Malware, BYOD drive ICT security boom

Experts speak: Network protection more vital than ever in coming years

Tags: Fortinet IncorporationFrost & Sullivan (www.frost.com)Huawei Technologies CompanyInjazat Data SystemsUnited Arab Emirates
  • E-Mail
Malware, BYOD drive ICT security boom Experts highlight the increasing concern over the security of networks.
By  Stephen McBride Published  November 21, 2012

The recent climb in regional malware exploits coupled with the continuing BYOD phenomenon has led to a growth spurt in the network security sector worldwide, and as so-called advanced persistent threats (APTs) become commonplace, business-critical systems are seeking refuge in the cloud and virtual environments.

Such is the argument of global business research company Frost & Sullivan, which today held its Middle East Enterprise Security Summit in Dubai's Habtoor Grand Beach Resort. Attendees included C-level executives and senior management from all sectors, including manufacturing, finance and media.

"Information security is increasingly emerging as a critical concern in today's modern business environment," said Kamran Ashan, head of Information Security, Injazat Data Systems.

"This trend is very much evident in the Middle East where enterprises have experienced information-related threats such as infiltration, data leakage and cyber warfare among others. Injazat Data Systems will highlight how enterprises can proactively address these challenges and mitigate risks associated with business assets and services of enterprises. Moreover, with the best minds in enterprise security attending this event, we expect to have an in-depth discussion of new trends and developments in information security in the Middle East."

While much of the stir in the ICT security sector has been created by a handful of high-profile, third-quarter incidents involving enterprise heavyweights such as Saudi Aramco and Al Jazeera, corporate chatter at the summit is concentrating on internal business growth and how that relates to greater vulnerability in systems.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code