Intelligent CIO Middle East Issue 50 | Page 19

LATEST INTELLIGENCE approved applications. They also must constantly deploy additional hardware and software, with minimal if any integration; download new file signatures in order to keep signatures databases current; and conduct daily scans and real-time scans of memory, emails, etc. All of this takes up a lot of CPU cycles and degrades client device usage. On average, traditional endpoint security products use 50% to over 70% of CPU cycles during intensive scans. This leads to constant complaints among end-users at many organizations, who want to know why their systems are so slow or why it takes 15 minutes to boot up every workday morning. Furthermore, this also increases costs and reduces productivity, because users are making more calls to the helpdesk when problems arise. The negative impact on performance goes directly against what so many enterprises strive to achieve today: enhanced systems and application performance that enables workers to complete tasks more quickly and efficiently. If systems are slow, so is the response to customer needs, or the development of a new product or service, or the launch of a marketing campaign. n Download whitepapers free from www.intelligentcio.com/me/whitepapers/ www.intelligentcio.com INTELLIGENTCIO 19