Friday,19 April, 2024

Subscribe to Newsletter

  Knowledge Center
Knowledge Center > IT and Business Management

The Iso 17799 The Definite Guide For Security Geeks (Part 7)
By: Omar Sherin from Egypt

In this part of the ISO series we will discuss the 8th section of the standard, this section (Communication and Operations Management) deals with how a typical organization should handle its IT operations.

>> More

Posted by ROOT Technologies

By: Tamer Abdel Kader from Egypt

For many years, the barcode-based systems have dominated the FMCG & supply chain markets. But many expect this era to dim; as the new Radio Frequency Identification (RFId) is strongly preparing to take this place.

>> More

Posted by ROOT Technologies

IT Policy & Security Compliance (Part Two)

SIEM deployments cut across organizations’ boundaries. In IT you can expect to involve stakeholders in architecture, operations, help-desk, and security functions. Within business management, you may need support from finance, HR, compliance, risk management, and the sponsoring C-level executive. It’s essential that any SIEM project secure buy-in from all stakeholders before work begins in earnest. Once the team is assembled, you are then ready for the 4-step process to perfect SIEM preparation.

>> More

Posted by ROOT Technologies

Egypt: A Hotbed For Mobility

The Egyptian telecom industry is one of the fastest growing markets in the Middle East and North Africa. In particular the country is better positioned over regional peers due to the following:

>> More

Posted by ROOT Technologies

Home Networks (Part Two)
By Reichle & De-Massari (R&M)

Although many houses will stand for centuries, a lot of cabling systems won't last a single decade. That's because communications are more demanding nowadays, incorporating voice, entertainment, information and home office applications. You can't get by any more with just a phone socket in the corridor and individual add-on extensions.
The necessary infrastructure has to be planned – for new buildings just as much as for those being renovated. In principle, the same well-proven and tested technologies can be used as in the office world. With intelligent planning, the additional costs are moderate, and the installation increases the long-term value of the building. This article points out the factors that need to be taken into account.

>> More

Posted by ROOT Technologies

  The ISO 17799 The Definite Guide For Security Geeks

  Getting More From Your Information

  Backing Up Exchange 2007 Using Veritas 11d

  The Iso 17799 The Definite Guide For Security Geeks (Part 6)

  IT Policy & Security Compliance

Page 1 From 3 1 2 3 Next »

What is your favourite search engine?

Most Viewed
  Riverbed Launches Industry’s Most Complete Digital Experience Management Solution

  Credence Security to Address Growing Market for GRC Solutions in Middle East Through Partnership with Rsam

  New Mimecast Archive Cloud Capability Streamlines GDPR Management for Email

  Planning and Scheduling Software–Helping Manufacturers Keep Their Customers Happy

  Farsight Security and Infoblox Provide Zero-Hour Protection Against Cyberattacks Due to New Domains

  Fujitsu Launches High-Security Biometric Authentication Solution for Active Directory IT Environments

  Rackspace Wins 2017 Red Hat Innovator of the Year Award

  ServiceNow Survey Shows 2018 as the Year of Automation for Routine Enterprise Work

  4 Tech Hacks to Faster Customer Onboarding

  New Mimecast Report Detects 400% Increase in Impersonation Attacks