Palo Alto survey finds that cyberattackers vie for the easiest targets Palo Alto has published results of a survey sponsored by the company to explore the economics of cyberattacks. Titled “Flipping the
Through its office in DIFC, PCCI Group will provide outsourced operational delivery solutions, to customers in UAE and across the MEA and Europe PCCI Group has relocated its international headquarters to Central
NEC’s X754HBlarge format display delivers clear displays for bright areas including shop windows and digital out of home applications NEC Display Solutions Europe has expanded its portfolio of high brightness displays with
As new VP of Channel and Alliances in EMEA, Jean-Phillipe Barleaza to drive VMware’s cloud & business mobility solutions and drive profitability VMware has appointed Jean-Phillipe Barleaza as Vice President, Channel and
Reveals 2015 financial results; Company grows Q415 billings 35% and FY15 billings 37% year over year Fortinet has revealed the financial results for the fourth quarter and full year ended December 31,
Sage hosts a discussion for exploring emerging trends in disruptive technology; Data analytics, IoT take center stage Sage Middle East delved into the complex and exciting world of ubiquitous computing trends in
EMW and Aruba showcase the mobile-first, cloud-first approach for the evolving demand landscape EMW, a valued Aruba, a HP Enterprise company Gold partner, organized a conference entitled “How Tomorrow Moves” at the
Exchange Reporter Plus Sets Reporting Standard by Tracking Logon Failures on Outlook Web Access Security information and event management (SIEM) policies make it important to monitor logon attempts. When there are a
Experts agree that there is no easy solution to respond to cyber-attacks. Cyber-risk is a business risk that must be managed within an overall information and risk-management framework Cyber-attacks are becoming increasingly
Global study by Gemalto shows increasing security risks to payment data and lack of confidence in securing mobile payment methods A recent survey of more than 3,700 IT security practitioners from more