CMA

At CMA, we believe in building something bigger than ourselves, every day. We support the missions of our client partners and build tailored business solutions that are excellent, efficient, reliable, and value-based.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

2015: TRENDS IN NETWORK PERFORMANCE MEASUREMENT AND APPLICATION VIRTUALIZATION

scmagazine | January 07, 2016

news image

Since 2009, if not earlier, investment banks have been pushing the technology envelope to achieve the absolute lowest latency for high frequency trading. This was accomplished by using state of the art switches, servers and with significant latency reductions contributed by software solutions such as operating system (OS) bypass also called user-level networking. But not all electronic trading applications need the absolute lowest latency....

Read More

TAKE THE RIDE: 25 YEARS OF COVERING IT SECURITY

scmagazine | December 08, 2014

news image

For this year's annual Reboot edition, we took the opportunity to look back not just on the last 12 months, but the last 25 years SC has been entrenched in the information security space...

Read More

CYBER THREAT DEVELOPMENTS IN 2015

scmagazine | January 05, 2015

news image

It was a tumultuous year with several interesting developments in computer security and the lack thereof. Notable events included the growth of encryption-based ransomware, a series of several high-profile breaches impacting major retailers and the exposure of several highly sophisticated state-sponsored espionage attacks. We anticipate that these threats will continue to mutate in the coming year...

Read More

A LOOK AHEAD: SECURITY EXPERTS SHARE FORECASTS ON 2015

scmagazine | December 08, 2014

news image

As we profiled our selection of luminaries for 2014, we asked a few pressing questions about what threats they struggled with in 2014 and what threats might prove daunting in 2015. Their answers might surprise you....

Read More
news image

2015: TRENDS IN NETWORK PERFORMANCE MEASUREMENT AND APPLICATION VIRTUALIZATION

scmagazine | January 07, 2016

Since 2009, if not earlier, investment banks have been pushing the technology envelope to achieve the absolute lowest latency for high frequency trading. This was accomplished by using state of the art switches, servers and with significant latency reductions contributed by software solutions such as operating system (OS) bypass also called user-level networking. But not all electronic trading applications need the absolute lowest latency....

Read More
news image

TAKE THE RIDE: 25 YEARS OF COVERING IT SECURITY

scmagazine | December 08, 2014

For this year's annual Reboot edition, we took the opportunity to look back not just on the last 12 months, but the last 25 years SC has been entrenched in the information security space...

Read More
news image

CYBER THREAT DEVELOPMENTS IN 2015

scmagazine | January 05, 2015

It was a tumultuous year with several interesting developments in computer security and the lack thereof. Notable events included the growth of encryption-based ransomware, a series of several high-profile breaches impacting major retailers and the exposure of several highly sophisticated state-sponsored espionage attacks. We anticipate that these threats will continue to mutate in the coming year...

Read More
news image

A LOOK AHEAD: SECURITY EXPERTS SHARE FORECASTS ON 2015

scmagazine | December 08, 2014

As we profiled our selection of luminaries for 2014, we asked a few pressing questions about what threats they struggled with in 2014 and what threats might prove daunting in 2015. Their answers might surprise you....

Read More