Loading...

24 May 2026 11:40

Mobile & Digital

Gartner Says Middle East & North Africa Information Security Spending to Reach US$1.1 Billion in 2015

Middle East and North Africa (MENA) spending on information security technology and services is on pace to reach US$1.1 billion in 2015, an increase of 3.3 percent over 2014, according to Gartner, Inc. US dollar appreciation caused lowered year on year growth, but overall security spending is on the rise in the region – in constant currency terms, the security market in MENA is projected to grow 15 percent in 2015.

Greg Young, research vice president at Gartner, provided the latest outlook for the information security industry today at the Gartner Security and Risk Management Summit, which is taking place here through November 3.

“Enterprises in MENA are now realizing that merely adopting preventive strategies is not enough, and they are beginning to focus on detection and response approaches to improve the security posture of their organization, “ said Mr. Young. “Large organizations in the Middle East and North Africa are investing in building out security operations capabilities either in house or by leveraging external services offered by managed security services providers (MSSPs).”

Gartner recommends that organizations spend more on detection but not at the expense of blocking known threats. This requires enterprises to relook at their people, process and technology strategies around security.

“Mature technology areas, including endpoint protection platforms and most anti-virus based platforms, where the penetration rate is fairly high, are beginning to see significant commoditization. Organizations’ interest in security is being driven by elements of digital business, such as cloud, mobile computing and, increasingly, the Internet of Things (IoT), as well as by the sophisticated and high-impact nature of advanced targeted attacks. However these commoditized security items are crucial as the first line of defence: don’t drop your guard by only new shiny security gadgets” said Mr. Young.

Other trends in the information security market that form assumptions behind Gartner’s latest forecast include:

In 2017, more than half of the network attacks targeting enterprises will use encrypted traffic to bypass controls, up from less than 5 percent today

Through 2018, more than 40 percent of state-sponsored attacks will have the source nation misidentified by the target.

99.9 percent of attacks will be based on product vulnerabilities that were known of for at least a year.

Gartner’s latest forecast for information security is available in the report ‘Forecast: Information Security, Worldwide, 2013-2019, 2Q15 Update.

NULL
(Visited 20 times, 1 visits today)
peri hokiperihokiduta 76AWSBEThttps://sintnicolaasschool.com/https://abc1131aa.com/kincir88cakar76Slot mahjonghttps://www.abc1131.it.com/stc76duta76duta76bduta76 sejiwaduta76 lokasiterdekatduta76 africafuelduta76 oscarmykeduta76 naptimepkduta76 daikinduta76 raes-munichlaporan pengujian ritme putaran fitur unggulan pragmatic playmahjong ways 2 warisan lokal simbol budaya modern stabilitas sosialstruktur algoritma stabilitas hasil mekanik mahjong ways analitis detailhubungan fluktiasi rtp live performakombinasi unik simbol hasil pgsoftmomentum perubahan perkalian pragmatic playlonjakan rahasia frekuensi mahjong ways 2perofrma multiplier besar olympusteori rtp koi gate tengah malamanalisa taktik silang pola mahjong wild deluxe peluang dadu usicbo rtp live gates of olympuspemetaan taktik cerdas strategi peluang baccarat teknik pola analisa rtp live starlight princess mahjong ways 2 pgsoftstrategi hibrida kuantitatif analisa peluang blackjack teknik pola taktik rtp live mahjong wins 3 pragmatic sweet bonanzametodologi hibrida cerdas taktik peluang roulette analisa strategi pola rtp live mahjong ways 2 pgsoft wild west goldsinkronisasi strategi pro teknik peluang blackjack sv388 analisa pola rtp live sugar rush mahjong wins 3 pragmaticeksekusi taktik jitu dengan presisi analisa rtp gates of olympus teknik pola mahjong wild deluxe dadu sicboanalisa teknik kuantitatif peluang baccarat strategi pola rtp live mahjong ways 2 pgsoft starlight princesssinkronisasi strategi pro analisa peluang taktik blackjack teknik pola rtp live mahjong wins 3 pragmatic sweet bonanzamasterclass eksekusi cerdas analisa peluang roulette strategi pola teknik rtp live mahjong ways 2 pgsoft wild west goldblueprint taktik presisi strategi peluang blackjack sv388 analisa teknik pola rtp live sugar rush mahjong wins 3 pragmaticalgoritma terbaru scatter emas mahjong wins 3 investigasidetik wild konek beruntun mahjong ways klasik permainanfenomena scatter merah mahjong ways 2 sistem keamananpembuktian scatter hitam mahjong ways 2 komunitas pg softrahasia kombinasi wild berjejer mahjong wins pembayaran drastis323324325326327328329330331332penguraian multiplier starlight princessdistribusi wild wild bounty showdowncara membaca rtp mahjong ways 2analisis inferensial pola gates of olympus objektif sisteminovasi grafis pgsoft transisi gambar lebih responsif modernkarakteristik simbol emas mahjong ways 2 pertengahan sesimemanfaatkan ritme putaran mahjong ways 2 server stabilsolusi cerdas volatilitas starlight princess sistem putaranskalabilitas engine html5 multiplier mahjong ways 2mekanisme threading server komputasi mahjong wins 3dekonstruksi algoritma spasial koordinat scatter hitamstudi desain ux interaktif frame emas mahjong ways 2audit protokol enkripsi data rtp mahjong wins 3distribusi rtp gates of olympusinterpretasi rtp mahjong waysanalisis algoritma mahjong ways 2 vs wins 3evolusi fitur scatter hitam mahjongstrategi pola tumble mahjong ways 2data rtp mahjong wins 3 vs klasikmitos fakta mekanika scatter hitam Top