IM_Advisor_Blog_LogoIM_Advisor_Blog_Logo
  • Home
  • Technology Updates
    • Cloud
    • Cyber Security
    • Data Capture / POS
    • Digital Signage
    • Networking & Communications
    • Physical Security
    • Server & Storage
    • Software & Virtualization
    • Training & Professional Services
  • Social Stream Wall
  • Resource Center
  • IM Country Websites
    • United Arab Emirates
    • Egypt
    • Saudi Arabia
    • Morocco
    • Turkey
    • Turkey (Armada)
    • Lebanon
    • Pakistan
    • South Africa
  • Contact Us
cyber-crime-isometric-illustration_1284-25768

Tags:cyber

Security tips for working from home

  • 256
  • 0
  • 0
analytics-3088958_1920

Tags:analytics

UEBA a different approach to protect against cyber attacks

  • 404
  • 0
  • 0
23

Tags:cyber

Increasing use of Mobile as an attack vector

  • 318
  • 0
  • 0
  • Guruprit AhujaGuruprit Ahuja

Building a Profitable Cloud Business With Ingram Micro

Guruprit Ahuja, Director Cloud, META at Ingram Micro, shares his thoughts on how to build a successful cloud business practice & the opportunity for cloud b…

Cloud

  • 244
  • 0
  • 0
  • Bassel Al FakirBassel Al Fakir

Video Surveillance Data in the AI and IoT Era

Surveillance video is more than just a video – it’s precious evidence for an incident, and it is growing faster than ever, says        Bassel Al Fakir, Managing…

Artificial Intelligence

  • 182
  • 0
  • 0
  • Marc KassisMarc Kassis

Structured Thinking To Combat Cyber Criminals

Nowadays, IT security principles constantly change. All companies, organizations, governments and even private sector (SME and SMB) are discovering that a tradi…

Cyber Security

  • 213
  • 0
  • 0
  • Aliaa AtiyaAliaa Atiya

Understanding IoT to guide customers

Alia Atiya, Business Unit Manager, Aptec - an Ingram Micro company, says it is critical for channel partners to educate and train themselves in the security ris…

IoT

  • 91
  • 0
  • 0
  • Tamer Abdel FattahTamer Abdel Fattah

The Four Reasons to use Artificial Intelligence

Most customers today understand the significance of digital transformation and are willing to enhance their business by on boarding advanced technologies such a…

Artificial Intelligence

  • 315
  • 0
  • 0
  • Bahaa SalahBahaa Salah

It’s time for a change!

Throughout my career, I remember going through several turning points - when I could see clearly that it was about time to change, adopt to new strategies, dive…

Digital Signage

  • 645
  • 0
  • 0
  • Dr. Ali BaghdadiDr. Ali Baghdadi

Tip of the iceberg

Dr. Ali Baghdadi, SVP and chief executive META, Ingram Micro shares with Channel Middle East the company’s evolution from a VAD to a technology specialist and m…

Cloud

  • 326
  • 0
  • 1
  • Roshan YalaburgiRoshan Yalaburgi

I have customers using Office 365, what more can I sell to them??

Today Office 365 business has become a commodity business and every Microsoft re-sellers is selling/sold Office 365 to their customers. Once Office 365 is sold …

Cloud

  • 605
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Why should you choose Microsoft – Azure as your preferred cloud vendor

Microsoft has leveraged its constantly-expanding worldwide network of data centers to create Azure, a cloud platform for building, deploying, and managing servi…

Cloud

  • 325
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Microsoft Azure vs AWS : Which is a better choice for cloud based Disaster Recover (DRaaS)

Cloud computing is taking the planet by storm. Many businesses are taking advantage of this low cost and easy-to-access option. OPEX billing model and easy scal…

Cloud

  • 1294
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Azure Site Recovery with Hyper-V … Important points to remember

Azure Site Recovery replica traffic cannot be routed over a dedicated DR link At the time of writing, you cannot route Hyper-V replica traffic over a dedicat…

Cloud

  • 566
  • 0
  • 0
  • Cyber Security Center of Excellence DubaiCyber Security Center of Excellence Dubai

Structured Thinking to Combat Cyber Criminals

Introduction Nowadays, IT security principles constantly change. All companies, organizations, governments and even private sector (SME and SMB) are discoverin…

Cyber Security

  • 212
  • 0
  • 0
  • Cyber Security Center of Excellence DubaiCyber Security Center of Excellence Dubai

The Virtual Lab by Ingram Micro

Work environments now a days are more dynamic than ever before, which makes it hard for those who are still using the traditional tools. Cloud environments are …

Cyber Security

  • 336
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Veeam B&R vs Veritas Backup Exec – BCDR software with Microsoft Azure

In this article I will talk about features available in Veeam and Veritas Backup Exec to perform backup and disaster recovery operations with Microsoft Azure. …

Cloud

  • 949
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Perform Disaster Recovery (FAILOVER & FAILBACK) of Physical Server with Microsoft Azure

"Physical servers replicated to Azure using Site Recovery can only fail back as VMware VMs. You need a VMware infrastructure in order to fail back." Learn ho…

Cloud

  • 1806
  • 0
  • 0

Latest Technology Updates

Tags:Cloud securityCloudblueCyber Security

ALi Baghdadi
Cloud
  • 326
  • 0
  • 1
  • Dr. Ali BaghdadiDr. Ali Baghdadi

Tip of the iceberg

Dr. Ali Baghdadi, SVP and chief executive META, Ingram Micro shares with Channel Middle East the company’s evolution from a VAD to a technology specialist and micro-vendor with a t…

Tags:365backupbititan

I have customers using Office 365_Blog
Cloud
  • 605
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

I have customers using Office 365, what more can I sell to them??

Today Office 365 business has become a commodity business and every Microsoft re-sellers is selling/sold Office 365 to their customers. Once Office 365 is sold to the customer, how…

Tags:advantageAzureCloud Computing

Why should you choose Microsoft _Blog
Cloud
  • 325
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Why should you choose Microsoft – Azure as your preferred cloud vendor

Microsoft has leveraged its constantly-expanding worldwide network of data centers to create Azure, a cloud platform for building, deploying, and managing services and applications…

Tags:AWSAzureCloud Computing

azure aws_Blog
Cloud
  • 1294
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Microsoft Azure vs AWS : Which is a better choice for cloud based Disaster Recover (DRaaS)

Cloud computing is taking the planet by storm. Many businesses are taking advantage of this low cost and easy-to-access option. OPEX billing model and easy scalability are one the …

Tags:ASRAzurebackup

Azure Site Recovery with Hyper-V_Blog
Cloud
  • 566
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Azure Site Recovery with Hyper-V … Important points to remember

Azure Site Recovery replica traffic cannot be routed over a dedicated DR link At the time of writing, you cannot route Hyper-V replica traffic over a dedicated network. By defau…

Tags:Cyber SecurityDLPEndpoint

industry-3087393_1920
Cyber Security
  • 212
  • 0
  • 0
  • Cyber Security Center of Excellence DubaiCyber Security Center of Excellence Dubai

Structured Thinking to Combat Cyber Criminals

Introduction Nowadays, IT security principles constantly change. All companies, organizations, governments and even private sector (SME and SMB) are discovering that a traditional…

Tags:Cloud ComputingCyber SecurityCyber Security Training

cloud-computing-2001090_1920
Cyber Security
  • 336
  • 0
  • 0
  • Cyber Security Center of Excellence DubaiCyber Security Center of Excellence Dubai

The Virtual Lab by Ingram Micro

Work environments now a days are more dynamic than ever before, which makes it hard for those who are still using the traditional tools. Cloud environments are increasingly popular…

Tags:AzurebackupCloud Computing

Veeam B&R vs Veritas Backup Exec_Blog
Cloud
  • 949
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Veeam B&R vs Veritas Backup Exec – BCDR software with Microsoft Azure

In this article I will talk about features available in Veeam and Veritas Backup Exec to perform backup and disaster recovery operations with Microsoft Azure. Veeam Backup and R…

Tags:AzurebackupCloud Computing

Perform disaster recovery (failover & FAILBACK) of physical server with Microsoft Azure_Blog
Cloud
  • 1806
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Perform Disaster Recovery (FAILOVER & FAILBACK) of Physical Server with Microsoft Azure

"Physical servers replicated to Azure using Site Recovery can only fail back as VMware VMs. You need a VMware infrastructure in order to fail back." Learn how to fail over physi…

Tags:AWSAzurebackup

azure aws-01
Cloud
  • 2049
  • 0
  • 0
  • Roshan YalaburgiRoshan Yalaburgi

Veeam integration with AWS & Microsoft Azure

Veeam backup and replication 9.5 is a very popular backup and DR software used by enterprises. Making sure you have three copies of your data in two different locations is very imp…

Tags:Cloud Computingcoffee minercyber attacks

wifi-640404_1920
Cyber Security
  • 158
  • 0
  • 0
  • Cyber Security Center of Excellence DubaiCyber Security Center of Excellence Dubai

Public Wi-Fi: Know the Risks and Stay Protected

"Free Wi-Fi” – the notice declares. Weary shoppers throng into the coffee shop, drawn by the prospects of Internet access at no cost whilst, perhaps, enjoying a warm cuppa with som…

Tags:AIArtificial IntelligenceBitdefender

technology-3762546_1920
Cyber Security
  • 304
  • 0
  • 0
  • Cyber Security Center of Excellence DubaiCyber Security Center of Excellence Dubai

Artificial Intelligence: Enabling Cyber Security and Inevitably, Cyber Crime

“I’m a Data Scientist”. Fundamental to the field of Artificial Intelligence, Data Scientists are skilled at developing or exploiting mathematical tools to examine troves of data an…

Tags:Cyber SecurityWi-Fi System

Cyber Security Warning - Using free WiFi
Cyber Security
  • 154
  • 0
  • 0
  • Ingram Micro METAIngram Micro META

Cyber Security Warning – Using free WiFi

  • Networking & Communications
  • 84
  • 0
  • 0
  • Ingram Micro METAIngram Micro META

Driving Analytics

The Middle East being a very oil dependent region has always been relying on oil and gas for large portion of businesses operating in this region. However, given the current dynami…

Tags:Artificial IntelligenceIoT

Data Management in the IoT Era
IoT
  • 159
  • 0
  • 0
  • Tamer Abdel FattahTamer Abdel Fattah

Data Management in the IoT Era

Today, organizations rely on huge amounts of data for enhancing business efficiencies. Customers are increasingly looking at expanding on data warehouses and business intelligence …

Tags:CCTVVideo Analytics

Art of Data Collection & Management
Physical Security
  • 158
  • 0
  • 0
  • Bassel Al FakirBassel Al Fakir

The Art of Data Collection and Management

Regional customers can derive immense business value from data collected by their surveillance systems. Due to the wide acceptance of video cameras and their proven ability to prev…

Tags:Data Fabric SolutionsHybrid Cloud

Relying on Cloud - NetApp
Cloud
  • 175
  • 0
  • 0
  • Maya ZakhourMaya Zakhour

Relying on Cloud

How can regional enterprises harness the power of data to execute hybrid cloud projects? Over the recent years, regional enterprises have understood and embraced the power of data…

Tags:CollaborationDropbox

Dropbox Collaboration
Cloud
  • 67
  • 0
  • 0
  • Mohamed AbdEl AzizMohamed AbdEl Aziz

10 tips to improve collaboration between designers & engineers

Sometimes, looking at a problem from both an analytical and intuitive point of view helps you find a solution. Other times, it leads to an impasse. If you’ve ever worked on a team …

1 2 3 4 5 … 7

Search Ingram Micro Blog

Follow Us

Tweets by AptecIM

Top Tags

Cloud Computing cyber cyberattack cyber attacks cybercrime Cyber Security cybersecurity Data Protection dataprotection datasecurity hacker hacking informationtechnology infosec IoT Malware privacy programming security tech

What will be the Trending Technology in 2018?

Top Posts at Ingram Micro Advisor

technology-3762546_1920

Tags:AI

Artificial Intelligence: Enabling Cyber Security and Inevitably, Cyber Crime

  • 304
  • 0
  • 0
Why Do I Need SOAR If I Have SIEM_blog

Tags:cyber

Why Do I Need SOAR, If I Have SIEM?

  • 298
  • 0
  • 0
2018_Threat Landscape

Tags:2018

The 2018
Threat Landscape

  • 283
  • 0
  • 0
Disruptive Transformation

Tags:CAPEX

Disruptive
Transformation

  • 264
  • 0
  • 0
Business Corporate Protection Safety Security Concept

Tags:cyberattack

HOLISTIC APPROACH TO CYBER SECURITY

  • 263
  • 0
  • 0
cyber-crime-isometric-illustration_1284-25768

Tags:cyber

Security tips for working from home

  • 256
  • 0
  • 0
Powering Transformation with IoT

Tags:Digital Transformation

Powering Transformation
with IoT

  • 255
  • 0
  • 0
Accelerating Security Transformation

Tags:Cyber Security Training

Accelerating Security Transformation

  • 247
  • 0
  • 0
Data Driven IoT Security - Ingram Micro Advisor

Tags:Data Modeling

Data Driven IoT Security

  • 245
  • 0
  • 0
Cloud

Tags:Cloud Computing

Building a Profitable Cloud Business With Ingram Micro

  • 244
  • 0
  • 0
new-years-day-2914931_1920

Tags:2018

Cyber Security
Predictions for 2018

  • 233
  • 0
  • 0
Cyber criminals hacking into bank account. Cartoon hackers opening lock, carrying password and money. Hacker attack concept. Vector illustration can be used for internet fraud, breach, money safety

Tags:cyber attack

Data Breach- ElasticSearch Server

  • 227
  • 0
  • 0


Ingram Micro META Ingram Micro Cyber Security Ingram Micro Services Ingram Micro Cloud Ingram Micro Inc.
Homepage Homepage Homepage Homepage Homepage
Company Overview Consultancy Services Professional Services Become a Reseller Executive Leadership
Executive Officers Assessment Services Training Services Cloud Marketplace Board of Directors
Become a Reseller Training Schedule Training Portfolio Cloud Events Social Responsibility
Corporate Newsroom Cyber Security Solutions Training Resources IM Cloud Blog Awards
Contact Us Contact Us Contact IM Training Cloud Support History

Copyright © 2020 Ingram Micro META. All rights reserved. Opinions expressed on this publicly available site and any follow-on comments are the personal opinions of the author(s) and not of Ingram Micro Inc., its business units worldwide, employees, officers or directors. The content is informational only and is not an endorsement by Ingram Micro Inc., its business units worldwide, employees, officers or directors.

  • Home
  • About Us
  • Become a Reseller
  • Ingram Micro Careers
  • Contact Us