Cisco has launched Next-Generation Firewall (NGFW) with FirePower Services in the Middle East today. Cisco ASA 5500 Series firewall integrates application control, Next-Generation IPS (NGIPS) with Advanced Malware Protection (AMP) to assess threats, …
Etisalat will today deliver two keynotes on the importance of a “holistic risk management approach” at day two of Gartner’s Security and Risk Management Summit at the Raffles Hotel in Dubai. Kamran Ahsan, …
Following five decades of worldwide success including over 15 years of steady year-on-year growth in the Middle East, Swiss structured cabling specialist, R&M is set to celebrate its 50th year anniversary by making a strong impact at the upcoming GITEX Technology Week, taking place from the 12th to the 16th of October, 2014.
Intel has designed its latest server chips to provide the building blocks to modernise “legacy data centres” by providing more processing cores, throughput and power-saving features.
With Lenovo expected to close its IBM x86 server business acquisition by year end, a glimpse at the combined server product line has emerged.
Big Data can be extremely useful, or equally as tedious. With the world generating more and more data, businesses need the tools to tame this beast.
In his first visit to an emerging market after taking over the reins at Juniper Networks, Shaygan Kheradpir sat down with us to talk about his vision for the company and strategy for the new era of IT.
Research has highlighted the increased danger of phishing scams from travel and banking websites as well as social media. Agari highlights the banks and industries that are most and least trustworthy.
In addition to dealing with cybercriminals and hacktivists, enterprise security managers must pay increasing attention to avoid becoming collateral to nation-state cyber-warfare. Do recent high profile attacks on the region indicate that Middle Eastern businesses are at greater risk of attack, and what damage can cyber warfare inflict?
Intel says it is producing a 3G modem, an essential component for Internet of Things (IoT) devices, smaller than anything else produced in the world.
Brian Kenyon, Chief Technology Strategist, McAfee, a part of Intel Security, follows a “define-freeze-fix” approach to eradicate malware, and is confident that his company is well positioned to deal with today’s ever-evolving threat landscape.
With cybercrime an ever-present danger, hackers around the world attack user data for financial and political gain. But they are not all bad. CNME takes a look at the mindset of hackers good and evil, and how they constantly ask questions of governments and top companies.
Advanced Micro Devices may be willing to make custom ARM server chips for customers, much like it made custom chips for the Xbox One and PlayStation 4 game consoles. The chip maker will …
Hoping to cover all its bases in the emerging Internet-of-Things market, Microsoft is proffering a helping hand to “makers,” DIYers, hardware hackers and other builders of things that may one day end up …
Businesses today are required to deal with technological advancements occurring at a pace never experienced before. What’s more, trends like the consumerisation of IT have lessened the CIO’s ability to regulate which technologies …
Moving virtual servers around a hybrid cloud environment isn’t hard, but managing the data is. That’s why NetApp wants to be “the enterprise data-management standard across the enterprise,” says CEO Tom Georgens.
Madbits, a year-old company that uses deep learning technology to assign relevant information to raw images, has sold itself to Twitter, according to the Madbits website. Over the past year, the New York based …
Palo Alto Networks has revealed that cyber criminals in Nigeria have evolved common malware campaigns to infiltrate businesses that have not previously been their primary targets. 419 Evolution, a new report released today …
The U.K. government has pushed through a new surveillance law to replace one a European Union court said interfered with fundamental privacy rights – but, say civil rights campaigners, the new law is worse than the one it replaces.
With the systems integrators market evolving, IT leaders have the opportunity to tailor their skills to specific verticals and areas of SI specialisation. Which verticals offer the best opportunities for growth and what types of projects will SIs have to specialise in?
Intensified competition coupled with declining voice ARPU is forcing telecom service providers to look around for new revenue streams that some of the new advanced technologies offer. However, it can be a daunting task for carriers who are saddled with legacy systems and manual internal processes.
Oracle is planning to release 115 security patches for vulnerabilities affecting a wide array of its products, including its flagship database, Java SE, Fusion Middleware and business applications.
More than 40 privacy, civil rights and religious groups have called on President Barack Obama’s administration to provide a “full public accounting” of long-time email surveillance of prominent Muslims living in the U.S., following a news report detailing the spying by the U.S. National Security Agency and FBI.
IBM will pour $3 billion into computing and chip materials research over the next five years, as it rethinks computer design and looks to a future that may not involve silicon chips.
A sophisticated Chinese hacker group that had been stealing information from U.S. policy experts on nearby Southeast Asia suddenly changed targets last month to focus on the Middle East – Iraq, in particular – security researchers CrowdStrike said Monday.
Intel, Samsung and Dell are among the founding members to have established the OIC, a new Internet of Things consortium to create standards so that billions of devices can connect to each other.
When Dubai Refreshments’ ERP systems needed refreshing, the company was faced with a choice. Either they could upgrade their current systems, or they could go on a search for a suite of modules the fit their every need. Not one to shy away from a challenge, Anas Taraben, CIO, investigated what it would take to quench the business’ thirst for innovation.
Three-day IT security conference GISEC 2014 gave the masses a chance to meet first class security vendors as well as listen to presentations from internationally renowned security professionals. CNME reports from day one of the show.
With a range of forecasts from research firms Gartner and IDC stating that MENA IT spending will increase in 2014, will CIOs find their budgets swelling, and if so, which areas are most in need of the spend? Who stands to benefit and what can the Middle East do to catch up with more developed regions?
Gartner has highlighted its top 10 technologies for information security and their implications for security organisations in 2014.
Microsoft has announced the availability of Surface Pro 3 for commercial customers in the United Arab Emirates.
Intel hopes to take hardware performance to the next level with its latest Xeon Phi supercomputing chip, which packs an array of new hardware technologies that could eventually find their way to laptops and desktops.
As companies adopt technologies such as cloud and virtualisation, the practice of planning for network capacity to meet the bandwidth and application performance needs must also change. Network capacity planning and management has long been considered the black magic of the IT industry. How does one predict the future? How can you prepare for the additional demand for resources while avoiding over-provisioning?
The U.S. National Security Agency has been allowed to continue to collect phone records in bulk of people in the country, while lawmakers consider new legislation that would block the agency from collecting the data.
Nest, the Internet-connected thermostat and smoke detector maker owned by Google, is acquiring home security system developer Dropcam as part of a push to connect a wider range of devices in people’s homes.
The server uses some new HP-patented techniques to keep water away from the hardware
Neil Menezes’ journey to becoming Group Director of Information Technology Operations at Jumeirah Group was a series of personal highlights, which saw an initial interest in computer games transform into a thirst for networking expertise.
CNME organised the second edition of its Big Data Symposium in Dubai last month, defining what you need to know to underscore the success of this exciting new technology in regional enterprises.
Seagate is set to pay $US450 million in cash for Avago’s Accelerated Solution Division, and has entered into a definitive asset purchase agreement under which it will acquire the division’s assets and Flash Components Division from Avago for $450 million in cash.
With information security taking centre stage in the wake of new threats, CNME’s Security Strategist 2014 conference, organised in association with aeCERT, brought together the leading security practitioners in the region to discuss trends, concerns and solutions.
On 8th April, IBM celebrated the 50th anniversary of System/360, its mainframe system which transformed the computing world. James Dartnell reports from the Mainframe50 conference in New York City where the infrastructure giant celebrated the milestone with the release of new cloud and Hadoop services.
A suspected Iranian hacker group seeded Facebook and LinkedIn with bogus profiles of women and created a fake online news organisation to get digitally closer to more than 2,000 people whom it wanted to spy on.
Apple and Samsung told a court in California that they had failed to reach a settlement in their patent dispute, suggesting that a deal akin to that between Google and Apple may not be on the cards anytime soon.
Google plans to spend $20-30 billion of its of its accumulated international profits to fund potential acquisitions of non-U.S. companies and technology rights.
Waste has been managed in the same way with the same technologies for decades. Amin Al Zarouni, Head of ICT, Bee’ah, and his team have taken the traditional idea of waste management and turned it on its head.
Few announcements summon as much attention as a brand new iPhone, and this year, for the second time in as many years, Apple gave us two models of its smartphone to pore over. I got my mitts on the newest mobile devices in the hands-on area after Tuesday’s event.
They say that good things come in small packages—diamond rings, the crown jewels, keys to an exotic villa. When it comes to the Samsung Galaxy Note 3, big is beautiful, writes James Dartnell.
The new A1-830 tablet ticks all of the right boxes for people interested in a functional tablet sporting the sub 8-inch form factor. The tablet sports a 7.9-in, 1024×768 resolution screen at a 4:3 screen ratio; ideal for web browsing and reading e-books.