Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

147,000 Affected by Asheville Eye Associates Data Breach

June 16, 2025

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » NCR Atleos Finds Security, Complexity as Key Driver
Solutions & Tech

NCR Atleos Finds Security, Complexity as Key Driver

Staff WriterBy Staff WriterJune 10, 2025No Comments2 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


NCR Atleos Corporation (“Atleos”) Telecom & Technology (T&T) Division announced results from its recent survey that explored the factors IT leaders consider when making investment decisions about enterprise networking, including domains like LAN, WAN and network security.

The study surveyed IT leaders and a broad cross-section of senior IT professionals from 120 U.S.-based organizations across industries such as manufacturing, retail, banking and energy. Key findings from the survey include:

The top challenges with enterprise networking are security concerns (48%) and the complexity of network management (46%).

Cyber Technology Insights : Seraphic Launches BrowserTotal: Free AI-Powered Browser Security Assessment

Security and compliance, technology innovation and flexibility of network solutions are the main drivers influencing the surveyed enterprises’ decisions to address network challenges.

63% of the companies surveyed use a mix of internal resources and third-party service providers. The more complex tasks tend to be outsourced with 66% of the activities performed by third-party service providers, including network testing and optimization.

For most industries, a common challenge is bridging Operational Technology and IT domains to drive transformation.

Security is a persistent need and a top priority for enterprise IT departments, with half of those surveyed (55%) planning to invest in it in the next 12 months.

Cyber Technology Insights : Guardz Raises $56 Million to Transform Cybersecurity

Enterprises continue to face mounting complexities with the convergence of cloud, on-premises, and legacy infrastructure, along with new technologies like AI, edge computing, private 5G and IoT. In such complex environments, to overcome key challenges it is imperative for businesses to have the expertise to prioritize network and security investments.

“Enterprise leaders need a better understanding of how their investment decisions affect users who rely on their network,” said Sophia Williams, EVP, Customer Service Management & GM, Telecom & Technology, NCR Atleos. “The findings of this research further underscore why we’re laser focused on enhancing customer experience and dealing with complex requirements. With automation, efficiency, optimized cost and simplifying network management we give customers the best value for their investment.”

Cyber Technology Insights : Black Kite Introduces AI-Powered Cyber Assessments

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: businesswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleRare Werewolf APT Targets Hundreds of Russian Firms Using Legit Software
Next Article

"Massive Exploit Affects Over 80,000 Roundcube Servers"

Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

Adeel Shaikh Releases Updated Book on AI-Driven SOC Shif

June 14, 2025

Glider AI Launches ID Verify to Tackle Hiring Fraud Risks

June 14, 2025

SutiSign Boosts eSignature Security with Smart ID Verificatio

June 14, 2025
Leave A Reply Cancel Reply

Latest Posts

147,000 Affected by Asheville Eye Associates Data Breach

June 16, 20250 Views

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 20250 Views

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 20250 Views

WestJet Faces Cyberattack: A Major Disruption

June 16, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

147,000 Affected by Asheville Eye Associates Data Breach

June 16, 2025

Unveiling the Dark Side: Spyware, Hacks, and Hidden Threats

June 16, 2025

"Anubis Ransomware: The Wiper That Erases Your Files Forever"

June 16, 2025
Most Popular

Attackers lodge backdoors into Ivanti Connect Secure devices

February 15, 20255 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20254 Views

SonicWall SMA 1000 series appliances left exposed on the internet

February 14, 20254 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.