Cibecs
   HOME
*





Cibecs
Cibecs, founded in 2004, is a company located in Johannesburg, South Africa. Cibecs develops enterprise endpoint data backup, protection and security software. The company was co-founded by Richard Dewing, Neal Dewing and Ilze Dewing. In early 2016 Cibecs released Cibecs Version 8.0, their latest data backup and recovery software for laptops and desktops. In 2016 Cibecs extended its offering in South Africa with a cloud based endpoint data backup and protection solution called Cibecs Cloud. Investment & Partnerships In December 2008 Hasso Plattner Ventures Africa, personal investment vehicle of Prof. Dr. Hasso Plattner, co-founder of SAP, acquired a stake in Cibecs. In 2009 Cibecs partnered with JSE Limited JSE Limited (previously the JSE Securities Exchange and the Johannesburg Stock Exchange) is the largest stock exchange in Africa. It is located in Sandton, Johannesburg, South Africa, after it moved from downtown Johannesburg in 2000. In 2003 ... listed managed serv ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

JSE Limited
JSE Limited (previously the JSE Securities Exchange and the Johannesburg Stock Exchange) is the largest stock exchange in Africa. It is located in Sandton, Johannesburg, South Africa, after it moved from downtown Johannesburg in 2000. In 2003 the JSE had an estimated 473 listed companies and a market capitalisation of US$182.6 billion (€158 billion), as well as an average monthly traded value of US$6.399 billion (€5.5 billion). As of March 2022, the market capitalisation of the JSE was at US$1.36 trillion. History The discovery of gold on the Witwatersrand in 1886 led to many mining and financial companies opening and a need soon arose for a stock exchange. The first share transactions on the Rand took place in a rustic canvas tent, with trade taking place on Sundays, as this was the only day when mining was not allowed, owing to a strictly enforced regulation prohibiting the entry of African workers to the gold reefs. The ''Johannesburg Exchange & Chambers Company'' was e ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Privately Held Company
A privately held company (or simply a private company) is a company whose shares and related rights or obligations are not offered for public subscription or publicly negotiated in the respective listed markets, but rather the company's stock is offered, owned, traded, exchanged privately, or over-the-counter. In the case of a closed corporation, there are a relatively small number of shareholders or company members. Related terms are closely-held corporation, unquoted company, and unlisted company. Though less visible than their publicly traded counterparts, private companies have major importance in the world's economy. In 2008, the 441 largest private companies in the United States accounted for ($1.8 trillion) in revenues and employed 6.2 million people, according to ''Forbes''. In 2005, using a substantially smaller pool size (22.7%) for comparison, the 339 companies on ''Forbes'' survey of closely held U.S. businesses sold a trillion dollars' worth of goods and service ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Chief Executive Officer
A chief executive officer (CEO), also known as a central executive officer (CEO), chief administrator officer (CAO) or just chief executive (CE), is one of a number of corporate executives charged with the management of an organization especially an independent legal entity such as a company or nonprofit institution. CEOs find roles in a range of organizations, including public and private corporations, non-profit organizations and even some government organizations (notably state-owned enterprises). The CEO of a corporation or company typically reports to the board of directors and is charged with maximizing the value of the business, which may include maximizing the share price, market share, revenues or another element. In the non-profit and government sector, CEOs typically aim at achieving outcomes related to the organization's mission, usually provided by legislation. CEOs are also frequently assigned the role of main manager of the organization and the highest-ranki ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Chief Operating Officer
A chief operating officer or chief operations officer, also called a COO, is one of the highest-ranking executive positions in an organization, composing part of the " C-suite". The COO is usually the second-in-command at the firm, especially if the highest-ranking executive is the chairperson and CEO. The COO is responsible for the daily operation of the company and its office building and routinely reports to the highest-ranking executive—usually the chief executive officer (CEO). Responsibilities and similar titles Unlike other C-suite positions, which tend to be defined according to commonly designated responsibilities across most companies, a COO's job tends to be defined in relation to the specific CEO with whom they work, given the close working relationship of these two individuals. The selection of a COO is similar in many ways to the selection of a vice president or chief of staff of the United States: power and responsibility structures vary in government and p ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Software
Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists of machine language instructions supported by an individual processor—typically a central processing unit (CPU) or a graphics processing unit (GPU). Machine language consists of groups of binary values signifying processor instructions that change the state of the computer from its preceding state. For example, an instruction may change the value stored in a particular storage location in the computer—an effect that is not directly observable to the user. An instruction may also invoke one of many input or output operations, for example displaying some text on a computer screen; causing state changes which should be visible to the user. The processor executes the instructions in the order they are provided, unless it is instr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distrib ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Data Security
Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. Technologies Disk encryption Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk encryption typically takes form in either software (see disk encryption software) or hardware (see disk encryption hardware). Disk encryption is often referred to as on-the-fly encryption (OTFE) or transparent encryption. Software versus hardware-based mechanisms for protecting data Software-based security solutions encrypt the data to protect it from theft. However, a malicious program or a hacker could corrupt the data to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent read and write access to data, which provides very strong protection against tampering and unauthorized access. Hardware-based security or assiste ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Backup
In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "back up", whereas the noun and adjective form is "backup". Backups can be used to recover data after its loss from data deletion or corruption, or to recover data from an earlier time. Backups provide a simple form of disaster recovery; however not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server. A backup system contains at least one copy of all data considered worth saving. The data storage requirements can be large. An information repository model may be used to provide structure to this storage. There are different types of data storage devices used for copying backups of data that is already in secondary storage onto archive ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Johannesburg, Gauteng
Johannesburg ( , , ; Zulu and xh, eGoli ), colloquially known as Jozi, Joburg, or "The City of Gold", is the largest city in South Africa, classified as a megacity, and is one of the 100 largest urban areas in the world. According to Demographia, the Johannesburg–Pretoria urban area (combined because of strong transport links that make commuting feasible) is the 26th-largest in the world in terms of population, with 14,167,000 inhabitants. It is the provincial capital and largest city of Gauteng, which is the wealthiest province in South Africa. Johannesburg is the seat of the Constitutional Court, the highest court in South Africa. Most of the major South African companies and banks have their head offices in Johannesburg. The city is located in the mineral-rich Witwatersrand range of hills and is the centre of large-scale gold and diamond trade. The city was established in 1886 following the discovery of gold on what had been a farm. Due to the extremely large gold ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Johannesburg, South Africa
Johannesburg ( , , ; Zulu language, Zulu and xh, eGoli ), colloquially known as Jozi, Joburg, or "The City of Gold", is the largest city in South Africa, classified as a Megacity#List of megacities, megacity, and is List of urban areas by population, one of the 100 largest urban areas in the world. According to Demographia, the Johannesburg–Pretoria urban area (combined because of strong transport links that make commuting feasible) is the 26th-largest in the world in terms of population, with 14,167,000 inhabitants. It is the provinces of South Africa, provincial capital and largest city of Gauteng, which is the wealthiest province in South Africa. Johannesburg is the seat of the Constitutional Court of South Africa, Constitutional Court, the highest court in South Africa. Most of the major South African companies and banks have their head offices in Johannesburg. The city is located in the mineral-rich Witwatersrand range of hills and is the centre of large-scale gold and ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Backup
In information technology, a backup, or data backup is a copy of computer data taken and stored elsewhere so that it may be used to restore the original after a data loss event. The verb form, referring to the process of doing so, is "back up", whereas the noun and adjective form is "backup". Backups can be used to recover data after its loss from data deletion or corruption, or to recover data from an earlier time. Backups provide a simple form of disaster recovery; however not all backup systems are able to reconstitute a computer system or other complex configuration such as a computer cluster, active directory server, or database server. A backup system contains at least one copy of all data considered worth saving. The data storage requirements can be large. An information repository model may be used to provide structure to this storage. There are different types of data storage devices used for copying backups of data that is already in secondary storage onto archive ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]