Magazine Button

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include PCs, laptops, smart phones, tablets and specialised equipment such as bar code...

How A10 Networks is positioning the channel for growth

The rise in a globally dispersed workforce and new work-from-home requirements are placing extraordinary pressure on organisations’ networks. At the same time, COVID-19 has accelerated Digital Transformation across many industries, with a shift towards hybrid and multi-cloud to service both...

IBM Security report: Pandemic digital habits causing security risks for businesses

IBM Security has announced the results of a global survey examining consumers’ digital behaviours during the pandemic, as well as their long-term impact on cybersecurity. With society becoming increasingly accustomed to digital-first interactions, the study found that preferences for...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network...

How A10 Networks is positioning the channel for growth

The rise in a globally dispersed workforce and new work-from-home requirements are placing extraordinary pressure on organisations’ networks. At the same time, COVID-19 has...

Kodak Alaris achieves EPEAT Gold ecolabel for energy efficient scanners

As part of its on-going commitment to be environmentally responsible, Kodak Alaris has added 12 document scanners to the Electronic Product Environmental Assessment Tool (EPEAT), the...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network...

How A10 Networks is positioning the channel for growth

The rise in a globally dispersed workforce and new work-from-home requirements are placing extraordinary pressure on organisations’ networks. At the same time, COVID-19 has...

Kodak Alaris achieves EPEAT Gold ecolabel for energy efficient scanners

As part of its on-going commitment to be environmentally responsible, Kodak Alaris has added 12 document scanners to the Electronic Product Environmental Assessment Tool (EPEAT), the...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network...

How A10 Networks is positioning the channel for growth

The rise in a globally dispersed workforce and new work-from-home requirements are placing extraordinary pressure on organisations’ networks. At the same time, COVID-19 has...

Nokia and NetNordic to deliver 5G-ready private LTE network to Equinor

Telco kit vendor Nokia, has announced it has collaborated with systems integrator, NetNordic, to enter into a frame agreement with Equinor, one of the world’s leading producers of...

Deep Dive: Terry Greer-King, VP EMEA, SonicWall

In this edition of our Deep Dive series, Terry Greer-King, VP EMEA, SonicWall, highlights SonicWall’s ‘Boundless Security’ and how it uses...

Awards Advert

CBT partners with Taeknizon to boost digitalisation in UAE

Cloud Box Technologies (CBT), an IT Infrastructure solutions provider in the Middle East, has announced a strategic partnership agreement with...

How Huawei’s new FusionPower2.0 UPS addresses power density and heat dissipation

Organisations across the Middle East are increasingly looking to technology such as AI and IoT to optimise processes as they digitalise. This means...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before...

How Ingram Micro is innovating to empower channel partners

Ingram Micro helps businesses fully realise the promise of technology – helping them maximise the value of the technology that they make,...

Kissflow launches cloud-based procure-to-pay platform in UAE

With FinTech being key to enhancing the operational efficiencies for UAE businesses, Kissflow has launched its Procurement Automation Management...

Browse our latest issue

Magazine Cover

View Magazine Archive