South Africa: Potential growth area
The balance of power is shifting to emerging economies. Compared to stagnant Western markets, business growth and investment in the Middle-East, Africa and Russia (MEAR) continues unabated.
It’s a shift that’s amplified by technological advances. In under a decade, these seismic changes have levelled the playing field, opened the door to a global market and made rapid business growth a reality:
- The connected world where we can work, play and learn anytime, anywhere and with anyone.
- Virtualization made it easier to manage multiple servers and reduce physical computing power.
- Computing power has exponentially increased capacity and processing speeds so we can do much more for a lot less time and money.
- The cloud offers all the applications and storage businesses need minus the server infrastructure.
You’ll probably point out many other factors, but I picked these because they are particularly relevant to MEAR countries and their IT spending patterns. Specifically, they are backed up by Forrester research in 2012. This showed that over half of MEAR-based companies plan to invest more in mobility, analytics, security and collaboration.
Unlike more mature companies, their spending isn’t being eroded by having to maintain and support legacy systems. This frees up budgets to completely replace or expand their IT in ways that improve their competitiveness. The top three areas that Forrester highlighted from 2011 to 2012 were mobile apps (spending increase of 47%), business intelligence (44%) and collaboration tools (41%).
Further research was carried out by Canalys in February 2012 of its online channel community – resellers, systems integrators, service providers and distributors. The results showed a positive outlook across MEAR despite ongoing economic uncertainty. Over half emphasized a move from capital expenditure to operating expenditure, with the highest demand for IT services expected from small to midsize companies (with 100-499 employees). As a respondent said, “Companies working their way out of the crisis by expanding.”
As more companies seek new technologies to secure future growth, our partner network across MEAR needs to be ready to help them become the technology leaders of tomorrow.
*Forrester, 2012, Forrsights: Cautious Optimism in 2012 IT Spending Plans -- A BT Futures Report
*Canalys, 2012, Navigating through dramatic industry change
Tags: business intelligence, collaboration, Computing Power, EMEAR, Emerging Markets, mobility, security, The cloud, The connected world, virtualization
Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with the most advanced security may find themselves in the crosshairs as we shift to more devices and anywhere access.
Just a few weeks ago, multiple leading social networking and large enterprises were hit with an attack when their employees visited a known and trusted website focused on mobile application development. Attackers used a method commonly referred to as “water-holing,” where they compromise a legitimate site commonly visited by employees of their target organizations. Using zero-day vulnerabilities and malicious code that change at a rapid rate, these attacks highlight the need to consistently enhance traditional defenses based on signatures or reputation with global and local context analysis.
This episode underscores how important security is in a more mobile, more connected world—attackers are paying attention, using these industry trends to create targeted and sophisticated attacks that can bypass traditional defenses. The Cisco 2013 Annual Security Report found that Android Malware grew 2,577 percent in 2012 alone. The Internet of Everything is taking shape and the number of online connections is soaring. According to Gartner’s Top 10 Strategic Technology Trends for 2013, 30 billion things will be connected by 2020.
Read More »
Tags: 2013 annual security report, attackers, byod, Cisco Security, Cisco Security Intelligence Operations, Internet of Everything, IoE, malware, Mike Fuhrman, mobile, mobile malware, security, sio, zero-day vulnerability
There is still time to register for the upcoming FIRST Technical Colloquium April 2-3 2013. The event has a very exciting program covering, bitsquatting, webthreats, RPZ, Passive DNS, Real-world monitoring examples, Spamhaus, SIE, Cuckoo Sandbox, Malware Analysis and many more current issues facing the incident response community.
The event’s line-up includes notables from Cisco Security Intelligence Operations (SIO), Internet Systems Consortium, Shadowserver foundation, KPN-CERT, NATO, MyCert and ING amongst others. Program details can be found here.
Read More »
Tags: CSIRT, FIRST, Gavin Reid, KPN-CERT, malware, Malware Analysis, MyCert, NATO, security, security intelligence operations, sio, TRAC
The Internet of Everything is all around us. People are connecting on the go in new ways, and they expect fast, secure network connections that follow them anywhere and everywhere —at work, at home, at play, at the mall, at the gym, or even at the ballpark.
Not so long ago, getting on the Internet was a static experience. It was a desktop PC tethered to the company network, or for the elite the “double, double, toil and trouble” of a modem firing up, followed by a long wait for a sluggish home connection.
The new era of mobility takes computing beyond the PC’s limitations, surpassing it by a long shot. It’s becoming less about devices than what you can do as the workspace evolves, offering adaptability and choice based upon who you are, where you are, and what you need to accomplish. Whether it’s a quick phone call, a web conferencing session, instant messaging, or file sharing, removing the limitations of location and devices lets organizations work together better and make decisions faster.
What is driving these changes? When people think of mobility, they usually focus on the devices used to access the net. Slick new smart phone displays, multi-touch tablet screens, and futuristic industrial designs are definitely eye-catching. Consumers are snapping up these new devices, and companies are embracing bring-your-own-device (BYOD) programs. But what’s happening behind the scenes and on the screens is just as important—if not more important.
Read More »
Tags: byod, Cisco, collaboration, Internet of Everything, IoE, IT, management, mobility, network, security, unified access, wired, wireless
While Alaska is the largest state, it’s the least densely populated. With local government agencies and departments dispersed across more than 600,000 square miles, creating a reliable and efficient statewide IT infrastructure is no easy feat.
When Corey Kos became the state of Alaska’s enterprise architect in 2010, he set out on a mission to create an infrastructure that would deliver IT services via private cloud, reducing overall expenses and allowing Alaska’s government employees to work efficiently. Three years later Kos has exceeded his objectives and successfully connected ‘The Last Frontier.’ Read More »
Tags: Borderless Networks, cloud, data center, govtech, security, UCS