IT market research and advisory firm IDC has highlighted the potential for Application-Centric Infrastructure to benefit businesses and organisations in the Middle East. The ACI approach was recently announced by Cisco, and it aims to ...
Tags: IDC, Cisco, Application-Centric Infrastructure, Middle East
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts at the RSA Conference 2013 here this week. Over the past few years, the ...
Companies with IT security strategies that focus mostly on complying with key standards are dangerously unprepared for emerging cyber threats, said security experts. Over the past few years, the security strategies of many companies and ...
Tags: IT security strategies, emerging cyber threats, security strategies
Security company, FireEye, has announced a new threat protection platform designed to help enterprises deploy new security models to counter modern cyber attacks. Many traditional defences, such as firewalls and anti-virus, are not enough ...
Current business security models fail to prepare for cyber threats in the face of highly sophisticated, powerful cyber attack tools that are no longer the preserve of nation states, as they filter down to a wider community of attackers. ...
Tags: security models, hackers, cyber attacks, Cyber criminals
McAfee does not want to be all things to all people when it comes to security, but its leadership is aiming to provide the platform that will enable better data protection. "We believe in doing more business with fewer value-add partners, ...
Tags: McAfee, software development kits, application program interfaces
The take-up of mobile technology will have a dramatic affect on back-office IT systems, with hidden costs and disruptions possible for companies that do not redesign systems and processes, according to Forrester Research. Businesses are ...
Tags: mobile technology, dramatic affect, back-office, IT systems