Injazat proposes risk-managed layered security for enterprises to fend off evolving threats at Security Strategist 2012

Press release
Published April 16th, 2012 - 11:46 GMT
Injazat Data Systems
Injazat Data Systems

Injazat Data Systems advised enterprises to correctly position their Information Security Risk Management Framework (ISRM) in their business strategies and operations during the ‘Security Strategist 2012’ conference held today (Monday, April 16, 2012) at The  Address Dubai Marina.

In a presentation titled ‘Information Security (IS) Management – When the Going Gets Tough,’ Injazat’s Head of Information Security, Kamran Ahsan, said that businesses should adopt context-based defenses that respond appropriately to dangers based on risk levels. He outlined Injazat’s ISRM Methodology which enforces a layered security approach that balances between Threat and Control and enables prudent application of  Preventive and Detective Controls at the key architectural layers.

Injazat’s IS chief added that majority of successful intrusions can be avoided through prudent application of basic to intermediate level controls. He further emphasized on  the urgency of re-thinking IS strategies especially in light of challenges associated with cloud computing, virtualization, mobility and critical infrastructure protection.

“Injazat’s ISRM approach enables organizations to manage their information security risks by keeping a fine balance between threats and security controls in a cost effective manner.  This forum is  a great platform for us to encourage this shift from traditional to risk-managed layered security” said Ibrahim Lari, CEO, Injazat Data Systems.

Injazat ( is a Strategic Partner of the 3rd edition of Security Strategist, an annual business security conference organized by Corporate Publishing International (CPI), the regional partner of IDG, the world’s largest information and communications technology publishing house. This year’s conference theme was ‘Defining a Security Blueprint for the Enterprise.’

The industry-recognized market leader for Information Technology, Data Center and Managed Services discussed the best solutions to information security challenges and the maximizing of  enterprise  security  investments  with  over  100

Information Security leaders from across the region. The Injazat Data Center is both Tier IV design and ISO 27001 certified; a distinction that differentiates it as one of the unique facilities in the region.

Background Information

Injazat Data Systems

Injazat Data Systems is an industry recognized market leader in the region for Information Technology, Data Center and Managed Services.

Delivered from the region’s most sophisticated and advanced facility, a Tier IV design certified Premier Data Center facility, Injazat serves a diverse range of customers and has developed a broad portfolio of capabilities to successfully address any organization’s technology challenges.

"قاطع الرؤوس" في قبضة الاستخبارات العراقية

Published February 23rd, 2019 - 09:39 GMT
مقاتلين من داعش/ أرشيفية
مقاتلين من داعش/ أرشيفية

أعلنت الاستخبارات العسكرية العراقية، أمس الجمعة، عن اعتقال قاطع الرؤوس في "داعش" على الحدود العراقية السورية، الذي ظهر في أكثر من فيديو وهو ينفذ عمليات إعدام.

وقالت المديرية في بيان على صفحتها في موقع "فيسبوك" إن "مفارز مديرية الاستخبارات العسكرية في الفرقة 15 ، وإثر معلومات استخبارية دقيقة، ألقت القبض على أحد الإرهابيين الذين تسللوا عبر الحدود العراقية السورية والمعروف بـ (قاطع الرؤوس)".

وأضافت أن "هذا الشخص معروف بقاطع الرؤوس"، وأنه "ظهر بعدة إصدارات للدواعش أمام أشخاص قام بقطع رؤوسهم في العراق وسوريا".


© 2000 - 2019 Al Bawaba (

You may also like

PR Contact

Contact Name
OrientPlanet PR and Marketing Communications
Contact email

Previous PR’s

PR Rates

Buy credits to publish your articles on Al Bawaba Biz here

You May Also Like


Sign up to our newsletter for exclusive updates and enhanced content