Technology news for Australia's largest enterprises
Cybercrime could cost companies US$5.2tril over next five years – survey
New research from Accenture found that only 30% of organisations are very confident in internet security.
How to deploy machine learning to support digital transformation
Insights360 supposedly provides predictive measures of success which can be reviewed at any moment in time, thereby avoiding potential budget pitfalls.
Why APIs hold the key to a killer customer experience
"APIs can make it possible for companies to build rich and accurate profiles of their customers by aggregating data about them from multiple computer systems."
How healthcare can prepare for My Health Record roll-out - Proofpoint
Australia’s healthcare sector is the continent’s biggest cybercrime target, according to a July report from the Australian Information Commissioner.
How DEX aims to guide process-enabled automation strategies
"Although automation is gaining a lot of momentum, there are many instances where early adopters have failed to achieve their business transformation and ROI goals."
Penten & Cyber Security CRC to research 'advanced cyber traps'
The research centres on how advanced cyber traps, which are used to identify data breaches as they happen, can be used in conjunction with tools such as artificial intelligence.
Achieving cyber resilience in the telco industry - Accenture
Whether hackers are motivated by greed, or a curiosity to assess a telco’s weaknesses; the interconnected nature of the industry places it in a position of increased threat
The CISO view on DevOps: How to protect privileged access in the cloud
While security strategies should address privileged access and the risk of unsecured secrets and credentials, they should also closely align with DevOps culture and methods.
Nasuni receives AWS competency status for primary storage
The recognition certifies that Nasuni Cloud File Services meet AWS's strict technical proficiency requirements for primary storage.
How mass data fragmentation impacts business growth and compliance readiness
"About 44% of Australian businesses use six or more solutions to try to manage fragmented data sources and repositories."
LogicMonitor launches container monitoring solutions
Kubernetes monitoring and LM Service Insight provide performance analytics and data retention for microservices and containerised applications.
InfluxData aims to accelerate growth with new sales executives
As time-based data is generated at exponential rates from increased use of DevOps and IoT sensors, companies are requiring more advanced performance tools to analyze their complex environments.
Commvault fully integrates backup with Cisco Hyperflex
Its IntelliSnap technology has been validated to work with Cisco HyperFlex hyper-converged systems without the need for third-party tools.
Huawei continues 5G trials despite ongoing concern
Huawei completed the 5G NR test at 2.6GHz spectrum in the 5G trial organised by the IMT-2020 (5G) Promotion Group.
Is your security really secure?
ot so long ago a firewall and a virus scanner were enough to protect a network, but today the scene is much different.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Digital trust: The bedrock of all business transformations
Every time an organisation interacts with a partner, customer, or supplier, it is building (and hopefully not breaking) digital trust.
Are you building (or breaking) digital trust?
Business leaders can wait and be forced to respond to market change, or they can embrace digital and lead market change themselves.
New blockchain solution aims to keep our food ethical
OpenSC enables anyone to scan product QR codes which automatically takes them to information about where a specific product’s journey.
Whitepaper: Forrester’s report on 2019’s iPaaS and integration platforms to watch
Learn about Forrester’s requirements for a strategic and robust iPaaS and/or hybrid integration platforms.
Key trends bolstering digital transformation in 2019
"User experience, edge computing and AI will continue to dominate as key trends in 2019."
Expert insight: How to select the right business continuity service provider
Choosing the right business continuity service provider takes careful consideration and investigation – how do you know what to look for?
Whitepaper: Why time matters in a disaster
"Natural disasters, cyber-attacks, human error or disrupted site access may impact your ability to conduct business."
Exclusive: Why Australia’s IT industry needs to invest in SMBs
"With SMBs generating employment for over five million Australians, it comes as no surprise that they play a vital role in the nation’s economy."
Stay online: Protect yourself against DNS attacks
DNS attacks are some of the fastest-growing attack vectors – but what are those attackers after and what damage can they inflict?
Will 2019 be the year of network evolution?
An A10 Networks exec talks 5G, software-defined networks, and the continuing evolution needed for a modern cloud environment.
Why flexible working could make good business sense
“You can always give it a go on a trial basis. If it’s not working, be honest."
Whitepaper: How to detect and respond to threats faster
This white paper uncovers how UEBA reduces your organisational risk and enables you to respond more quickly to attacks.
A guide to using automation to digitally transform business
The report includes steps to an effective digital transformation, including what the leaders are doing right and what the laggards are doing wrong.
Vodafone and PNSol champion new ‘invisble network’ broadband project
"As an industry, we've increased the speed of broadband to one gigabit and beyond, which is a remarkable achievement, but we now have to look beyond speed."
Whitepaper: Using your data and AI to tighten cybersecurity
ResponSight focuses on two key areas of cybersecurity – threat detection and enterprise risk measurement – and the need for more sophisticated approaches in each.
Experts comment on record 772mil-user data breach
Dubbed “Collection #1”, the data set contains emails and passwords with over a billion unique combinations of email addresses and passwords.
Enterprise mobile security: How to get the balance right
Today, neither restricting productivity nor accepting tremendous mobile security risk is a viable option. Mobile threats are prevalent and dangerous.
AU businesses less cybersecurity confident than global peers
A new report reveals companies around the world could incur US$5.2 trillion in additional costs and lost revenue over the next five years due to cybercrime.
Huawei founder publically denies spying allegations
“After all the evidence is made public, we will rely on the justice system.”
IDC: Relevance is combining strategy, creativity and IT services
IDC reveals the Top 10 Asia/Pacific predictions to impact IT and business services sourcing in 2019 and beyond.
Nearly half of APAC enterprises are employing hybrid cloud without a formal strategy
"Alarmingly a significant portion of large enterprises lack a formal hybrid-cloud strategy."
Whitepaper: Automation platforms giving companies better insights on data
451 Research has produced an analysis sponsored by Nintex on how automation is increasingly being used to transform businesses.
Infor snaps up SaaS contract with Drakes Supermarkets
Infor will be supplying Drakes with end-to-end systems to replace its legacy retail software and support its new wholesale venture.
Whitepaper: Making AI work for the healthcare sector
This whitepaper explains how and why AI should be focused on people in healthcare, not technology. Philips calls this approach adaptive intelligence.
Whitepaper: How physical access control got where it is today
Despite the enhanced security and convenience that comes from newer options, many organisations are still using outdated and vulnerable access control technology.
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
Whitepaper: Three quick ways security teams can unlock the executive budget
Boards and Executives who normally approve funding for IT Security speak the language of ROI, NPV, etc.
APAC FinTech network launches to encourage cross-border innovation
Nine associations formally launched the network by signing a Statement of Intent at the Asian Financial Forum event in Hong Kong.
Optimise your data centre with Lenovo’s all-flash storage solutions
The ThinkSystem DM and DE solutions deliver adaptable and dynamic data storage technologies that drive down the cost and complexity of IT.
Malware downloader on the rise in Check Point’s latest Threat Index
Organisations continue to be targeted by cryptominers, despite an overall drop in value across all cryptocurrencies in 2018.
Avaya expands AI offerings with new partnerships
The additions to the ecosystem will enable Avaya to add prioritisation and natural language processing to its UC solutions.
Survey shows that IoT is RoI across Asia Pacific
A recent Frost & Sullivan survey across Australia, Hong Kong and Singapore shows that IoT deployment improves business metrics by around 12%.
Cybersecurity measures aren’t enough to stem the wave of breaches
Cybersecurity measures aren’t enough to stem the wave of breaches
Whitepaper: What are the best practices for choosing credential technology?
Have security professionals and end-users evolved alongside credential technology?
How to successfully phase out legacy physical security systems
Legacy physical security systems often create a cumbersome and difficult environment for those that need to make use of them.
HPE invests in services with new A/NZ execs
With IT services spend growing in Australia and New Zealand, HPE is appointing execs for software and technology services in the South Pacific.
Whitepaper: DNS security for dummies
This whitepaper explores the fundamentals of DNS security and outlines some of the major threats you'll face.
Avoid underutilising office space with optimisation solutions
Facility managers and security professionals need a real-time view of how their workforce interacts with a building.
Top risk facing organisations? Why, it’s an IT talent famine
For some time there has been talk about how the IT industry is crying out for new talent and skills, which a lot of people have glossed over. But now Gartner says it is a harsh reality.
The secret to scaling DevOps in the digital era
"Organisations around the world have learnt at a cost that while agile DevOps methodologies can result in improved outcomes within teams and projects, they have a propensity to fail miserably."
Whitepaper: Microsoft’s framework for inclusive and responsible cloud policies
Microsoft wants to empower organisations to use technology within a clear ethical and responsible framework.
Infographic: Top security concerns driving Australians
The Unisys Security Index study polled over 1,000 adults between August 19 to September 3, 2018.
Whitepaper: The risks of mobility and how security teams can counter them
Enterprise risk management needs to evolve to address mobile risks, and security professionals must architect mobile-specific security.
Extreme Makeover: Mission-critical migration edition
Virtustream has shared invaluable advice about how to make the cloud migration experience a less painful one.
McAfee Gartner Customers’ Choice for Secure Web Gateway
“We take great pride in being recognised by our customers on Gartner Peer Insights, and their willingness to recommend McAfee Web Gateway technology”
CASE STUDY: Prototyping the most ambitious innovation in audio design yet
Central Innovation helped Nura leverage CAD software SOLIDWORKS to refine and prototype the Nuraphone.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
Lenovo offering the best of both worlds for modern data centres
Lenovo's HCI solution provides the benefits of traditional converged systems with the addition of a software-defined scale-out architecture.
Human assets the key to a successful digital transformation
Y Soft's Martin de Martini says it's vital that organisations continue to train and motivate their employees.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
ZTE takes the lead in the global race to 5G
ZTE took the lead in completing the IMT-2020 third phase 5G test for core network performance stability and security function.
How data helps A/NZ enterprises shine
"Mobile computing, artificial intelligence and the cloud are collectively redefining the relationships between companies and customers."
Admins waste 60% of their time on IT maintenance
Most administrators spend more than 60% of their time maintaining IT rather than looking towards new possibilities.
Tips for building a safer and more secure flexible workplace
Predictive reporting and real-time location data can optimise your space requirements.
IT's rising role in physical access control - what you need to know
T and physical security teams are now required to consider fundamental change in day-to-day operations.
Survey finds retailers 'bullish' on hybrid cloud adoption
The retail industry takes no prisoners and that’s made clear in its 'on the pulse' adoption of new technologies.
How HCI helps enterprises stay on top of data regulations
Increasing data protection requirements will supposedly drive the demand for Hyper-Converged Infrastructure solutions across the globe.
IT security: How to make your case for security spending
Business will always hesitate to spend money on what will be perceived as non-revenue generating activities
Whitepaper: Everyday network issues PRTG network monitor helps resolve
Your IT infrastructure needs a constant review in order to ensure the health of your system.
SUSE partners with Intel and SAP to accelerate IT transformation
SUSE announced support for Intel Optane DC persistent memory with SAP HANA.
Report: How IT Is responding to digital disruption and innovation
Today “every company is in the software business" to get a competitive edge, and this survey reveals how app dev is affecting IT teams.
Global security concerns have major impact on Australian firms
Consumers in Australia, Malaysia, New Zealand and the Philippines are not comfortable using digital identities to interact with commercial or financial service providers.
Digitally transform or fall behind - 3 key points to remember
In this report Unisys details three key areas focus on when implementing a successful digital transformation as with every opportunity comes risk.
How IIoT is creating opportunities for RFID companies
The growing demands for automation and digitisation are creating considerable growth opportunities for RFID vendors.
Whitepaper: Business continuity in the age of compliance
Installing a continuity solution in a highly regulated industry can be tricky in this age of regulation. What are the questions you should be asking?
IoT breaches: Nearly half of businesses still can’t detect them
The Internet of Thing’s (IoT’s) rapid rise to prominence may have compromised its security, if a new report from Gemalto is anything to go by.
Case Study: Infoblox protects the network that hosts City University’s curriculum
After recovering from a ransomware attack, City University began to work with Infoblox to bring its network security to the next level.
SIEM can improve security or make it worse – here’s how to get it right
According to Frost & Sullivan, SIEM can either be an enabler or a retardant and there's a thin line between the two - here's the key attributes.
Rubrik welcomes $261m funding for new market expansion
The company intends to use the funds from new investor Bain Capital Ventures will go toward future innovation and expansion.
Insight Venture Partners invests $500 million in Veeam
Veeam will supposedly leverage Insight Venture Partners’ internal business strategy arm, Insight Onsite, and capital to accelerate its expansion through both organic growth and M&A activities.
IDC: Hyperconverged solutions a winning formula for cloud data centres
Hyperconverged solutions can deliver new levels of agility, flexibility, scale and public cloud economics.
Whitepaper: Why it’s critical to detect cyber attacks as they happen
"Many organisations are struggling to keep pace with the speed in which hackers are attacking their systems."
The 3 essential elements to consider with SaaS security
Speed, ease of use, and low capital expenses are just some of the factors driving the continued growth in SaaS security adoption.
Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Top 3 cloud computing predictions – what’s in store for 2019?
Virtustream's Deepak Patil shares his predictions for how cloud computing will evolve in 2019.
Whitepaper: How to secure your data in a remote world
Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.
Office workers frustrated by poor information management systems
82% of workers believe poor information management is damaging their productivity in the workplace.
Whitepaper: How Philips drives security and privacy in healthcare
Personal data within healthcare records is most valuable, as it can be used, for example, for various malicious purposes.
Product review: LogRhythm CloudAI a revolutionary tool
SANS has provided an independent review of a new AI analytics solution designed to rescue businesses 'drowning in data' from SIEM platforms.