Skip to content

Cybersecurity

Mindware enhances cyber security

shutterstock_1182992302

Mindware, one of the leading Value Added Distributors (VADs) in the Middle East and Africa, has extensively strengthened its security capabilities and portfolio. This will enable its channel partners to address the growing cyber security needs of enterprises across the Middle East and Africa (MEA) region. Following the acquisition of Arrow ECS, Mindware inherited a…

Read More

Identiq named a Cool Vendor

shutterstock_302508602

Identiq, the world’s first Peer-to-Peer Identity Validation Network, have announced that it has been recognized in the Cool Vendors in Privacy, 2020 report published in March by Gartner, Inc. The report identifies Identiq as a Cool Vendor. It states, “As privacy laws evolve globally, the vendor landscape has developed with innovative solutions that help security…

Read More

Cybereason opens Middle East operation

shutterstock_599391605

Cybereason, creators of the leading Cyber Defense Platform, have announced it has launched operations in the Middle East to help enterprises future proof their networks from the ever-evolving threat landscape. The company provides complete visibility and actionable threat detection so security analysts can stop attacks before material damage happens. Cybereason’s Dubai-based operations will be overseen…

Read More

ESET named a top player in Radicati’s Market Quadrant for APT Protection

shutterstock_393458413

Global cyber security leader ESET has been recognized as a ‘Top Player’ in Radicati’s 2020 Market Quadrant APT Protection Report, covering the Advanced Persistent Threat (APT) Protection segment of the Security Market. This is the first time ESET has been recognized in this specific Radicati report, after placing as a ‘Top Player’ in previous Radicati…

Read More

AVEVA acquires production accounting capability

shutterstock_1468887170

AVEVA, a global leader in engineering and industrial software, have announced that it has acquired production accounting software from South Korean based company MESEnter to complete AVEVA’s value chain optimization solution. MESEnter’s software offering, previously branded MES ENTER ErrorSolver and now rebranded AVEVA Production Accounting, has been proven and tested by major producers in the…

Read More

Qualys Offers free remote endpoint protection solution

shutterstock_696335059

Qualys, Inc., a pioneer and leading provider of cloud-based security and compliance solutions, today announced a cloud-based remote endpoint protection solution at no charge to its customers for 60 days that allows IT and security teams to protect the computers of remote employees. To enable this free 60-day solution visit, www.qualys.com/remotepatching. It will initially be available…

Read More

Four steps to ensure business continuity when employees are working remotely

shutterstock_1667840362

To help businesses remain productive, support remote workers and protect against cyber-attacks, IT departments are focused on making sure that data remains available and protected 24/7/365. To ensure all systems stay running and accessible to employees working from home, without interruption and with the guarantee that sensitive business information remains protected, businesses must: Make data…

Read More

Further rise in Ransomware

shutterstock_640139455

Last year ransomware made a comeback, as worldwide mobile operators made aggressive strides in the transformation to 5G, and GDPR achieved its first full year of implementation. The industry saw some of the largest fines ever given for massive data breaches experienced by enterprises. As the spike in demand for ransomware-as-a-service tools in underground forums,…

Read More

Key Findings of A10 Networks’ Q4 2019 DDoS Weapons Report

shutterstock_1215128404

A DDoS attack can bring down almost any website or online service. The premise is simple: using an infected botnet to target and overwhelm vulnerable servers with massive traffic. Twenty years after its introduction, DDoS remains as effective as ever—and continues to grow in frequency, intensity, and sophistication. That makes DDoS defense a top cybersecurity…

Read More

A10 Networks helps service providers secure and protect DNS Traffic

shutterstock_1663406797

A10 Networks have announced the availability of its Domain Name System (DNS) over HTTPS (DoH) capability in the Thunder Convergent Firewall (CFW). This native capability enables service providers to offer DoH services to their subscribers. It helps organisations who run DNS infrastructure deliver higher DNS security by preventing interference and enabling user privacy protection through end-to-end…

Read More