Monday, Jul 28th

Last update11:28:39 AM GMT

You are here: Products & Services Technology


Epson’s new passbook printer significantly reduces noise levels and total cost of ownership

PLQ-22/22M provides savings for financial and government institutions

July 18, 2011
Epson answers the Middle East demand for a quiet, energy-efficient passbook printer by announcing the regional launch of PLQ-22/22M. Building on the success of the PLQ-20/20M, the PLQ-22/22M further reduces power consumption and noise levels to offer banks, post offices and government institutions a very quiet printer with a low total cost of ownership.

Customers and staff alike will appreciate the PLQ-22/22M’s unobtrusive noise levels, which are as low as 51dBA. It’s efficient, too – the print speed enhancer enables fast printing of bit image data under Windows® environments to help cut queues, while the high-accuracy MICR/MSRW head (M version) makes handling cheques and passbooks a smooth, trouble-free process.


Fifteen Omani University Students and Teachers Win With Fujitsu

Initiative that gives back to 15 lucky first year University students and teachers, and a chance to meet with Fujitsu, ITA, and Ministry of Education officials

Muscat, Oman, July 18, 2011 – Fujitsu Technology Solutions a global IT solutions infrastructure provider and Alkhalili Group a major distributor in Oman, and in the presence of the Information Technology Authority (ITA) Sultanate of Oman, Ministry of Commerce and Industries and the Ministry of Education Sultanate of Oman, today distributed awards to 15 lucky first year students and teachers who purchased Fujitsu Lifebooks under the National PC Initiative.

Fujitsu took part in ITA’s program to ensure that all local Omani first year University students and Teachers who joined the National PC Initiative (NPCI) received a brand new laptop. This initiative, supported by a Royal Grant, assists students by giving them a subsidization of the personal cost for select computers. Fujitsu in addition to Notebooks, had announced a lucky winner scheme. On July 16th fifteen winning names were drawn from a pool of Fujitsu laptop owning students. Ten of the winners will receive a brand new Blackberry Curve, while five students will take an (all inclusive) trip to Munich, Germany to tour the BMW factory and Fujitsu’s award winning state of the art factory. These amazing gifts will be given to the winning students at today’s award ceremony lunch hosted by Chandan Mehta, the Product Manager, Fujitsu, and Al Khalili Group, officials from ITA Oman, Ministry of Commerce and Industries and MOE Oman will be present.


Samsung Unveils New Multi-Function SCX Printer Range

SCX-4833FD/4833FR/5637FR provide fast and versatile solutions to improve office productivity

Dubai, United Arab Emirates, July 18, 2011 – Samsung Electronics Co, Ltd. a global leader in digital media and convergence technologies, today announced the new SCX range of printers designed to help large workgroups and small and medium businesses to increase productivity through a trouble-free printing experience.

The new product range unveiled includes the multi-functional printers SCX-4833FD, SCX-4833FR and SCX-5637FR. The new SCX series of printers are designed to provide optimum performance, productivity, ease-of-use, and efficiency.

“These latest additions to Samsung’s ever-expanding portfolio of printing solutions ensure that working environments of all sizes can benefit from Samsung’s commitment to excellence in printing,” said Mr. Mehdi Heidari, General Manager – IT Sales Group at Samsung Gulf Electronics. He continued, “The new SCX range of mono laser multi-function printers are designed to handle large volumes of documents in a simple and ease to operate way, whilst the Dual Core CPU guarantee that your printer will be at the cutting-edge of your office environment.”


Expert: ‘Middle East Organizations Should Look and Listen Before Leaping to the Cloud’

Besides the much discussed three big cloud computing concerns – outages, privacy and security, there are a few other issues equally important but less talked about. Steve Bailey from CommVault explains these risks and liabilities that organizations in the region should understand before rushing to embrace the cloud

Dubai, United Arab Emirates, 15 July 2011: Steady growth in the cloud services sector reflects the rapid pace at which companies are moving all or portions of their computing, applications and data storage requirements to this emerging destination. According to Gartner, the industry is poised for strong growth through 2014, when worldwide cloud services revenue is projected to reach $148.8 billion. More and more organizations across the Middle East are discovering the benefits of cloud computing and are looking to embrace the cloud.

Early adopters of cloud technologies have viewed the migration as a business imperative, despite the potential dark lining of service outages and exposure to security and privacy risks. It’s clear, however, that cloud service providers understand the initial hesitation that companies are experiencing in trusting crucial information assets to them and they continue to work diligently to assuage concerns with stringent Service Level Agreements (SLAs) addressing uptime, privacy and security.

Headline-grabbing stories about Intuit’s and Google’s recent prolonged service outages only reinforce that disruptions in the cloud can and will occur, which means that service quality and data availability will persist as front-and-center issues. While encryption remains the baseline for securing data when moving to the cloud, there are other questions that should be asked about how data is migrated and accounted for as well as additional risks that must be addressed before entering into a relationship with any cloud service provider.

Steve Bailey, Regional Operations Director, CommVault Systems says that there’s also a set of equally important issues starting to surface in conversations about cloud-related risks. While they may not be grabbing headlines yet, there are far-reaching ramifications, which necessitate ongoing discussions and concerns. Savvy IT leaders are beginning to understand they must look beyond the “big three”—outages, privacy and security—when weighing cloud computing risks. Now more than ever, careful evaluation and forming partnerships with other organizational stakeholders are essential for understanding and mitigating risks relating to records management, eDiscovery, jurisdictional issues and exit strategies.

Records Management: Data Retention & Destruction
One of the overarching benefits of moving information to the cloud is the opportunity to greatly simplify and streamline data management. To date, companies have focused on ensuring data integrity and availability, but haven’t spent much time considering the requirements of information retention and destruction.

This area requires collaboration between corporate IT and legal departments to understand and articulate specific data keeping and disposal needs, especially since the contracts of many cloud service providers are standard cookie-cutter agreements. Also, remember that cloud providers are in the business of collecting data, not purging it. The topic of data destruction often doesn’t come up, but it should.

Moving to the cloud is supposed to make data management easier, yet managing data retention in this new frontier can be more complicated and difficult than handling in-house. Cmpanies need to find out what their options are and how the provider deals with records management.

In some cases, such as dealing with a SaaS cloud service model, retention and destruction might be integrated into the offering. Many SaaS-based email providers include policies for deleting email after one year. In other cases, it’s possible to manage data retention through the organization’s backup software. Regardless of approach, the customer needs to play an active role in setting both data retention and destruction policies.

eDiscovery: Data Preservation, Collection and Production
Cloud computing also can make searching, accessing, collecting and preserving electronically stored information (ESI) more laborious, complicated and risk prone when compared to handling processes internally. In addressing this area, enterprise IT departments need to engage their legal counterparts for guidance and advice on how discovery in the cloud is different than storing boxes offsite at, say, Iron Mountain.

As with records management, the type of cloud service will impact the level of functionality. For example, if an organization is leveraging the cloud simply as a storage repository, the likelihood of being able to search the data is greatly reduced. If the organization is using a SaaS cloud service, however, there’s a greater chance of being able to perform searches and content indexing to support discovery demands. In evaluating these capabilities, it’s important to ask about the tools offered by the cloud provider. In some instances, the organization will be able to use a combination of internal and external tools to facilitate data search and identification.

Another important question entails understanding the authenticity and admissibility of cloud-based data. When data is moved to the cloud, for example, does ownership of the data change and are an organization’s rights to the “clouded data” any different than if it was stored locally? Also, how is data authenticity evaluated and monitored? It’s critical to maintain data in its original format, but sometimes moving to the cloud creates changes in metadata and file names. This can cause serious complications and companies should determine whether it’s possible to audit the data to demonstrate that it’s still available in its original format.

In the legal world, the ability to apply “legal holds” is essential to preserving data as part of an evidence management strategy. This process can become more complicated when dealing with cloud-based data and therefore requires additional due diligence before signing with a cloud service provider. Foremost, organizations need to understand if data must be restored to the customer site in order to place a legal hold or if it’s possible to apply the hold while the data still resides in the cloud. Above all, ensure that no action is taken by the cloud provider that could lead to spoliation, which would likely result in sanctions or other costly legal results.

eDiscovery issues in the cloud will continue to gain ground as the inability to produce data in the manner and timeframe required by a court during any litigation proceeding can yield dire consequences, including stiff fines, negative inferences and sanctions. The best way to avoid this slippery slope is to engage legal experts and stakeholders early in the process so any potential eDiscovery pitfalls can be pinpointed.

Jurisdictional Issues: Where Data Resides Counts
Jurisdiction is an often forgotten area that needs to be addressed on two levels. For starters, companies must ensure that their cloud service provider operates in accordance with whatever laws pertain to a particular location where data might be stored. Next, consider the nature of the data, especially if a U.S. cloud provider is retaining data or emails that belong to foreign nationals.

Cross-border issues extend beyond the owners of the data to the physical location of a cloud provider’s file servers. Since many providers house data in multiple data centers around the world, it’s prudent to find out the location of each center as privacy laws will differ.

Exit Strategies: Getting Data Back
Perhaps the most overlooked area is what happens when an organization wants to leave the cloud or migrate to a different service provider. There are countless scenarios for why a company should develop an exit strategy upfront.

To date, cloud service providers haven’t focused much in this area and it’s reasonable to expect they may be reluctant to address this topic, but it’s crucial to understand the process of returning data to the customer. In some cases, it may be possible to move data from Vendor A to Vendor B directly. In both cases, there are cost and timeframe considerations as well as potential risks that require attention and legal advice.

It’s advisable to avoid boilerplate contracts that don’t permit customization or modification. Organizations should exercise caution before moving mission-critical data to the cloud as they too can be impacted severely.

Dig Deep in Mitigating Cloud-Related Risks
Because of potential reputation-damaging publicity, expect service providers to focus first and foremost on minimizing widespread service outages while adopting policies and procedures for reducing privacy and security risks. What’s less likely to grab headlines are the isolated instances when a cloud customer can’t retrieve its data and is forced to deal with a sanction that costs hundreds of thousands of dollars.

For that reason and all the others described here, it’s imperative for IT organizations to begin vetting the less-publicized yet equally impactful risks posed by moving data to the cloud.  In the meantime, both large and small enterprises share responsibility for making sure all areas of concern are addressed to ensure a move to the cloud increases business benefits, not liabilities.

Since everyone knows that the best defense is a strong offense, companies seeking to reduce their cloud-related risks need to look and listen to legal before they leap. Bringing an organization’s IT and legal forces together for a meeting of the minds is a good first step.


Negotiating Service Level Agreements
Establishing Service Level Agreements (SLAs) should be a critical part of any negotiations with a cloud service provider. Establish clear rules regarding the following for your data in the cloud:

    Ownership
    Physical location
    Degree of acceptable co-mingling
    Retention
    Destruction
    Access
    Recovery time
    Liability.

Do not leave anything to be discussed later. The best time to negotiate is during the “courtship.”


Photo Caption: Steve Bailey, Regional Operations Director, CommVault Systems


Ultra Bright NOVA Display And Natural Colors Enhance Web Browsing Experience

Beirut, July14, 2011 – The LG Optimus Black, the stylishly slim and lightweight Android smartphone equipped with the world’s brightest display, has made its UAE debut and is now available across the country.

Following successful unveilings at the Consumer Electronics Show and the Mobile World Congress, the LG Optimus Black has attracted pre-orders from 56 network carriers in 50 different countries. The phone launched globally across six continents beginning in Europe before heading to North America, Asia and now the Middle East.

“For smartphone users who appreciate both style and substance, the LG Optimus Black offers beauty, performance and mobility in one smart package,” said Mr. H.S. Paik, President of LG Electronics Gulf FZE. “LG Optimus Black is a significant addition to our global Optimus portfolio and we think it’ll prove to be one of our most popular phones.”

The LG Optimus Black comes equipped with the world’s brightest display at 700-nits¹, greatly enhancing visibility under direct sunlight and providing higher levels of true blacks and whites. With a 70% color gamut, the NOVA display also delivers more natural colors than other types of screens, including less vivid retina displays with a 53% color gamut and oversaturated AMOLED displays with a 107% color gamut. Overall, the NOVA display’s brightness and natural colors provide users with an enhanced experience when browsing the web, writing emails and reading documents. 

The highly efficient NOVA display also allows the LG Optimus Black’s large 4-inch screen to consume up to 50% less power indoors, compared to competitors’ 3.5 inch LCD displays.

Designed to improve comfort and grip for maximum hand-held convenience, the sleekly designed LG Optimus Black is the world’s slimmest 9.2mm smartphone, measuring 6mm at its thinnest point and weighing only 109g. Encased in the slim design is the world’s first 2MP front-facing camera, which combined with the brightest display, delivers an even more colorful video calling experience.

For more information and product images, please visit

Key Specifications:
    4-inch NOVA Display (700 nits  brightness)
    Dimensions:122 x 64 x 9.2mm
    Weight: 109g
    1GHz processor (Texas Instruments OMAP3)
    Wi-Fi Direct™
    Android 2.2 (Froyo). Upgradable to 2.3 (Gingerbread)
    5MP Rear Camera / 2MP Front Facing Camera
    Gesture UI powered by Gyro-sensor
    2GB Internal Memory and Micro SD up to 32GB
    1,500 mAh Battery

Nit: a unit of luminance equal to 1 candela per square meter (cd/m2)


70 per cent of technology executives read print media for technology news monthly, although online news most popular, reveals survey

Eurocom Worldwide Technology Market Survey shows 48% read print industry journals at least every week; smartphones widely used to access online news

July 14, 2011


The latest annual technology market survey conducted by Eurocom Worldwide, the global PR network, has revealed that 70 per cent of executives in technology businesses read print journals at least once a month, and nearly half (48 per cent) read print journals at least once a week. And national newspapers continue to be an important source for technology industry news.


The survey, conducted in association with Orient Planet, the Middle East representative of Eurocom Worldwide, shows that the most widely used source of technology industry news is online media cited by three quarters (76 per cent) of respondents. The next most widely used sources are industry print journals (42 per cent) and national newspapers (38 per cent).


The survey, which measured sentiments and media usage among 664 senior executives in technology based businesses around the world, including the GCC region, found that a further 37 per cent use search tools to access technology industry news.


“These findings show that there continues to be an appetite for specialist media, not only online but also in print format. While many print media may be experiencing competitive pressure from online news sources, whether magazines or newspapers, they still appear able to attract the readers,” commented Nidal Abou Zaki, Managing Director, Orient Planet.


The Eurocom Worldwide survey also found that 26 per cent of executives in technology businesses use blogs as a source of news and 30 per cent use various social media formats


Perhaps even more significant is the means by which news sources are accessed. The majority of respondents to the survey (87 per cent) access online news through a laptop PC but more interestingly 54 per cent of respondents now use smartphones, and 16 per cent use a tablet such as an iPad to source news.


“It is important for publishers and companies with ambitions in content provision to embrace such a variety of user devices. The content published needs to be flexible to adapt to different formats, and tailored to the needs of the users. In several of our member agencies it has become an important service area to supply clients with managed news streams and regularly updated content. These findings support the need for this type of service,” said Mads Christensen, network director of Eurocom Worldwide.


The Eurocom Worldwide Technology Market Survey 2011 was conducted by the network and its member agencies during January and February 2011, and surveyed 664 senior level executives in technology based businesses across more than 30 countries worldwide.

Fortinet Secures Endpoints by Extending Unified Threat Management Reach to Remote Devices

New FortiClient™ Solution Delivers All-Inclusive Software Providing ‘Secure Everywhere Access’ to Help Meet Regulatory and Compliance Requirements


July 14, 2011 - Fortinet® (NASDAQ: FTNT) - a leading network security provider and the worldwide leader of unified threat management (UTM) solutions – today announced the introduction of FortiClient, an endpoint software agent that enables organizations to deploy business practices requiring secure remote access connectivity for its distributed and mobile workforce, contractors and partners. As an all-inclusive remote access security solution, FortiClient optimizes an organization’s security posture, helps organizations meet regulatory and legal requirements and helps enforce corporate compliance policies to prevent unauthorized devices from accessing the corporate network.


FortiClient represents an important addition to the Fortinet product strategy, delivering a flexible, broad security solution spanning edge to core with centrally managed services.


The highly-modular design of the FortiClient solution combines essential data encryption, authentication, endpoint access control and WAN optimization functions in a single, easy to use, lightweight endpoint agent. For maximum deployment flexibility, security administrators can choose from multiple implementation methods to help secure the remote access privileges of different classes of users. This provides organizations with the freedom to leverage either the complete client suite of features, or choose specific functions based on individual remote access connectivity needs. For example, security administrators may want to implement IPsec traffic encryption for full-time employees and SSL encryption for contractors and partners.


Fortinet designed FortiClient for maximum deployment flexibility, and it allows third-party software to coexist on endpoint devices. Customers do not have to remove their current antimalware applications to deploy FortiClient.


Simplifying Endpoint Security


Working in conjunction with Fortinet’s FortiGate® consolidated security appliances, the FortiClient focuses on four key capabilities, all from a single agent, to support the differing remote access security needs of its customers:


• IPsec and SSL VPN for data encryption. A simple configuration wizard is provided to help create client-to-site VPN policies for remote access. SSL VPN tunnel mode and split tunneling provides the freedom to connect remotely using Web-based access


• Two-factor authentication for identity verification. FortiClient fully supports Local, RADIUS, LDAP, SecurID (via RADIUS Proxy), FortiToken, email and SMS-based authentication options


• Endpoint control helps prevent non-compliant devices from accessing the network, allowing organizations to enforce their security policies at the network edge


• WAN optimization reduces bandwidth consumption, accelerates network performance, decreases download time and improves the efficiency of HTTP, FTP, CIFS, MAPI and general TCP traffic


Fortinet is unique in consolidating this broad range of remote access security capabilities into a single software agent that offers customers unparalleled deployment options, on an as-needed basis for an all inclusive license. To match the functionality contained in FortiClient, competitive offerings require additional appliances, new licensing arrangements and/or new management consoles. And in some cases, competing vendors do not support specific endpoint security features offered by FortiClient.


“FortiClient is a vital piece of our end-to-end security strategy for enterprises and SMB customers.” said Michael Xie, founder, CTO and vice president of engineering at Fortinet. “By consolidating such a rich set of security capabilities into a simple to deploy software agent, customers big and small can now implement the right kind of remote access connection for the right kind of user within one security framework. As a result, best business practices requiring secure remote access can be easily and cost-effectively implemented which, in turn, can lower an organization’s total cost of ownership.”


Fortinet also announced the release of FortiManager 4.0MR3 and FortiAnalyzer 4.0MR3, an update to the operating system that provides improvements in usability and workflow management, as well as improved support for IPv6. FortiManager provides centralized policy-based provisioning, configuration and update management for FortiGate, FortiWiFi™ and FortiMail™ appliances. FortiAnalyzer provides advanced security management functions such as quarantined file archiving, event correlation, vulnerability assessments, traffic analysis and archiving of email, Web access, instant messaging and file transfer content.


Availability Details


The new FortiClient agent as well as FortiManager 4.0 MR3 and FortiAnalyzer 4.0 MR3 are available now.


About Fortinet (

Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2010 Fortune Global 100. Fortinet's flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise - from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world.

Redknee and Tech Mahindra Sign Global Partnership

Agreement creates leading Microsoft Go-To-Market partnership


July 14, 2011


Redknee(TSX:RKN), a leading provider of business-critical billing and charging software and solutions for communications service providers, has entered into a global partnership with Tech Mahindra (NSE:TECHM), a global systems integrator and business transformation consulting organization focused on the communications industry, to jointly deliver software and services to the communications service providers market. Redknee and Tech Mahindra announced the partnership at the Microsoft Worldwide Partner Conference 2011. This partnership brings to the market the strongest combination of Microsoft expertise to communication service providers pairing Redknee, the leading solutions provider to successfully integrate its real-time billing capabilities with Microsoft Dynamics CRM, and Tech Mahindra, the 2011 Microsoft Communications Sector Partner of the Year Award winner.


Larry Goldman, Head of Telecoms Software Research at Analysys Mason, commented:


“Communications service providers increasingly value fully integrated software solutions. This agreement provides a broad range of integrated billing, charging, customer care and OSS capabilities that deliver improved time to market and reduced cost."


Jim Dietrich, Managing Director, Worldwide Telecommunications at Microsoft commented: “We are excited by this announcement by Redknee and Tech Mahindra. As a matter of practice, we actively encourage Microsoft partners to collaborate to ensure the strongest depth of expertise and breadth of solutions are delivered to our customers. The reputation and capabilities of Redknee and Tech Mahindra in the Telecommunications industry make this agreement a shining example of how our partner ecosystem enables synergies and creates mutual value for our partners and our customers.”


Tech Mahindra will integrate Redknee's Turnkey Converged Billing and Customer Care solution, which is based on Microsoft Dynamics CRM 2011, Microsoft SQL Server 2008 R2, and Microsoft Windows Server 2008 R2, into its existing portfolio of OSS/BSS solutions. By pre-integrating Redknee's solutions into its offering, Tech Mahindra can deliver extended BSS capabilities with a faster deployment speed for service providers. The partnership will also immediately widen the scope of business opportunities that Redknee can address among service providers, through the additional range of services delivered through Tech Mahindra.


Lucas Skoczkowski, CEO of Redknee commented: “We are very excited to partner with Tech Mahindra, one of the premier global telecom system integrators, to deliver our next generation converged billing platform to more customers around the world. We see a growing opportunity to address requirements for real-time monetization solutions for wireless, multi-service and cloud service providers across the world and we feel that our partner strategy is critical to fulfilling this opportunity.”


Pritam Parvatkar, Director, Global Alliances, Tech Mahindra, said: “We are delighted to be partnering with Redknee. The combination of Tech Mahindra’s niche domain expertise in the telecommunications industry and Redknee’s acclaimed reputation of superior software quality will certainly bring value to the partnership and the end customers. This partnership assures to deliver benefits for both the entities through a wider scope of business opportunities and greater depth of solutions delivered for service providers globally.”

ComGuard supports Zayed University’s URC 2011

- ComGuard the leading IT security distributors supported the Third Annual Undergraduate Research Conference on Applied Computing (URC 2011) organized by Zayed University, Dubai -


Dubai, UAE, 13th July, 2011: ComGuard, a leading distributor for IT security products and solutions in the Middle East and North Africa region supported the Third Annual Undergraduate Research Conference on Applied Computing (URC 2011) organized recently by Zayed University, Dubai.


The Third Annual Undergraduate Research Conference on Applied Computing (URC 2011) was inaugurated by His Excellency Sheikh Nahyan Mabarak Al Nahyan is the President of Zayed University, and also the Chancellor of the United Arab Emirates University and the Chancellor of the Higher Colleges of Technology.


In the keynote speech, His Excellency Sheikh Nahyan Mabarak Al Nahyan stressed the importance of research, development, and innovation in building a knowledge-based economy. He encouraged the efforts of Zayed University to be at forefront of research programs and appreciated the initiatives such as doctorate programs and research conferences.


ComGuard ran several programs along with its partners during the course of the Conference. As a pre-runner to the URC 2011, Zayed University organised Awareness and Training at the Dubai Campus, just few days before the main conference, which was supported by both ComGuard and aeCERT. Eng. Ali Alamadi, Incident Handler & Threat Analyst, aeCERT delivered a presentation on Information Security and highlighted the “importance of information security awareness”. This was followed by a demo on hacking by Sanjeev Singh, CTO, ComGuard and he also made a presentation on some Hacking scenarios that was followed by a quiz on Hacking.


ComGuard in association with its sister company Spectrum and its partner Juniper Networks conducted a penetration testing competition on the second day of the conference. All the winners of this competition were awarded exciting gifts.


Comguard along with its partner EC Council, the leaders in information security training and certification addressed the queries on the career opportunities in the field of information security. Both ComGuard and EC-Council highlighted the dangers that hackers and intruders pose to the private electronic space of individuals and organizations to all the budding professionals.


Dr. Leon Jololian, Dean, College of Information Technology, Zayed University said, “Network security is an increasingly critical issue for the private and public sector as the number of malicious network attacks reaches new records. The Cyber Defense Competition co-organized by Zayed University and Juniper Networks with support from the EC-Council is designed to raise awareness about security among students. “


Students were advised to be security trained as most of the defense mechanisms stand no good unless the end user is aware of the possibilities and ways of them being affected in cyber space.


Kaspersky and iolo the partners of ComGuard had a technical expert present at the venue to elaborate on the importance of maintaining a healthy computer and tools available to do so. In addition to this, Kaspersky Labs explained the audience the possible threats on computers and also shared tips to safeguard oneself from such threats.


Mohammad Mobasseri, Senior Vice President, ComGuard, said, “We feel extremely honoured to be part of such an initiative by Zayed University and it has been our endeavor to spread the awareness about IT security as well as provide best of breed solutions to tackle the growing menace of IT security. We would like to thank all his partners Spectrum, aeCERT, Juniper Networks, EC-Council, Kaspersky Lab and iolo, whose association with us made it possible to be part of this wonderful initiative from Zayed University’s College of Information Technology (CIT)."


The 2-day conference was attended by over 400 specialists, experts and university students from across Middle East region. More than 120 research projects were presented in oral and poster formats from academic institutions in the GCC and other Arab countries including, UAE, Saudi Arabia, Oman, Bahrain, Qatar, Jordan, Egypt, Lebanon, and Palestine.


About Comguard:


Comguard FZ LLC is one of the leading Value added Distributor in the IT security space and has a reach across the Middle East and North Africa region. The company was established in 2002 and is headquartered in Dubai, UAE. Comguard is a part of Spectrum Group which is engaged in IT networking and security training, and consultancy. Hence, the biggest strength for Comguard is the skill sets which has made it one of the fastest growing Value added Distributor in the region and have been recognized by several awards from vendors and industry platforms like Choice of Channel Award from VAR MEA magazine. For more information


For further details please contact:


Media Contact:


Mahsa Babarahmati

Comguard FZ LLC

Dubai UAE

Tel.: +971 4 391 6400

Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it


PR Contact:


Sanjeev Kant

Vistar Communications

Dubai, UAE

Mob: +971 50 958 1488

Email: This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Page 64 of 96