John Maddison, senior vice president of products and solutions at Fortinet explains that while cloud will be cloud, but not every cloud is same hence selecting cloud based security software is of paramount importance. An assumption made by many security professionals is that any performance differences between physical security devices are eliminated when those security software images are run on identical cloud hardware. But the truth is, there are still significant performance differences between solutions, and those differences can be […]
While the benefits of migrating to the Cloud in terms of reducing operating costs and technology complexity have been well documented, redrawing an organization’s security policy in preparation is a more drawn out exercise, says Sachin Bhardwaj, Director Marketing & Business Development, eHosting DataFort.
Palo Alto Networks is all set to buy out U.S.-based cloud security firm Evident.io for a total purchase price of $300 million to be paid in cash. The co-founders of Evident.io, Tim Prendergast and Justin Lundy, will join Palo Alto Networks.
Channel Post speaks with Imtiaz Ghani, General Manager of Ethos Technologies about their focus on supporting and developing the partner community. Ghani also highlights the new technologies that the company is introducing to the regional market to facilitate partners and enable mutual growth.
Everything around us today is about digital, connectivity, cloud, social and finally claiming the centre-stage, security. Cyberthreats continue to affect enterprises and service providers while end-users remain prime targets of phishing, fraud, identity theft and ransomware. With multiple points of entry and a variety of vulnerabilities available to attackers, what remains to be answered is if organizations improve their security posture
Ashraf Sheet, Regional Director MEA at Infoblox discusses how security trends such as IoT security, cloud security, NGDC security for SDN & NFV, CBSA security (cloud-based services and applications), and so on are becoming key and what cyber security strategies one needs to adopt this year.
Cloud adoption in the region is presently at a nascent stage, but steadily on the rise. Organizations in the Middle East are rapidly adopting cloud strategies, which include deploying business applications on public, private, or hybrid clouds.
Mimecast’s ESRA report inspected the inbound email received for 62,323 email users over a cumulative 428 days. More than 45 million emails were inspected, all of which had passed through the incumbent email security system
CensorNet, the complete cloud security company, has announced that it has selected Credence Security, a subsidiary of Cognosec AB, and the region’s specialty distribution company, as its Value Added Distributor (VAD) for the Middle East, Africa, India and Pakistan regions.