ExaGrid and Zerto announce an integrated solution for backup and recovery“In an age of continuous digital transformation, businesses require new levels of resilience from their DR and backup solutions."
Huawei announces the launch of Atlas AI
The Huawei Atlas AI computing platform is powered by Huawei's Ascend series AI processors.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
What to expect from the Surface Hub 2S
Microsoft has released details about the next iteration of the Surface Hub featuring mobility, reduced weight and a 85in version in the works.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Informatica launches new AI-driven innovations
Informatica announced new features and AI-driven innovations across five key segments.
Hands-on review: The ruggedly tough CAT S61 smartphone
The driveway beckoned me, so I dropped the phone several times. Back in the study, close examination has failed to reveal a single scratch.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Nutanix introduces new cloud-native solutions for enterprises
Nutanix announced the general availability of its certified Kubernetes solution.
Talend integrates Pipeline Designer with IPaaS offering
Talend has added a web-based graphical designer to its integration platform-as-a-service, Talend Cloud.
Teradata leads data management, according to Gartner report
As part of the report, Gartner evaluated 19 vendors against data warehouse use cases, including traditional use cases, real-time, logical, and context-independent.
How printing solutions can help save the planet
Y Soft has identified five key ways organisations can become more economical and reduce their environmental impact.
Why HR departments need enterprise content management
"Using tools ranging from automated document capture to web-based digital forms, a comprehensive ECM solution modernises HR."
Teradata expands as-a-service offerings for Advantage platform
Data intelligence company Teradata has announced three new cloud and on-premise solutions that are now integrated into its Teradata Vantage platform.
AI & ML are here to empower human decision-making, not to take away jobs
Those new jobs will be led by creativity and strategic thinking, both of which are human traits that machines can’t easily handle.
Four key steps for creating a data-driven culture
Where there is resistance to using data to make decisions, there will be barriers to new technologies that aid analysis.
Why you should collect Docker infrastructure logs
Syslog-ng is a log management application that enables you to collect logs from multiple platforms in a central space.Download
IFS named a Major Player for ERP in IDC MarketScape
The enterprise applications company was given the title for its flexible product, cloud first approach and customer intimacy.
Forrester names Mimecast a Leader in information archiving
The company has also been named a Top Player in the Radicati Information Archiving - Market Quadrant, 2019.
Innovation or security? The contradictions and how to solve them
There’s tension in the workplace – do companies innovate, or do they keep everything under wraps to minimise risks?Download
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.
Whitepaper: Business continuity in the age of compliance
Installing a continuity solution in a highly regulated industry can be tricky in this age of regulation. What are the questions you should be asking?Download
How IoT can be a game changer for the hospitality sector
IoT and home automation are driving up consumer expectation, and catering to this will be the key to success for the hospitality sector.
IDC: 2019 security spending to grow 20% in APeJ
“The Asia/Pacific region recognises that its no longer “under-the-radar” as far as breaches, hacks, and legislation is concerned.”
Adobe: CX a priority for business but tech adoption lags
Nearly half of global companies categorise their CX maturity as “not very advanced” (46%), with just 9% of APAC companies being “very advanced.”
The ethics of AI: From driverless cars to robo-baristas
"All over the globe technology developers, futurists, experts and creatives are working on new ways AI technologies can change the way we live and work."
AI helping businesses stay ahead of threats - LogRhythm
AI is being used to anticipate new threats and mediate and minimise the damage caused by breaches.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
How to resolve network issues using PRTG
PRTG can warn you with an immediate notification when something uncommon occurs.Download
The team dedicated to global data literacy
The Data Literacy Project has appointed eight data experts who aim to help organisations and individuals improve data literacy across the globe.
AI & ML to power the future of enterprise networks
Aerohive's Alan Amrod shares the challenges of modern enterprise networks - as well the range of benefits that AI and ML are bringing.
Fortinet's bid to close the cyber skills gap
A comprehensive training and education strategy must include strategic partnerships within government, academia and NGOs.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.Download
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.Download
Whitepaper: The Mobile Risk Matrix - how exposed are you?
The proliferation of cloud services has increased the attack surface to include applications, devices, networks, and external web and content delivery methods.Download
How Central Innovation prototyped the game-changing Nura earphones
The premise of their product was a set of headphones – the Nuraphone – able to measure hearing sensitivities across the frequency spectrum and personalise the output for each individual.Download
Why big data should be built into every stage of the IT journey
The risks of avoiding big data in enterprise organisations could end up costing more, or it could result in a failed project.
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."Download
Global security concerns have major impact on Australian firms
Consumers in Australia, Malaysia, New Zealand and the Philippines are not comfortable using digital identities to interact with commercial or financial service providers.Download
Infographic: The security concerns keeping business leaders up at night
Almost half of Australians are concerned about war or terrorism, the Unisys Security Index has foundDownload
Whitepaper: How many log messages are you losing to bad classification?
Operating systems, applications, and network devices generate text messages of the events that happen to them.Download
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.Download
Whitepaper: How to manage mobile risk in a perimeter-less work environment
Enabling mobility and the ability to access data seamlessly is a great development for enterprise productivity, but it causes a serious challenge to security teams.Download
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
NetStrategy achieves Extreme Networks Black Diamond status
They are the first partner in APAC to reach this level giving them access to greater support from Extreme.
9 Spokes and Microsoft NZ announce co-sell partnership
The agreement will see 9 Spokes listed on the Microsoft AppSource Marketplace, providing a channel to grow its platform base of small business users.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
$199m centre to boost Australia's space technologies
The Cooperative Research Centre for Smart Satellite Technologies and Analytics (SmartSat CRC) will be the cornerstone of space technologies.
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.Download
Identity assurance - a refreshed approach to authentication
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.Download
Air New Zealand and Microsoft announce ground-breaking digital collaboration
“Being able to 3D print certain components on the go would be transformative and drive significant efficiencies and sustainability benefits."
Cyber threats: Catch 'em all with unified monitoring
Viruses, Trojans, malfunctions, backdoors, physical hazards… Not so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.Download
Data science firm Alteryx ramps up APAC expansion
Alteryx says it is committed to helping companies across the globe increase data literacy and fuel a culture of analytics by providing a platform that simultaneously addresses the needs of the data analyst, data scientist and citizen data scientist.
Itron and VINCI Energies to build Australia’s largest smart lighting project
“We are excited to work with TCCS and Electrix on this innovative project, which showcases the power of collaboration and creativity."
Avaya extends AI integration with Google Cloud
Avaya is one of the Google Cloud partners participating in an early access program aimed at augmenting next-generation contact centres.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.
Whitepaper: How to improve your cybersecurity sales pitch
Boards and executives who normally approve funding for IT security projects do not speak tech - they speak the language of ROI, NPV, etc.Download
How to embed flexibility and agility in big data architecture
Big data analytics strategies need flexibility and agility to meet changing business demands.Read More
Whitepaper: The key to maximising office space efficiency
Most offices worldwide are approximately 50% under-utilised on any given day, causing issues for facility management in understanding the number of people in a facility.Download
Citrix takes network solutions into Google Cloud
Citrix is taking its SD-WAN solution and Citrix ADC onto Google Cloud Platform to get applications onto the cloud.
Whitepaper: Making cybersecurity risk measurement more efficient with AI
Enterprises are looking for ways to grant autonomy and freedom of use to their employees while maintaining both visibility of their inherent level of risk and a high level of protection against nefarious activity.Download
What happens when AI falls into the wrong hands
"In order to have the best defence, you need to know how attackers operate."
Blockchain incubator set to bolster Australian industry
“Crypto SA Lab is about building a community and an industry in South Australia by providing these technical skills.”
Insider insight: How to get more from your Splunk platform
Having the right tools is only half the battle, not until you can leverage them most effectively can you see the gains that properly managed data can provide.Download
Managing content with artificial intelligence
“The importance of managing content more responsibly is growing for organisations."
Your company is collecting more data – but how do you make it work for you?
Terabytes are old news – data is growing at the rate of petabytes, zettabytes, and beyond.Click Here
Wisenet releases education campus management solution
Wisenet ITS Application Suite can be customised and configured to meet modern public education provider demands.
Disaster alert - will your business survive?
No matter the size or industry that your business operates in, business continuity planning is critical to support resilience and uptime in the event of a disaster.Download
APAC cyber threats and trends CISOs must be prepared for – Sonicwall
From malware, IoT, to file-based attacks, the report breaks down the major attack vectors being used to compromise businesses.Read More
VMware to help drive the digitisation of the Australian Government
Cenitex is adopting VMware's cloud technology to improve the resilience, reliability and security of its core infrastructure.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.Download
Lenovo & VMware know the secret of hyperconvergence - do you?
In this whitepaper, IDC analyses the benefits of hyperconverged solutions, and how they align with solutions from firms such as Lenovo and VMware.Download
How integrating AI into network monitoring drives efficiencies
IT teams all around the world are spending a disproportionate amount diagnosing what are, realistically, straightforward problems.
Navigating the complicated world of DNS security
Over the years, DNS, both the protocol and the servers, have become the target of a variety of attacks, including the Lion worm.Download
Amazon tools empower SMBs for sales success
Amazon invests billions of dollars each year on infrastructure, tools and services designed for the SMB market, helping them to reach new customers and sell new products online.
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.Download
Network security in A/NZ - OVH
Ensuring operations can be performed at a continuous fast pace will be vital for businesses in 2019.
Should you rely on Elasticsearch to simplify your logging system?
Elasticsearch allows you to store any number of arbitrary name-value pairs coming from structured logging.Download
Whitepaper: Is your cloud configured for your company’s growth?
There is still one key ingredient needed to truly leverage the benefits of cloud technology – human expertise.Download
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Taulia and Google Cloud to simplify invoicing with AI
“Using AI we have finally cracked the intractable invoice processing issues that many businesses face."
Efficiency is the name of the game - how to profit from workspace digitisation
A flexible working environment and mobile employees mean that security and facility managers must create new efficiency protocols that keep employees happy.Download
DNS attackers love legacy systems - but how much damage can they inflict?
DNS infrastructure is vulnerable in terms of its security, availability, and integrity. An attacker just has to exploit the Domain Name System (DNS) on legacy systems and they get free reign.Download
Four ways to help improve the supply chain with IoT
IoT allows supply chain managers to connect their vehicles, equipment and devices to gain near real-time status updates on jobs.
Can your vulnerability assessments protect your organisation?
33% of enterprises surveyed are at a low maturity, conducting only limited assessments of selected assets.Download
AI voice assistants: The unsung helpers of network performance
While it’s currently a far cry to expect IT managers to suddenly transform all of their browser-based management with voice commands, it can be a useful aid for a number of different tasks.
Security and mobility in a mobile-first world
Explore security, productivity, mobility, and what solutions are available to you. Here's how to move your organisation towards the mobile-first world, securely.Download
Yes, data is the new oil - but only analytics can refine the insights
Data has frequently been referred to as the ‘oil’ of the 21st century - much like oil, it’s a raw material that can be transformed into insights and value. Following that analogy, the oil refineries of data today are business intelligence and analytics platforms.
Why credential theft can be devastating
The term “credential” usually conjures up an image of an employee identification card, however, it's so much more.Download
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."Download
Whitepaper: Why strong log management gives you invaluable data
Most log messages traditionally come from three types: system logs of servers, network devices, and applications.Download
The ever-shifting role of physical access control
Physical security teams can retain control over their budgets and investment decisions, as well as the ability to prioritize the safety and security of the organisation.Download
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.Download
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.Download
Study: Is it possible to detect breaches as they happen
Breaches often happen when businesses least expect them, causing slow reaction times and possibly catastrophic loss.Download
Google Cloud releases range of retail solutions
The solutions aim to capture the growing trend of cloud in retail, offering solutions for eCommerce, inventory management, and more.
Insider threats & breach reports: Why security needs more investment
Insider threats (those that come from within your organisation) are a serious concern - here's why.Download
WikiLeaks' Julian Assange arrested in London
There’s little doubt that it’s a day of reckoning for WikiLeaks cofounder Julian Assange today, after his seven-year long protection inside London’s Ecquador Embassy came to an abrupt end.
10 best practices for building effective dashboards
When you've created an effective dashboard, you will wonder how you ever lived without it. Here are 10 ways to build the perfect dashboard.Read More
From magstripe to mobile: The evolution of access management
HID Global examines solutions available today, the future of mobile access, and why it’s critical to ensure that each component of the access control ecosystem is as secure as possible.Download
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
HP takes top spot from Lenovo in PC market
In the worldwide PC market, global shipments were above expectations, reaching 58.5 million during the last quarter.