Blogs
Protecting your password: Create an unbreakable one
Every year, on the first Thursday in May, World Password Day is commemorated, a perfect setting in which Check Point ...Understanding and preventing the Log4j exploit and Botnets
Amr Alashaal, Regional Vice President – Middle East at A10 Networks writes that the Log4Shell vulnerability is a systemic problem ...Lighting up the future: Enrich new life and enable new opportunities with Intelligent Technologies
Anjian, President of Huawei Middle East Region Carrier Business Group writes on enabling new opportunities with intelligent technologies. In the ...5 SD-WAN trends in the Post-COVID era
Jacob Chacko, Regional Director – Middle East, Saudi & South Africa at Aruba, a Hewlett Packard Enterprise company, writes on ...Multi-access Edge Computing (MEC): Transforming the mobile ecosystem for service providers
Amr Alashaal, Regional Vice President – Middle East at A10 Networks writes on how Multi-access edge computing (MEC) is transforming ...Behind the buzzword: Four ways to assess your zero trust security posture
In this exclusive opinion piece, Hank Schless, Senior Manager – Security Solutions, Lookout has penned on how to assess zero ...Why CIEM will become an indispensable part of the region’s future technology environments
Michael Byrnes, director – solutions engineering, iMEA, BeyondTrust, writes on delving into the need for CIEM and the benefits of ...3 Key components to raising the bar on digital acceleration
Jonathan Nguyen-Duy, Vice President, Global Field CISO at Fortinet elaborates on the key components in digital acceleration. Anyone paying attention ...Cloud, security and containers should be key focus for the Channel
Kinda Baydoun, Manager of Channels & Distribution – Middle East, Veeam Software, writes on the key directions to focus for ...Choosing right VADs for your Business
Imran Ahmed, Head of Channel for Logitech Video Collaboration, Saudi Arabia shares his insights on how to align with the ...