Archive for Sierpień, 2013

DVT appoints experienced agile specialist Riaan du Toit

By admin, 14 sierpnia, 2013, No Comment

Software development company DVT has appointed Riaan du Toit to the position of principle agile consultant.

Du Toit is a professional agile coach with more than 16 years’ experience in all aspects of software development and management, as well as four years of coaching large clients on site as an agile consultant, champion and practitioner. His specialities are agile adoption on enterprise level across the software development lifecycle, Scrum, Disciplined Agile Delivery (DAD) and SAFe frameworks, agile project management, and agile facilitating, coaching, and training.

“DVT has consolidated its agile services under an agile business to help clients in their adoption of this increasingly popular approach to software development,” says Themi Themistocleous, managing director of DVT’s agile business. “We have partnered with Scott Ambler and Associates, who are the world leaders in Disciplined Agile Delivery (DAD), a framework that allows enterprises to pragmatically deploy agile. It therefore made sense to employ someone with Riaan’s extensive skill set in this field.”

Du Toit’s main responsibility will be to consult with and assist clients to implement agile in their enterprises. “DVT applies the DAD framework and approach to conduct assessments, after which we create roadmaps for the implementation and overall adoption of agile (and in particular DAD) in companies,” says Du Toit. “I will also carry out DAD training. My goal is to ease clients’ adoption of agile. Like any other project, it requires changes in the organisation which is often a painful, uncertain journey. We want to ease this journey by applying the DAD framework, as well as our collective experience.”

Du Toit began his career as a developer, moving up the ladder to the position of project manager and then business manager. “When I was introduced to agile, I took to it immediately and I started a big drive to adopt agile in the company I worked for. From there I moved to a company specializing in agile where I led a team of agile coaches and project managers assisting a big telecommunications company in their agile adoption journey. I learnt many important lessons, which is why I like the DAD framework as it addresses the problems that enterprises have with agile implementation.”

Du Toit has an MSc, a Management Development Programme (MDP) qualification, and a number of agile certifications. He also has Prince2 practitioner certification – an established and proven best practice in project management, and he is a black belt DAD coach and trainer.

Events postponed due to fire disaster

By admin, 14 sierpnia, 2013, No Comment

The recent fire at the Jomo Kenyatta International Airport in Kenya has led to its indefinite closure. Due to the unforeseen delays, NETCB, in conjunction with NetIQ, has decided to postpone its planned range of free seminars across the African continent to a later date.

Kenya Airways says hundreds of passengers are stranded but efforts are being made to fly the passengers to their destinations. The events planned for 13 August in Nairobi, Kenya and 15 August in Dar es Salaam, Tanzania will be moved to 3 and 5 September respectively.

NETCB’s CEO Cobus Burgers says incidents like this make executives realise the importance of Data Security and Disaster Management. “These are critical issues that need urgent attention, rather sooner than later.”

In an ever-changing highly competitive business environment, companies need to comply with various legal frameworks, corporate governance and security management to ensure that they mitigate risks.

“Managing business IT infrastructure has become incredibly complex. Organisations today are increasingly focused on Governance, Risk management and Compliance (GRC), it means having strong, consistent controls over who has access, and being able to prove it,” he explains.

NETCB provides solutions that help people collaborate securely in their business. Embracing social networking integrated with mobile technology, NETCB has a range of solutions to solve collaboration, document and records management needs, and the security provisioning and management of these solutions.

The following full-day seminars are planned:

  • 20 August at Axis Workgroup Auditorium, Midrand, South Africa
  • 22 August at Belare Suites Hotel, Durban, South Africa
  • 3 September at The Hilton Hotel in Nairobi, Kenya
  • 5 September at New Africa Hotel in Dar es Salaam, Tanzania

Burgers says this is a seminar that you cannot afford to miss. “Valuable information will be provided to equip you in understanding the requirements to ensure that your organisation can manage and mitigate legislative compliance requirements, manage identity information, act on security events and ensure that workloads in your data centre are properly managed.”

For more information contact NETCB on +27 12 844 0744 or register on

AfricaCom 2013 hosts Cloud@AfricaCom

By admin, 14 sierpnia, 2013, No Comment

Attend AfricaCom 2013, on Tuesday, 13 November in Cape Town, South Africa, for the Cloud@AfricaCom 2013 session, and learn how Africa’s economic growth is strongly tied to Cloud computing.

Cloud is the fastest-growing new revenue opportunity for telecommunication worldwide, so with investment in IT infrastructure soaring across many markets of the African continent, Cloud is making its presence felt across many organisations in Africa. Cloud Africa will cover how to transform your infrastructure for deploying robust Cloud services, benchmarking your Cloud service offering, exploring the future role of the telco industry in the African Cloud ecosystem and more.

If you are a telecommunications professional with a strong interest in deciphering the ever-evolving world of Cloud Computing in Africa, then this is the place to be!

Register now:

A MAZE – 2nd International games and media art festival in Africa

By admin, 14 sierpnia, 2013, No Comment

After the successful kick off in 2012, A MAZE is back in Johannesburg from Thursday 5 to Saturday 7 of September, 2013.

With more than thirty international and African artists, game designers, speakers and musicians showcasing their craft, A MAZE. / Johannesburg brings computer games, music and media art to the public in a dynamic, interactive and fun-filled 3-day event.

A MAZE. / Johannesburg will use public spaces across Braamfontein bringing games and media art expression to the public unexpected and memorable ways.

The goal of A MAZE. is to create an annual evolving international platform for African and European media artists and game developers. The festival opens up a playground for everyone who wants to experience creative expression with code, play and technology. A MAZE. / Johannesburg provides a three day program packed with lectures, panel discussions, indie games, interactive installations, street games, workshops, concerts and parties.

Since its inception in Europe in 2008, A MAZE. has been celebrating the convergence of games, art and technology across Europe, with the HQ being based in Berlin.

A MAZE. / Johannesburg 2013 is presented in partnership with the Digital Arts Department of the University of the Witwatersrand, and in cooperation with the Goethe-Institut in Johannesburg. The event is co-funded by the European Union Network of Institutes of Culture (EUNIC).

The founder of A MAZE. and Festival Director Thorsten S. Wiedemann says: “We are more than happy to announce that A MAZE. / Johannesburg has secured a partnership with the Digital Arts Department of the University of the Witwatersrand for the next 4 years. This strong relationship between an academic institution and an international label guarantees sustainability and visibility world-wide. This year we are welcoming artists, game developers, forward thinkers, entrepreneurs, nerds and geeks from all over Africa and Europe to share their knowledge and visions about games, art and technology. A MAZE. /Johannesburg is a public festival of creativity and progressive culture.”

Artists who will be featured at A MAZE. /Johannesburg 2013 include:

Rami Ismail, game designer from the Netherlands; Chief Nyameya, game designer from Kenya; Sameh Al Tawil, media artist and researcher from Egypt; Tegan Bristow, media artist and researcher from South Africa; Joao Orecchia, musician and sound artist from South Africa; Sos Sosowski, game designer from Poland; SFA, animation artists from Germany; John Kevin Biretwa, digital entrepreneur from Uganda; Oluseye Soyode-Johnson, game consultant from Nigeria; Evan Greenwood, game designer from South Africa

Please find more information about the program and the locations of A MAZE. / Johannesburg at (Program will be available from 19 of August.)

AfricaCom to help define Africa’s digital music ecosystem

By admin, 14 sierpnia, 2013, No Comment

Don’t miss out on participating in the development of a lucrative and active digital music bio-network when AfricaCom 2013 launches its Digital Music Africa conference in November 2013. While audiences across Africa are well established and passionate about music – and this includes international artists and local musicians – the business of music on the continent is still in its infancy.

On any given day, thousands of people can be seen walking, driving and working while plugged into their mobile music devices consuming live music or playlists from saved favourite CD tracks. Music is mobile and consumers are choosing how, when and what they consume. They are in control. But, as yet, and despite the business opportunity being huge, there is no clear structure in the market to organise efficient distribution networks, licensing, publishing and revenue sharing.

The high level of music piracy and lack of strong collecting societies may be challenges for Africa’s traditional music markets but the innovation and evolution of its digital market structure is what is making it interesting for many companies (and not the usual suspects either) to play in. Across Africa, music labels are not at the heart of the digital music ecosystem as they are in Western markets. Instead, telecom operators play a major role (and retain a larger part of revenues) in distributing and promoting music to consumers. Some are even taking a lead in digital music by partnering with music brands to deliver targeted value added services to their consumers. Examples of this are Orange partnering with Deezer, an online music streaming, sharing and downloading brand, and Etisalat hooking up with Spinlet in Nigeria.

Additionally, a range of innovative digital music services are regularly being launched by African entrepreneurs and are rocking and shaking up the music market. Brands such as Iroking, Spinlet or Simfy are making a name for themselves by sourcing and distributing music from home-grown artists to local audiences and to the African diaspora, placing themselves as strong contenders for the title of “Africa’s Spotify”.

Digital Music Africa is a new event happening at AfricaCom 2013 that will discuss how the digital music market is and how it should shape up in Africa. It will bring together all stakeholders to share experiences and ideas: local and international labels, telecom operators, content aggregators, digital service providers, distributors, handset manufacturers, app developers and more. “We are excited by the launch of Digital Music Africa alongside AfricaCom” says Julie Rey, Research Director at organisers Informa Telecoms & Media. “Africa’s music market has great potential both for the music industry and for the telecoms sector where content services are a major part of operators’ data strategy”. (AfricaCom is the continent’s single biggest annual ICT, Communications and Technology meeting place).

The programme at Digital Music Africa will include contributions from the biggest brands in the market: MTN, Orange, Deezer, Universal Music, Iroking, Spinlet, Africori, Rolling Stone Magazine and more. During a packed day of presentations, case studies and interactive panel sessions, they will discuss the major issues in the market with a view to building a strong ecosystem, monetising music services, successful partnerships, promotion and more.

HP speeds delivery of IT application services

By admin, 14 sierpnia, 2013, No Comment

New cloud and automation software enables rapid increase in IT responsiveness to enterprise needs

HP today announced the next generation of its data centre automation, orchestration and cloud management software, which is designed to enable enterprise IT to rapidly deliver services on a massive scale—on premises or via the cloud—to meet changing enterprise needs.

Social networking, mobility, big data and cloud services are changing the role of IT from infrastructure support to acting as a driver of business growth through rapid delivery of services and application releases. However, managing complex distributed systems and heterogeneous environments is time consuming and hinders agility and innovation.

HP is introducing a comprehensive, integrated portfolio of software and services that helps to automate the complete life cycle of IT services—from routine data centre maintenance to the delivery of business processes. By automating repetitive, manual and time-consuming operations, the automation and cloud management software from HP minimises complexities in heterogeneous environments and allows IT to focus on higher-impact activities to increase the overall value for the business.

HP’s automation, orchestration and cloud management software solutions provide the essential foundation for delivering application and infrastructure services, which enables clients to:

  • Drive business growth by quickly deploying innovative IT services on a massive scale with HP Operations Orchestration (OO) 10, which automates the execution of up to 15,000 simultaneous operations.(1)
  • Lower IT costs by efficiently delivering computing capacity with HP Server Automation (SA) 10, which automates server life cycle management to increase utilisation, while reducing manual administration.
  • Increase employee efficiency with HP Database and Middleware Automation (DMA) 10, which automates manual database management tasks.
  • Accelerate time to value of IT services with HP Cloud Service Automation 3.2, which provides service life cycle automation, utilisation and financial management capabilities to accurately and efficiently manage and scale cloud services.

“Our IT employees were bogged down being enterprise ‘fire fighters’ instead of proactive business partners,” said Andy Smith, vice president, Application Hosting Services, McKesson. “HP cloud and automation software enabled us to improve our IT operations by automating routine, repetitive tasks prone to human error, encouraging our employees to focus on innovative IT services. As a result, we can now deliver both IaaS and PaaS in under an hour, and we reduced IT service outages by 78 percent, the occurrence of critical IT incidents by 65 percent and have been able to deploy 40 percent more IT systems.”

Break the barriers to scale with enterprise-grade automation
HP OO 10 reduces the time needed to build and deploy business processes—on premises or via the cloud—from weeks to minutes by automating all application and infrastructure runbooks.(2) By automating IT runbooks on a massive scale, HP OO 10 can rapidly deliver infrastructure capacity when needed, and automates application services that rely on heterogeneous components.

In addition, HP OO 10 speeds time to value with out-of-the-box support for more than 5,000 IT operations, including new support for Amazon S3 Storage, HP ArcSight, HP Fortify, OpenStack and SAP applications. This enables IT organisations to quickly and easily allowing automate their business processes.

Control server virtualisation sprawl
The HP SA 10 enterprise-grade server life cycle management platform allows IT to manage more than 100,000 physical and virtual servers(2) from a single pane of glass to eliminate management complexity. It also improves operational economics by reducing the administrator-to-server ratio by up to 60 percent.(2)

In addition, HP SA 10 offers HP Server Automation Standard, a virtual appliance that allows smaller organisations and department-level IT teams to begin managing server environments in less than one hour. (1) By automating management of the server life cycle, enterprises can speed software deployment from weeks to hours and the deployment of entire server stacks from days to minutes (2) for rapid return on investment.

Deliver application services with databases and middleware on demand
HP DMA 10 software automates up to 60 percent of the manual, repetitive administrative tasks associated with database management.(3) It can improve administrator efficiency by more than 70 percent(3) with more than 1,000 out-of-the-box best practices to provision, patch, upgrade and release application code into database and middleware servers such as DB2,Oracle, SQL Server, Sybase and WebSphere. New out-of-the-box compliance reports enable enterprises to quickly access the critical information needed to meet regulations for database management.

Capitalise on cloud automation maturity
HP Cloud Service Automation 3.2 is the industry’s most comprehensive, unified cloud management platform for building, brokering and managing enterprise-grade application and heterogeneous infrastructure cloud services.

HP Cloud Service Automation 3.2 simplifies management of heterogeneous
environments by leveraging HP OO and HP SA while providing support for Amazon EC2 public cloud services, HP Cloud Services, KVM OpenStack and Microsoft® Hyper-V.
Integration with HP DMA offers self-service portals for Database-as-a-Service and Platform-as-a-Service environments that deliver end-to-end IT application services.

Integration with HP Business Service Management allows HP Cloud Service Automation 3.2 to manage system and application service performance in private and hybrid cloud environments. HP Cloud Service Automation 3.2 also contributes to improved efficiency with intelligent resource allocation, and provides chargeback capabilities with HP Asset Manager. Leveraging HP IT Executive Scorecard, HP Cloud Service Automation 3.2 provides a 360-degree dashboard view of cloud and hybrid IT investments for business planning.

HP Software Professional Services
HP Software Professional Services help customers develop strategies for product implementation to facilitate rapid return on software investments. HP provides Foundation Services, HP CloudMaps and HP QuickPacks that are designed to enable customers to quickly implement new automation and cloud solutions, while helping to reduce risks and maintain performance. For complex data centre scenarios, HP offers advanced services to help customers implement sophisticated capabilities. HP also offers educational services that enable customers to gain the skills to maximise productivity and the solutions’ adoption.

Pricing and availability
HP OO 10, HP SA 10, HP DMA 10 and HP Cloud Service Automation 3.2 will be available individually worldwide directly from HP or through its ecosystem of worldwide channel partners.

HP OO 10 is priced per orchestrated node. HP SA 10 and HP DMA 10 are priced per operating system instance. HP Cloud Service Automation 3.2 is priced per operating system instance and available as one package of 10 instances that includes HP SA and HP OO licenses.


The ABCs of A2P SMS messaging – and why it matters

By admin, 14 sierpnia, 2013, No Comment

By Dr Pieter Streicher, Managing Director

The ever-resilient SMS industry has had a pretty busy start to 2013. Firstly, messaging via mobile applications such as WhatsApp has cannibalised a large portion of person-to-person (P2P) SMS messaging. This left application-to-person (A2P) SMS messaging as the only hope for operators to profit from their SMS messaging infrastructure. Since Cell C started terminating A2P SMS messages on all networks in the absence of any SMS interconnect fees, the bigger operators were forced to call for SMS interconnect fees for A2P SMS messaging if they were to retain any A2P SMS messaging revenue. Most networks have now signed SMS interconnect agreements, and these have been lodged with ICASA.

In light of this, it is worth reminding ourselves about the difference between P2P messaging and A2P messaging. The distinction between the two is not as straightforward as you might think and getting this wrong can be pretty disastrous for operators. For instance poor wording of the definition of A2P messaging in the initial interconnect agreements in South Africa resulted in the newly-licensed smaller operators being able to send hundreds of millions of A2P SMS messages for free.

One way of defining SMS messages is according to their intention. One could say that if the intention is for personal communication, then it is a P2P message. But if the intention is to sell or promote something, it is an A2P message. These definitions are problematic for several reasons. Firstly, not all messages sent by companies via high volume SMS applications are to sell you something: think of dentists’ appointment reminders and banks’ one-time passwords.

Also, does that mean if I SMS you from my cell phone to arrange a coffee date it’s a P2P message, but if I SMS you to see if you would like to buy my laptop, it’s an A2P message? Finally, defining SMS messages based on intention would be impossible to manage. Messages would have to be read in order for a network to determine the nature of the SMS. This would violate privacy laws.

Fortunately, we have ended up with a technical definition of A2P vs. P2P messages. They are defined according to their provenance – where they originate. All messages that do not originate from a valid mobile device with a valid SIM card are regarded as A2P messages (excluding only Call Me messages). Messages that DO originate from a valid mobile device with a valid SIM card are regarded as P2P messages subject to certain traffic limits setting the threshold of acceptable use. So if messages are sent via a mobile device, and that device sends in excess of 50 messages an hour, they are again classed as A2P messages. Verifying IMSI (International Mobile Standard Equipment Identity) and IMEI (International Mobile Subscriber Identity) numbers, mobile network operators can identify valid handsets and valid SIM cards.

Since operators will now pay more attention to the origin of messages (so they are able to bill for A2P messages) they will also be better equipped to deal with SMS spam, scams and fraud. SMS messages classed as A2P are subject to a range of acts (including the ECT, CPA and POPI). This legislation covers mobile marketing messages and the collection, storage and use of personal information.

The network’s practice of defining SMS messaging technically, as where they are coming from, is good news for businesses using SMS for operational and marketing communications. This means that industry standards and regulations for A2P messaging are in place and that all businesses have a level playing field from which to implement SMS messaging as a reliable channel to deliver timeous communications to customers, clients or suppliers.


WyseTalk to shed some light on the growing need for Social Business Software

By admin, 14 sierpnia, 2013, No Comment

Innovation is collaborative

Every business wants to be innovative, but not every business taps into the source of inspiration. This is the sentiment of WyseTalk who will be exploring the burning issues facing businesses today at the upcoming Social Business Africa Conference taking place on 20th August 2013 at The Forum in Bryanston, Johannesburg.

“Businesses today operate within a dynamic environment, shaped by variables, such as evolving legislation, globalisation and economic volatility. Disruptive new technologies create new competitors overnight and the only way to get and stay in front is to constantly innovate,” says Gys Kappers, CEO of WyseTalk. “However, innovation is often thought of as the product of inspiration – a spark of genius whose timing or vessel cannot be predicted, or a closed process driven by research and development. However, the reality is that creativity can be cultivated as a habit – by anyone – and it is better when it draws on a collaboration of ideas. By believing that your workforce has a substantial intellect capacity and that it is largely untapped, leaves many organisations with a great capacity to innovate!”

Enter Social Business Software (SBS). Social Business encourages companies to make the paradigm shift towards open innovation, accelerated growth and collaboration with staff and customers by mirroring the natural way social platforms work but in a business context.

“Companies around the world recognise the need to change the way they operate by enabling better business practices that mobilise the collective brainpower of the organisation and its customers in a transparent and meaningful way, that’s considerate of policies and governance issues,” adds Kappers. “Simply put, SBS is the ability to use social media practices within a business to collaborate intelligence, improve responsiveness and productivity, connect and communicate and drive innovation – to do exactly that and so it’s easy to see why the SBS market is growing – as it is everything businesses need today.”

The IDC* predicts that the market for ‘social enterprise software’ will grow 43% annually to reach $4.5 billion in 2016. What’s more, recent statistics reported by McKinsey indicate that businesses that have deployed SBS see a 79% increase in ideas and innovations for the enterprise, leading to a 13% increase in sales revenue which in turn leads to a 3-5% increase in overall deal size and bottom line improvement.

Today, collaboration, networking and knowledge sharing can be seen as antecedents of R&D innovation and knowledge creation. The boundary between the company and its environment could be said to have become more fluid, enabling ideas and knowledge to flow much more freely.

“The success of harnessing business chatter to explore better ways of doing business – cannot be denied,” adds Kappers. “But while businesses explore opportunities, throw money at R&D and seek acquisitions that will enable bigger and better products or services, those that understand the power of SBS will know that the idea that will change the business probably already exists somewhere in company it’s just a matter of asking the right question in an open innovation environment. And it is that, that will set your business apart from the rest,” concludes Kappers.

For more information on the Social Business Africa Conference 2013 – please visit


Building a thriving ecosystem for mobile payments

By admin, 14 sierpnia, 2013, No Comment

Mobile phone-based transactions have come of age in South Africa, with wiGroup’s platform, wiPlatform, processing over half a billion rands in transaction value during the first six months of 2013.

“We have seen a 500% increase in mobile transaction volumes through wiPlatform in the first six months of 2013,” says wiGroup CEO Bevan Ducasse. “The market has clearly realised the value of the open platform approach, which makes it easy for retailers and app developers to work together, without having to make expensive and difficult changes at the point of sale.”

Ducasse says much of wiGroup’s explosive growth in the past year is due to the fact that its transaction platform is now active in both Pick n Pay and the Shoprite group, as well as major food and beverage chains. “Mobile banking is one of the most popular applications, along with mobile vouchers and coupons – we are now processing over half a million mobile vouchers and coupons per month.”

Ducasse says the wiPlatform enables retailers to accept any mobile wallet, payment or mobile transaction application they choose. “We provide the connection layer between point of sale systems on the one hand, and the burgeoning mobile transaction app ecosystem on the other. Changing anything on the point of sale is a major pain for retailers, so we’ve made sure they only have to do it once – and after that they’re set for the future. They can accept any mobile transaction type or application they choose, through this single integration to wiPlatform. It’s a very powerful proposition to both sides.”

Ducasse also says consumers should expect renewed interest in mobile marketing and mobile payment strategies from retailers. “Now that the platform is in place, retailers can start to experiment with the mix of mobile applications and strategies that work best for them and their customers,” he says. “It’s not about the technology anymore; it’s there – it’s about what you do with it to differentiate and to add value.”


Targeted attacks cost up to $2.4 million in damages

By admin, 14 sierpnia, 2013, No Comment

Large businesses face much higher costs than SMEs

A successful targeted attack against a large company can cause damages of up to $2.4 million. This is according to B2B International which, along with Kaspersky Lab, recently conducted the 2013 Global Corporate IT Security Risks survey. Targeted attacks are one of the most dangerous types of cyber threats, as professional cybercriminals are typically involved in their preparation and launch. These criminals have substantial financial resources and extensive expertise in IT.

Furthermore, the end goals of these attacks are typically secret or confidential information from a specific company. Therefore, leakage of this data could lead to significant losses.

Just how big can these losses be? According to the global data collected by B2B International analysts, on average these incidents cost a company up to $2.4 million, of which approximately $2.17 million stems directly from the incident itself in the form of losses from critical data leakages, business interruptions, and expenses for remediation specialist services (lawyers, IT security professionals, etc.). Companies face an approximate additional $224,000 bill for actions taken to prevent such incidents from taking place again in the future — updating software and hardware, and hiring and training staff.

Globally, company losses resulting from targeted attacks on SMEs (Small and Medium Enterprises) are noticeably lower, at approximately $92,000 per incident, but considering the size of these companies (with an average of about 100-200 employees), the blow suffered by the company is still substantial. Of that $92,000, approximately $72,000 goes directly to incident remediation, while another $20,000 goes toward preventing similar incidents in the future.

Other types of costly attacks:
Although targeted attacks cause the highest financial costs, they are not the only kind of attack – indeed, at present, they are not even the most common threat companies face. About 8% of respondents in South Africa noted that their companies had been subjected to a targeted attack over the previous 12 months. A higher percentage of companies locally (13%) reported that their network infrastructures had been hacked. For large companies globally, these types of attacks can run up damages of $1.67 million ($73,000 for SMEs), and are considered the second most costly type of attack. Intentional leaks of corporate data were suffered by 14% of local companies, and the resulting global financial losses came to an average of $984,000 ($51,000 for SMEs). Attacks exploiting common software vulnerabilities affected 35% of South African companies. Large corporations globally incurred an average of $661,000 in damages from these types of attacks, while SMEs globally incurred roughly $61,000 in damages.

The proper preventative measures:
Targeted attacks are complex and typically involve a long period of preparation during which malicious users try to find the weak points in a corporation’s IT infrastructure and locate the tools necessary to launch the attack. Says Riaan Badenhorst, Head of Operations for Sub-Saharan Africa at Kaspersky Lab; “Fighting this type of threat with antivirus alone is not possible, although effective antivirus solutions are available to handle other kinds of threats. A corporate solution using modern, proactive threat detection technologies can help protect a company against both targeted attacks and other dangerous IT threats”.

Kaspersky Endpoint Security for Business is one of the best corporate solutions available today. Among other components, it includes Automatic Exploit Prevention — a technology that helps identify targeted attacks involving zero-day exploits which target vulnerabilities in software running on company computers. What’s more, the Whitelisting module, which works in partnership with other proactive security technologies and updates automatically, can prove to be especially effective in counteracting targeted attacks if a dangerous vulnerability is detected in any of the legitimate programs in the Whitelisting database.

Dynamic Whitelisting technology, which is built into Kaspersky Endpoint Security for Business, has been very well received by independent experts. Unlike many other corporate solutions, which typically only include blacklist and whitelist databases, Kaspersky Lab’s Whitelisting technology works continuously with the other components included in Kaspersky Endpoint Security for Business, which among other things leads to a very high level of protection both for the Whitelisting database itself, and corporate computers and workstations.


wielkoformatowe wydruki Lublin kolorowe kopiarki Warszawa wielkoformatowe skanowanie kolorowe skanowanie Lublin drukowanie skanowanie lublin skanowanie lublin hempla 4 wydruki lublin centrum wizytówki w godzinę wizytówki Lublin wizytówki od ręki