Blogs

Improving network security

In May this year, we posted results of our ‘network protection survey’, which looked – among other things – at best practices in companies that were highly successful at network security. I will drill down into these best prac...

Making life easier with document capture solutions

C suites around the world are buzzing about digital transformation. But here’s the truth: A huge number of business processes still run on paper. More than three-quarters of global professionals are reliant on paper at w...

Maximising virtualisation investments

In technology, we often seem seduced into chasing the latest shiny object. Cloud! Containers! Orchestration! IoT! Big Data! These are all well and good and can not only deliver significant value but can enable new...

Surviving the century of data growth

Dramatic business digital transformation, the Internet of Things (IoT), and everyday digital activities are driving immense data growth worldwide. Research shows that by 2020, the world will generate 44,000 Exabytes...

This is your father’s storage industry, but not for long

Christian Putz, Director, Emerging Markets, Europe, Middle East & Africa at Pure Storage explains how, between the emergence of cloud and flash, none of the storage solutions designed for mechanical disk and the...

Reinforcing security by reducing privileged access

As I tour the world helping Active Directory administrators, security professionals, and auditors secure their Windows environment, I often get questions about privileged access, states Derek Melber, Technical...

Browse our latest issue

Intelligent CIO Middle East

View Magazine Archive