Future Technology Week will debut The Hive – billed by organisers Dubai World Trade Centre (DWTC) as the ‘Start-up showdown of the century’. The Hive will see the region’s leading young entrepreneurs
Veritas Technologies is supporting Google Cloud Platform with its NetBackup 7.7 and Backup Exec 15 solutions. Organizations can use the Google public cloud as a backup destination, run back up and perform
BigScreen Middle East launched Unified Talent Management platform across the Middle East. Unified Talent Management is a Management and Workflow Solution designed by BigScreen to cover all aspects of talent management from
Trend Micro has signed an agreement to acquire TippingPoint from Hewlett Packard Enterprise (HPE). Trend Micro TippingPoint includes the threat intelligence from Digital Vaccine Labs (DVLabs), as well as the power of
Malwarebytes will begin operations in the Middle East. The firm’s strategy in the Middle East will be strongly channel focused and it will announce distribution partners in the coming months. To coincide
Veeam software launched Direct Restore to Microsoft Azure which is pre-configured Azure appliance in the Microsoft Azure Marketplace that delivers cloud restore for Veeam Backup & Replication and Veeam Endpoint Backup. This
StarLink will be exhibiting at Gulf Information Security Expo & Conference (GISEC) 2016, along with some of its key vendors including Attivo Networks, Tripwire, Darktrace, Gemalto, MobileIron and Venafi. Mahmoud Nimer, General
ALE has introduced a new cloud managed network infrastructure service designed and delivered by its business partners. The new Alcatel-Lucent Network on Demand service enables businesses to enjoy the latest networking technology
Arabian Automobiles Company, exclusive dealer for Infiniti in Dubai and the Northern Emirates, is all set to launch its new Infiniti Virtual Showroom on Google Maps powered by Street View Technology, the
Cisco pulls up socks to participate in the Gulf Information Security Expo & Conference 2016. Cisco will showcase its strategy of ‘Threat–centric Security’, which includes threat detection, defense and secure remote access.