According to CASA Software, management of today’s complex IT landscape is a costly exercise bedevilled by a dearth of technology skills. However, this in turn is a major growth driver of the managed services market. “Enterprise-level corporations all the way through to the SME market want to maximise the performance and reliability of critical business […]
Continue readingMore TagTag: CASA
CASA delivering globally competitive IT services in SA
In the face of a dearth of IT skills around the world, the managed services market continues to grow. Statista reports that global revenue in this sector is projected to reach US$24.68 billion in 2024, with an annual growth rate (CAGR 2024-2029) of 2.67%. This is predicted to result in an estimated market volume of US$28.15 […]
Continue readingMore TagReduce application security debt with AI, Veracode Fix
A recent study highlights the growth in security debt and reveals that finding and fixing flaws is becoming increasingly critical if potential costly hacks are to be avoided. For those unfamiliar with the term, let’s start by defining security debt. It is the accumulation of unfixed or unresolved security vulnerabilities, software that is out of date […]
Continue readingMore TagEmbarking on a Zero Trust journey
If feeling overwhelmed at the scope of the Zero Trust architecture, get the basics out of the way first. Here’s how. You’ve heard it all before − the IT landscape is spreading, with hybrid infrastructure combined with SaaS applications, hosted plus on-premises environments and remote workers − all adding to the sprawl and all with […]
Continue readingMore TagSquaring the software security circle
Veracode is using artificial intelligence to make applications more secure – at the speed of business. Two hacks over the last 12 months in South Africa – at the Companies and Intellectual Property Commission of South Africa (CIPC) and a famous retailer – illustrate yet again how urgent is the need for a multi-layered approach to security, […]
Continue readingMore TagEliminate the Security Chaos
CISOs and CIOs increasingly adopt information security management systems to improve their security posture and manage it going forward. A quick internet search on the current cyber threat landscape will yield any number of gloomy statistics. Add to that the fact that artificial intelligence (AI) is expected to give already well-resourced cyber criminals even more […]
Continue readingMore TagResolve automation complexity, eliminate missed SLAs with automation analytics, intelligence
Many organisations on digital transformation journeys are struggling with the automation of supporting business workloads. This is primarily due to increased complexity and the need to operate across multiple applications and platforms such as mainframes, distributed systems plus multiple cloud providers. “Improving automation maturity is essential to the success of these business transformations and it […]
Continue readingMore TagHow to reduce disaster recovery readiness testing times by up to 75% with 80% fewer resources
Disaster recovery (DR) readiness is a necessity for today’s highly digitalised companies and an important item on any board agenda. CIOs must be able to prove, with full documentary evidence, that the business is operationally resilient from an IT perspective. This can turn out to be extremely difficult using partially automated and manually operated tests, […]
Continue readingMore TagSymantec Endpoint Security Adaptive Protection from CA Southern Africa
Enterprises across the globe are heavily invested in endpoint security to protect valuable assets. CA Southern Africa (CASA) reveals despite the time and money spent, more breaches are happening today than ever before. Why is that? “While the technology certainly has a role to play with some security solution offerings, lower protection levels and an […]
Continue readingMore TagAI’s potential for good in the cyber security space
Cyber security professionals can use generative AI to better defend against the attackers who are using the same AI tools to create attacks. When people engage in the artificial intelligence (AI) debate, top of the list of concerns is often the intellectual property (IP) and copyright issue, especially regarding code generation or creative outputs from […]
Continue readingMore Tag