Digital Transformation Checklist for Businesses in the Middle East

Author: Terri Hiskey, vice president, global product marketing for manufacturing at Epicor Software Corp. Recent findings from the MIT Centre for Business[1]show that companies which have embraced digital transformation are 26% more profitable than their average industry competitors and enjoy a 12% higher market valuation.However, digital transformation can be an incredibly complex process. With that in mind, here are five key steps companies in the Middle East need to take to prepare for a successful digital transformation journey. Align your business transformation strategy to your business goals A massive 96% of companiessee digital transformation as important or critical to their … Continue reading Digital Transformation Checklist for Businesses in the Middle East

Safer Healthcare IoT Infrastructure in 7 Steps

By: Gamal Emara, Country Manager, UAE at Aruba, a Hewlett Packard Enterprise company IoT devices may offer extraordinary benefits in healthcare. From improving patient outcomes, staff effectiveness and operational cost savings, it could also bring with them new security risks. Any type of connected device is a potential risk, even wireless lightbulbs, so it’s imperative that healthcare institutions do everything they can to stem the flow of malicious attackers. This calls for a multi-layered security approach to mitigate these threats. Step 1: Know your network, inside and out To secure the network that your IoT infrastructure connects into, it’s important … Continue reading Safer Healthcare IoT Infrastructure in 7 Steps

Not all cloud software is created equal

By John Maddison, Senior Vice President of products and solutions, Fortinet. An assumption made by many security professionals is that any performance differences between physical security devices are eliminated when those security software images are run on identical cloud hardware. But the truth is, there are still significant performance differences between solutions, and those differences can be critical both from a processing perspective as well as cost. Because cloud performance is a baseline requirement for competing in the digital marketplace, organizations cannot afford for security to be a bottleneck. Transactions need to be inspected at digital speeds. Of course, elastic … Continue reading Not all cloud software is created equal

Navigating the ‘Cloudy’ Sky

Author: Raj Samani, Chief Scientist at McAfee   Cloud services are nearly ubiquitous, with 97% of worldwide IT professionals surveyed using some type of cloud functions in their organization, up from 93% just one year ago, according to data from a recent McAfee study. Indeed, this cloud-first strategy has driven organizations to take on many different providers in their cloud ecosystem. As organizations tackle new data use initiatives, intelligence building, new capabilities to store and execute on applications—we have seen an explosion in the number of sanctioned cloud providers that businesses are reporting, each a source of potential risk and … Continue reading Navigating the ‘Cloudy’ Sky