Loading...

24 May 2026 03:22

Mobile & Digital

Low IT Security Spend leaves Middle East Businesses Open to Cyber Attacks

Globally, businesses and government entities are investing heavily on IT security, but worryingly, Middle East businesses are spending less than 1% of their overall IT budgets on security.

Last year, hackers stole roughly 81.5 million records while carrying out more than 740 confirmed data breaches. Many of the attacks targeted household name brands, costing the global economy up to $575 billion, and destroying consumer confidence, all the while companies still believed their data was secure. 

Fluke Networks is concerned that the IT leaders in the region are allocating budgets to only meet current compliance requirements, leaving businesses vulnerable to attacks. 

Another concern is the increased use of mobile devices in organizations. It is no surprise that these devices are increasingly being brought into the workplace, and used to perform both business critical functions as well as private user tasks. 

In fact, the average corporate user has anywhere from 2-4 mobile devices, most of which require wireless connectivity. Gartner predicts that by 2017, there will be 1.3 billion new business mobile devices.

 In this rapidly changing model, end users are demanding access to applications, development platforms, and network infrastructure as a service over the Internet. But with this transformation into a borderless enterprise, IT departments are finding it difficult to ensure heightened end-user experience, and business effectiveness of its workforce. 

“There’s a significant urgency in the borderless enterprise model, where IT departments don’t always control the entire delivery path, but are expected to fix if something goes wrong. Therefore, it’s important that IT and the business work together to establish a process and methodology that orchestrates the adoption of SaaS applications into the enterprise,” commented Werner Heeren, Regional Director, Middle East, Africa and Turkey, Fluke Networks.

Also, Fluke Network is seeing increased tension between business and IT. Businesses are often dissatisfied with IT implementation and execution time lines, and 71% of C-level executives believe they can make better IT decisions faster and more cost effectively.

Increasingly businesses are implementing applications and services without any involvement of their IT department, thus leaving themselves vulnerable to attack. As much as 38 % of businesses owners are making half of the enterprises cloud purchase decisions (RightScale 2015)

Furthermore, non-IT departments control more than 37% of enterprise technology spending, and that number is likely to grow over the next few years. (Frost & Sullivan 2015 “Why Choice and Control are Critical to a Successful Cloud Strategy“) 

And if this is not generating enough tension, mobile business users expect their business service anywhere, anytime, and 77% of employees see mobile devices as very important to meeting business objectives.

Fluke Networks are a leading provider of network test and monitoring solutions that speed the deployment and improve the performance of networks and applications. However, it is a matter of concern, that regional businesses do not have adequate protecting for their networks to ensure business proficiency, ahead of GISEC 2015.

At GISEC 2015, Fluke Networks will be showcasing its latest products, including the company’s wireless network security and performance monitoring portfolio. 

GISEC is taking place at Dubai International Conference and Exhibition Centre (DICEC) from 26-28 April 2015, and Fluke Networks can be found at GP 2 & 3

NULL
(Visited 7 times, 1 visits today)
peri hokiperihokiduta 76AWSBEThttps://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjonghttps://www.abc1131.it.com/stc76duta76duta76bduta76 sejiwaduta76 lokasiterdekatduta76 africafuelduta76 oscarmykeduta76 naptimepkduta76 daikinduta76 raes-munichlaporan pengujian ritme putaran fitur unggulan pragmatic playmahjong ways 2 warisan lokal simbol budaya modern stabilitas sosialstruktur algoritma stabilitas hasil mekanik mahjong ways analitis detailhubungan fluktiasi rtp live performakombinasi unik simbol hasil pgsoftmomentum perubahan perkalian pragmatic playlonjakan rahasia frekuensi mahjong ways 2perofrma multiplier besar olympusteori rtp koi gate tengah malampola wild bandito rtp livemahjong wins pola scatter wildanalisa taktik silang pola mahjong wild deluxe peluang dadu usicbo rtp live gates of olympuspemetaan taktik cerdas strategi peluang baccarat teknik pola analisa rtp live starlight princess mahjong ways 2 pgsoftstrategi hibrida kuantitatif analisa peluang blackjack teknik pola taktik rtp live mahjong wins 3 pragmatic sweet bonanzametodologi hibrida cerdas taktik peluang roulette analisa strategi pola rtp live mahjong ways 2 pgsoft wild west goldsinkronisasi strategi pro teknik peluang blackjack sv388 analisa pola rtp live sugar rush mahjong wins 3 pragmaticeksekusi taktik jitu dengan presisi analisa rtp gates of olympus teknik pola mahjong wild deluxe dadu sicboanalisa teknik kuantitatif peluang baccarat strategi pola rtp live mahjong ways 2 pgsoft starlight princesssinkronisasi strategi pro analisa peluang taktik blackjack teknik pola rtp live mahjong wins 3 pragmatic sweet bonanzamasterclass eksekusi cerdas analisa peluang roulette strategi pola teknik rtp live mahjong ways 2 pgsoft wild west goldblueprint taktik presisi strategi peluang blackjack sv388 analisa teknik pola rtp live sugar rush mahjong wins 3 pragmaticalgoritma terbaru scatter emas mahjong wins 3 investigasidetik wild konek beruntun mahjong ways klasik permainanfenomena scatter merah mahjong ways 2 sistem keamananpembuktian scatter hitam mahjong ways 2 komunitas pg softrahasia kombinasi wild berjejer mahjong wins pembayaran drastis323324325326327328329330331332penguraian multiplier starlight princessdistribusi wild wild bounty showdowncara membaca rtp mahjong ways 2analisis inferensial pola gates of olympus objektif sisteminovasi grafis pgsoft transisi gambar lebih responsif modernkarakteristik simbol emas mahjong ways 2 pertengahan sesimemanfaatkan ritme putaran mahjong ways 2 server stabilsolusi cerdas volatilitas starlight princess sistem putaranskalabilitas engine html5 multiplier mahjong ways 2mekanisme threading server komputasi mahjong wins 3dekonstruksi algoritma spasial koordinat scatter hitamstudi desain ux interaktif frame emas mahjong ways 2audit protokol enkripsi data rtp mahjong wins 3distribusi rtp gates of olympusinterpretasi rtp mahjong waysanalisis algoritma mahjong ways 2 vs wins 3evolusi fitur scatter hitam mahjongstrategi pola tumble mahjong ways 2data rtp mahjong wins 3 vs klasikmitos fakta mekanika scatter hitam Top