps with eight-way clustering. As a result, service providers can build elastic DDoS defenses that can be incrementally scaled during wartime when peak capacity is required.
by | 2 min read
February 12, 2020

Extreme Networks investments increase in the Middle East

Extreme Networks is also placing emphasis on strengthening relationships with its regional distributors and engaging new channel partners. As a channel-centric organization, Extreme is committed to providing both VAR and MSP end-users in the META region with cloud-based, end-to-end networking solutions that meet their needs—and those of their customers.
by | 3 min read
February 6, 2020

SD-WAN needs to integrate network and security functionality

SD-WAN connections require end-to-end security that goes beyond simply encrypting data. Communications between a branch office and a cloud-based application require data inspection at both ends of the connection.
by | 3 min read
February 4, 2020

Shadow IoT devices a threat for Corporate Networks, Infoblox

Shadow IT devices are defined as IoT devices or sensors in active use within an organisation without IT’s knowledge. Shadow IoT devices can be any number of connected technologies including laptops, mobile phones, tablets, fitness trackers or smart home gadgets like voice assistants that are managed outside of the IT department.
by | 3 min read
January 27, 2020

Network Security must keep up with VSS

The Middle East is one of the fastest-growing markets for video surveillance systems. Research firm MarketsandMarkets reports that a big driver for the increasing use of video surveillance systems globally is in large part due to the increasing concerns for public safety and security, prompting deployment at airports, malls, schools, office buildings, public places and so on.
by | 2 min read
January 22, 2020

du’s 5G network strengthens UAE-China bilateral relations

5G takes-off’ While 5G rollout has the potential to elevate consumers’ connected lifestyles, the live stream use case illustrated the possibilities 5G can bring to various industry verticals as more large-scale events come to Dubai and the UAE.
by | 2 min read
November 5, 2024

Whizpay Launches ‘Whizmo’ App to Transform Financial Services in the UAE

Whizpay Technology LLC, a mobile financial solution provider based in […]
by News Desk | 2 min read