Blogs

The next generation of cyber-security threats

I am sure most of us in the cyber-security community were happy to flip the calendar to 2016 for obvious reasons! Given what we witnessed in 2015, while cloud, mobile and IoT will continue to dominate the discussion...

Enterprises are going ‘MAD’ for mobile

Mobile phone user base in the Middle East and Africa (MEA) is second only to that in Asia-Pacific, with “just over 606 million people in this region having at least one mobile phone, and the total will pass 789 million i...

Can digital rejuvenate bricks-and-mortar retail?

In-store retailing has been under rising pressure from increased costs of doing business, as well as the growth of online shopping. Yet, bricks-and-mortar sales still accounts for the majority of retail spend,...

Towards a ‘Frictionless IT’

With the term Frictionless IT, we mean an enterprise IT that just works, reshaped after the experience offered by modern consumer-grade public cloud services, which business users are growing to expect. If we don’t s...

Advanced cyber attacks that hide in SSL traffic

From Target to Sony, and Anthem to Ashley Madison, no company is immune to the risk of cyber-attacks and the resulting loss of customer information. Network security solutions can reduce the risk of attack, but these ...

Choosing the right cloud for your enterprise

In the computer animated science fiction comedy “Cloudy with a chance of Meat Balls”, I see a parallel to the widespread dilemma that we face today – that of deciding the approach for the “Right Cloud Solution!”, writes Sanja...