Acronis hosts #CyberFit Summit

In Events, News

Acronis hosted service providers and corporations from the region to a stakeholders’ summit in Abu Dhabi’s Yas Island. The inaugural #CyberFit Summit was in line with the UAE government’s National Cybersecurity Strategy (NCS), aimed to boost cyber protection innovation, discuss modern-day data management challenges and map out strategies to combat the increasing threat of cyber-attacks.

As part of the summit, Acronis unveiled three new cyber protection solutions for the Gulf region. These newly launched protection solutions are Acronis Cyber Protect, which integrates seven key cyber protection capabilities into one easy-to-use solution and Acronis Cyber Platform, which is set to provide developers and ISVs the ability to customize, extend and integrate Acronis Cyber Protection solutions. The Acronis Cyber Infrastructure designed to deliver cost-efficient, easy-to-use and reliable hyper-converged infrastructure optimized for cyber protection deployments.

Speaking at the summit, Nidal Othman, Co-Founder and Managing Director of StarLink said that “cloud adoption was one area that has experienced growth in the Middle East. He termed the Acronis #CyberFit Summit as a timely event for those looking for a secure way to start using cloud technology.”
“Every day, more cloud vendors are jumping into the lucrative MENA market, with an estimated value of US$2.2 billion to cloud vendors. This figure is expected to increase by 24 per cent yearly on average as UAE governments allocate resources to cloud technology to power their smart city projects.”


You may also read!

McAfee unveils McAfee MVISION Cloud for Containers

McAfee has announced McAfee MVISION Cloud for Containers, thereby becoming the first unified cloud security platform to integrate container


Empello cautions Android users in the UAE

Empello has to day cautioned the Android users in the UAE on the increase in the number of mobile


BlueKeep attacks prompt fresh warnings

Amer Owaida, Security Writer at ESET discusses the infamous vulnerability has been exploited for a cryptocurrency mining campaign, but


Join Our Newsletter!

Love SecurityMEA? We love to tell you about our new stuff. Subscribe to newsletter!

Mobile Sliding Menu