article thumbnail

Cisco significantly bolsters security portfolio with $28B Splunk buy

Network World

Looking to significantly reinforce its security software portfolio, Cisco has struck a $28 billion cash deal to acquire enterprise and cloud protection company Splunk. Founded in 2003, Splunk’s software platform is known for its wide-reaching ability to search, monitor and analyze data from a variety of systems.

Security 108
article thumbnail

What is TOGAF? An enterprise architecture methodology for business

CIO Business Intelligence

The Open Group Architecture Framework (TOGAF) is an enterprise architecture methodology that offers a high-level framework for enterprise software development. The Open Group developed TOGAF in 1995, and by 2016, 80% of Global 50 companies and 60% of Fortune 500 companies used the framework. TOGAF definition.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

Last year, Enterprise IT was dramatically shaped by the influx of security breaches, data leaks and a new wave of hackers. But optimism came in the form of Microsoft as word began to spread that the company had solved the problems they experienced with Windows 8/8.1 and is finally giving Enterprises exactly what they need.

Windows 150
article thumbnail

SAP has a new succession plan

CIO Business Intelligence

The German software company has announced that Punit Renjen, who it originally intended would become chairman of the supervisory board, is to be replaced. Initially, the company wanted to appoint an internal candidate, but this plan fell through, he told the paper. Enterprise Applications, SAP, Technology Industry

SAP 130
article thumbnail

Enterprise IT in 2014 – Under-the-Radar Challenges with WAN Bandwidth, BYOD, and XP Security

CTOvision

In addition, desktops and laptops remain revenue-critical workhorses for most companies, and cannot be neglected. The bandwidth gap, the difference between bandwidth companies need and what they actually have, is large and growing. Companies should plan accordingly. Limited WAN Bandwidth. BYOD Will Fail to Live up to the Hype.

WAN 273
article thumbnail

Emerging Threats: Provider of Open Source Threat Intelligence

CTOvision

Founded in 2003 as a cyber security research community, Emerging Threats has become a de facto standard in network-based malware threat detection. Emerging Threats - now part of Proofpoint - is a world-leading provider of open source and commercial threat and malware intelligence.

article thumbnail

The HP-Autonomy lawsuit: Timeline of an M&A disaster

CIO Business Intelligence

Around the turn of the century, Autonomy Corporation was one of the darlings of the UK technology industry, specializing in knowledge management and enterprise search. However, Companies House, the UK register of commerce, has no record of such a company, and it’s not until 1997 that Lynch creates another company, called simply Neurodynamics.

HP 105