Taipei, Sunday, Sep 29, 2024, 15:25

News

Middle East & North Africa Information Security Spending to Reach US$1.3B in 2016

Published: Nov 02,2016

Middle East and North Africa (MENA) spending on information security technology and services is on pace to reach US$1.3 billion in 2016, an increase of 8 percent over 2015, according to Gartner, Inc.

More on This

Gartner: Worldwide Semiconductor Revenue to Decline 0.9% in 2020 Due to Coronavirus Impact

Due to the impact of the coronavirus on semiconductor supply and demand, worldwide semiconductor revenue is forecast to decline 0...

Gartner: Global Smartphone Sales Fell Slightly in the Fourth Quarter of 2019

Global sales of smartphones to end users contracted in the fourth quarter of 2019, declining by 0.4% year over year, according to Gartner, Inc...

Increased awareness about the business impact of security incidents is causing organizations to focus their security strategy on detection and response approaches, which is driving this strong growth in the security market.

Greg Young, research vice president at Gartner, provided the latest outlook for the information security industry today at the Gartner Security and Risk Management Summit, which is taking place here October 31 - November 1.

"Enterprises in MENA are the targets of some of the world’s most advanced attacks, as well as the highest rate of attacks. Organizations are trying to increase detection, blocking, and advanced defenses while faced with limited availability in the security workforce," said Mr. Young.

"Large organizations in the Middle East and North Africa continue to invest in building out security operations capabilities either in house or by leveraging external services offered bymanaged security services providers (MSSPs). I’m encouraged by the regional security cooperation as evidenced through standards and CERT coordination."

Gartner recommends that organizations recognize the inevitable adoption of cloud and virtual IT and shift their defenses to an adaptive security architecture. Organizations should look for, and secure, shadow IT whereby IT has been adopted outside the normal IT procurement and management processes.

"Targeted attacks, ransomware, and denial of service attacks are the most relevant threats to enterprises today, however they are enabled by failing patch vulnerabilities and overloading security personnel with alerts," said Mr. Young.

CTIMES loves to interact with the global technology related companies and individuals, you can deliver your products information or share industrial intelligence. Please email us to en@ctimes.com.tw

844 viewed

comments powered by Disqus