
technology TUESDAY, JUNE 9, 2015 Kaspersky endpoint security for business manageability DUBAI: In today’s dynamic environment, IT ties, make inventories, install and enforce securi- Agent using the advanced Patch Management among which are download, activation of securi- administrators encounter a growing number and ty policies to avoid data loss and theft. functionality. To reduce traffic, all updates can be ty application and remote wipe, are delegated to diversity of external cyber threats, while there “The Kaspersky Endpoint Security for Business sent to this computer and then spread through- employees via Self Service Portal. If the device is are internal menaces that are no less dangerous, platform includes functionality broad enough to out the network from there. Updates can be lost or stolen the user can easily locate it, block namely the increasing number of personal meet the security needs of businesses of any size delivered both manually or automatically at any or remove valuable data. The necessary keys and devices at work and a growing amount of shared without incurring additional budget and human time of day, and the IT administrator can moni- certificates are distributed automatically via the information. These two factors bring complica- resource costs. Thanks to it the IT administrator tor their installation status. portal. tions to the control of hardware and software can see, control and protect the corporate net- Together with Kaspersky Lab’s advanced Kaspersky Security Center Role-based Access within the network making it more vulnerable. work with the help of a single platform, via a sin- encryption solution two-factor authentication Control makes it possible to distribute the rights According to a study conducted by Kaspersky gle console: they can manage security, encryp- using smart cards and tokens provides addition- to manage solution functionality (Anti-Malware, Lab and B2B International in 2014, 26% of tion, settings of Windows, Linux and Mac al protection against unauthorized access. Endpoint controls, Encryption, Vulnerability respondents in the GCC named protecting high- machines and mobile devices, control network Kaspersky Security Center Web Console now Assessment / Patch Management) among sever- ly sensitive data as one of top priorities. Viruses, and mail traffic,” commented Ovanes Mikhaylov, supports mobile device management, allowing al IT professionals to provide more effective net- worms and Trojans were ranked among the top Managing Director at Kaspersky Lab Middle East. IT specialists to remotely manage employees’ work administration. While by integrating with three cyber threats (51%), while about 13% of What’s new in Kaspersky Endpoint Security personal devices when they are connected to the HP Arc Sight and IBM QRadar SIEM systems respondents admitted they had faced targeted for Business? the corporate network. Also Kaspersky Mobile Kaspersky Systems Management SP1 now pro- attacks. The 30% reduction in size of Kaspersky Device Management makes it possible to adjust vides an additional option: automatic connec- Kaspersky Endpoint Security for Business Endpoint Security for Windows SP1’s distribution and apply through a single user interface a wide tion to pre-installed client-side SIEM systems for combines the ease of centralized deployment, package and integration of the endpoint range of security policies for devices running on transmitting logs and other data related to infor- management and control over all devices con- encryption module significantly reduces net- the popular Microsoft Exchange Active Sync, mation security. nected to the corporate network with reliable work traffic during deployment and speed up Samsung Knox 2.0 and Apple MDM mobile plat- Kaspersky Lab’s customers in the GCC can protection against cyber threats. With improved the processes of installation and management. If forms. already update their Kaspersky Endpoint features such as Mobile Device Management, it is necessary to install an update on a remote To quickly take care of personal devices Security 10 to Service Pack 1, while other organi- System Management and Endpoint Encryption network, the IT administrator can choose one brought into corporate environment and reduce zations can ask the company’s resellers and sys- IT administrators can easily detect vulnerabili- computer on the network to serve as an Update impact on the IT, some of management services, tem integrators about the new product. The CIO’s future is in the I of the beholder DUBAI: Toward the end of last year, I spoke in all of which are changing at an extremely rap- this column of the need for the region’s Chief id pace and are accompanied by their own Information Officers to prepare themselves inherent security implications. for an evolution of their role, with the ‘infor- Within the Business sphere, there is a clear mation’ of their title eventually transforming requirement for the CIO to become the Chief into ‘innovation’. Indeed, with their roles of Intelligence. Data is now global, compre- already encompassing the identification of hensive, and massive, and extracting value disruptive technologies for pilot projects, from this data and presenting it in the most CIOs are perfectly positioned to take on the appropriate form to business users is a critical mantle of Chief Innovation Officer, tasked challenge. My regular discussions with the with empowering business strategies, gener- region’s ICT leaders reveal that this priority ating new revenue streams, and enabling already tops most of their agendas, with the profitable growth through the innovative vast majority of CIOs striving to empower implementation of cutting-edge ICT solu- their businesses with actionable insights. Big tions. Data/analytics projects will change the way The ability to innovate has never been businesses make decisions, but many barriers easier, more affordable, more - the high cost of technology, possible, and faster than it is complexity of data integration, today. And in game-changing business and IT skills availability, times such as these, it’s up to and organizational maturity - the CIO to take charge - or must be addressed along the someone else will. But are there way, and responsibility for this any other I-shaped strings that lies firmly with the Chief of the forward-thinking CIO Intelligence. should be looking to add to his or her bow? Involvement In short, yes. While the role The next aspect to consider of CIO as innovator is undoubt- is Leadership, something that Wunderlist - has won praise from tech reviewers for its clean design and useful features. edly a crucial one, there are a has perhaps not been tradition- whole host of other dimensions ally associated with the office of that must not be ignored as the the CIO. However, with approxi- ICT leaders of today strive to mately 61% of IT investment Microsoft tries to maintain their relevance in the Jyoti Lalchandani funding already coming from ultra-competitive landscape of outside the IT department itself, tomorrow. Broadly speaking, these can be we are seeing a shift in the way CIOs and oth- categorized as Technical Dimensions, er senior executives relate and collaborate. If Business Dimensions, and Leadership the CIO is not the decision maker, he/she can win mobile friends Dimensions, with infrastructure, integration, still play a range of roles - from co-decision intelligence, influence, and inspiration all maker to partner to trusted advisor. And joining innovation as key areas of focus for regardless of the level of involvement, the IT NEW YORK: Looking for a new app for making “to-do” Facebook bought Instagram in 2012, the popular, free sizes.” Advertisers will also be able to target their mes- the future-ready CIO. department may end up fully accountable for lists on your Apple or Android phone? You could use photo-sharing app had no ads. Since then, Instagram sages to users based on their age, location and gen- Within the Technical sphere, I expect CIOs the integration, support, and success of the Apple’s Reminders or Google’s Keep. But Microsoft is has been careful to only show a few, hand-picked ads der, as well as their interests and things they follow on to actively embrace the responsibilities that technology being introduced, so it is critical hoping you’ll try Wunderlist, created by a German tech in users’ feeds, for fear of alienating its fiercely loyal fol- Instagram. “Working with Facebook, we will enable would be incumbent upon them as Chief of that the CIO is not left sitting in the dark. To startup that Microsoft bought this week. lowing - or marring the Instagram experience. But we advertisers to reach people on Instagram based on Infrastructure and Chief of Integration. The this end, the CIO must gain support and drive Microsoft’s acquisition of German firm all knew that wouldn’t last. demographics and interests, as well as information former is already a core area of accountability, action through others, serving as a Chief of 6Wunderkinder this week for an undisclosed sum is This week, Instagram announced that it will make businesses have about their own customers,” reads a with everybody across the business assuming Influence who proposes, reasons, persuades, part of its broader effort to win friends in the mobile ads on its app “available to businesses of all types and blog post from Instagram.—AP that running the organization’s infrastructure uncovers, or creates incentives, finds com- world. It is still promoting its Windows operating soft- smoothly and efficiently is the primary task of mon ground, and shares visions with other ware for smartphones, but relatively few consumers the CIO. Indeed, with legacy systems account- decision makers. are buying Windows phones. So the company is also ing for 65-70% of the overall IT budget, the The final new role I encourage all CIOs to building a stable of apps for devices that run on highest priorities for CIOs will continue to be embrace is that of Chief of Interpretation, tak- Apple’s iOS and Google’s Android platforms.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages1 Page
-
File Size-